Feb 9 18:53:32.088290 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 9 18:53:32.088338 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 18:53:32.088353 kernel: BIOS-provided physical RAM map: Feb 9 18:53:32.088364 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 9 18:53:32.088374 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 9 18:53:32.088382 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 9 18:53:32.088398 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Feb 9 18:53:32.088409 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Feb 9 18:53:32.088421 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Feb 9 18:53:32.088432 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 9 18:53:32.088443 kernel: NX (Execute Disable) protection: active Feb 9 18:53:32.088454 kernel: SMBIOS 2.7 present. Feb 9 18:53:32.088466 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Feb 9 18:53:32.088477 kernel: Hypervisor detected: KVM Feb 9 18:53:32.088494 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 9 18:53:32.088507 kernel: kvm-clock: cpu 0, msr 59faa001, primary cpu clock Feb 9 18:53:32.088519 kernel: kvm-clock: using sched offset of 7626549492 cycles Feb 9 18:53:32.088533 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 9 18:53:32.088545 kernel: tsc: Detected 2499.994 MHz processor Feb 9 18:53:32.088558 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 18:53:32.088574 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 18:53:32.088586 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Feb 9 18:53:32.088599 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 18:53:32.088611 kernel: Using GB pages for direct mapping Feb 9 18:53:32.088623 kernel: ACPI: Early table checksum verification disabled Feb 9 18:53:32.088636 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Feb 9 18:53:32.088649 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Feb 9 18:53:32.088662 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Feb 9 18:53:32.088674 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Feb 9 18:53:32.088689 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Feb 9 18:53:32.088701 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Feb 9 18:53:32.088714 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Feb 9 18:53:32.088726 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Feb 9 18:53:32.088739 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Feb 9 18:53:32.088751 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Feb 9 18:53:32.088764 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Feb 9 18:53:32.088776 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Feb 9 18:53:32.088791 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Feb 9 18:53:32.088804 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Feb 9 18:53:32.088817 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Feb 9 18:53:32.088834 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Feb 9 18:53:32.088848 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Feb 9 18:53:32.088861 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Feb 9 18:53:32.088875 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Feb 9 18:53:32.088891 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Feb 9 18:53:32.088905 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Feb 9 18:53:32.088918 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Feb 9 18:53:32.088932 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 9 18:53:32.088945 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 9 18:53:32.088958 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Feb 9 18:53:32.088972 kernel: NUMA: Initialized distance table, cnt=1 Feb 9 18:53:32.088985 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Feb 9 18:53:32.089000 kernel: Zone ranges: Feb 9 18:53:32.089057 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 18:53:32.089076 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Feb 9 18:53:32.089090 kernel: Normal empty Feb 9 18:53:32.089104 kernel: Movable zone start for each node Feb 9 18:53:32.089117 kernel: Early memory node ranges Feb 9 18:53:32.089131 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 9 18:53:32.089144 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Feb 9 18:53:32.089158 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Feb 9 18:53:32.089547 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 18:53:32.089629 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 9 18:53:32.089646 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Feb 9 18:53:32.089660 kernel: ACPI: PM-Timer IO Port: 0xb008 Feb 9 18:53:32.089674 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 9 18:53:32.089688 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Feb 9 18:53:32.089732 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 9 18:53:32.089806 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 18:53:32.089825 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 9 18:53:32.089844 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 9 18:53:32.089858 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 18:53:32.089897 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 9 18:53:32.089911 kernel: TSC deadline timer available Feb 9 18:53:32.089925 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 9 18:53:32.089939 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Feb 9 18:53:32.089952 kernel: Booting paravirtualized kernel on KVM Feb 9 18:53:32.089966 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 18:53:32.089980 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 9 18:53:32.089997 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 9 18:53:32.090011 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 9 18:53:32.090024 kernel: pcpu-alloc: [0] 0 1 Feb 9 18:53:32.090038 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0 Feb 9 18:53:32.090051 kernel: kvm-guest: PV spinlocks enabled Feb 9 18:53:32.090064 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 9 18:53:32.090078 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Feb 9 18:53:32.090160 kernel: Policy zone: DMA32 Feb 9 18:53:32.090178 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 18:53:32.090196 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 18:53:32.090210 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 18:53:32.090221 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 9 18:53:32.090699 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 18:53:32.090722 kernel: Memory: 1936476K/2057760K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 121024K reserved, 0K cma-reserved) Feb 9 18:53:32.090736 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 18:53:32.090750 kernel: Kernel/User page tables isolation: enabled Feb 9 18:53:32.090764 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 18:53:32.090781 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 18:53:32.090792 kernel: rcu: Hierarchical RCU implementation. Feb 9 18:53:32.090805 kernel: rcu: RCU event tracing is enabled. Feb 9 18:53:32.090818 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 18:53:32.090832 kernel: Rude variant of Tasks RCU enabled. Feb 9 18:53:32.090844 kernel: Tracing variant of Tasks RCU enabled. Feb 9 18:53:32.090856 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 18:53:32.090869 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 18:53:32.090882 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 9 18:53:32.090900 kernel: random: crng init done Feb 9 18:53:32.090916 kernel: Console: colour VGA+ 80x25 Feb 9 18:53:32.090927 kernel: printk: console [ttyS0] enabled Feb 9 18:53:32.091039 kernel: ACPI: Core revision 20210730 Feb 9 18:53:32.091055 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Feb 9 18:53:32.091097 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 18:53:32.091109 kernel: x2apic enabled Feb 9 18:53:32.091120 kernel: Switched APIC routing to physical x2apic. Feb 9 18:53:32.091132 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240933eba6e, max_idle_ns: 440795246008 ns Feb 9 18:53:32.091149 kernel: Calibrating delay loop (skipped) preset value.. 4999.98 BogoMIPS (lpj=2499994) Feb 9 18:53:32.091208 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 9 18:53:32.091227 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 9 18:53:32.091242 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 18:53:32.091267 kernel: Spectre V2 : Mitigation: Retpolines Feb 9 18:53:32.091283 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 18:53:32.091297 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 9 18:53:32.091312 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Feb 9 18:53:32.091344 kernel: RETBleed: Vulnerable Feb 9 18:53:32.091359 kernel: Speculative Store Bypass: Vulnerable Feb 9 18:53:32.091374 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Feb 9 18:53:32.091389 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 9 18:53:32.091403 kernel: GDS: Unknown: Dependent on hypervisor status Feb 9 18:53:32.091418 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 18:53:32.091435 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 18:53:32.091450 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 18:53:32.091464 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 9 18:53:32.091479 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 9 18:53:32.091493 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Feb 9 18:53:32.091511 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Feb 9 18:53:32.091525 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Feb 9 18:53:32.091540 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Feb 9 18:53:32.091555 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 18:53:32.091569 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 9 18:53:32.091584 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 9 18:53:32.091598 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Feb 9 18:53:32.091612 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Feb 9 18:53:32.091627 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Feb 9 18:53:32.091641 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Feb 9 18:53:32.091657 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Feb 9 18:53:32.091672 kernel: Freeing SMP alternatives memory: 32K Feb 9 18:53:32.091689 kernel: pid_max: default: 32768 minimum: 301 Feb 9 18:53:32.091704 kernel: LSM: Security Framework initializing Feb 9 18:53:32.091718 kernel: SELinux: Initializing. Feb 9 18:53:32.091733 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 9 18:53:32.091747 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 9 18:53:32.091762 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Feb 9 18:53:32.091777 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Feb 9 18:53:32.091791 kernel: signal: max sigframe size: 3632 Feb 9 18:53:32.091806 kernel: rcu: Hierarchical SRCU implementation. Feb 9 18:53:32.091821 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 9 18:53:32.091837 kernel: smp: Bringing up secondary CPUs ... Feb 9 18:53:32.091850 kernel: x86: Booting SMP configuration: Feb 9 18:53:32.091864 kernel: .... node #0, CPUs: #1 Feb 9 18:53:32.091878 kernel: kvm-clock: cpu 1, msr 59faa041, secondary cpu clock Feb 9 18:53:32.091893 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0 Feb 9 18:53:32.091909 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Feb 9 18:53:32.091925 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 18:53:32.091939 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 18:53:32.091954 kernel: smpboot: Max logical packages: 1 Feb 9 18:53:32.091971 kernel: smpboot: Total of 2 processors activated (9999.97 BogoMIPS) Feb 9 18:53:32.091985 kernel: devtmpfs: initialized Feb 9 18:53:32.092000 kernel: x86/mm: Memory block size: 128MB Feb 9 18:53:32.092013 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 18:53:32.092026 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 18:53:32.092040 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 18:53:32.092066 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 18:53:32.092079 kernel: audit: initializing netlink subsys (disabled) Feb 9 18:53:32.092093 kernel: audit: type=2000 audit(1707504811.261:1): state=initialized audit_enabled=0 res=1 Feb 9 18:53:32.092109 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 18:53:32.092122 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 18:53:32.092135 kernel: cpuidle: using governor menu Feb 9 18:53:32.092149 kernel: ACPI: bus type PCI registered Feb 9 18:53:32.092162 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 18:53:32.092176 kernel: dca service started, version 1.12.1 Feb 9 18:53:32.092188 kernel: PCI: Using configuration type 1 for base access Feb 9 18:53:32.092202 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 18:53:32.092216 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 18:53:32.092231 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 18:53:32.092300 kernel: ACPI: Added _OSI(Module Device) Feb 9 18:53:32.092316 kernel: ACPI: Added _OSI(Processor Device) Feb 9 18:53:32.092366 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 18:53:32.092378 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 18:53:32.092390 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 18:53:32.092401 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 18:53:32.092413 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 18:53:32.092424 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Feb 9 18:53:32.092439 kernel: ACPI: Interpreter enabled Feb 9 18:53:32.092451 kernel: ACPI: PM: (supports S0 S5) Feb 9 18:53:32.092462 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 18:53:32.092475 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 18:53:32.092487 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Feb 9 18:53:32.092498 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 9 18:53:32.092703 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 9 18:53:32.092852 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 9 18:53:32.092872 kernel: acpiphp: Slot [3] registered Feb 9 18:53:32.092886 kernel: acpiphp: Slot [4] registered Feb 9 18:53:32.092899 kernel: acpiphp: Slot [5] registered Feb 9 18:53:32.092913 kernel: acpiphp: Slot [6] registered Feb 9 18:53:32.092926 kernel: acpiphp: Slot [7] registered Feb 9 18:53:32.092940 kernel: acpiphp: Slot [8] registered Feb 9 18:53:32.092953 kernel: acpiphp: Slot [9] registered Feb 9 18:53:32.092966 kernel: acpiphp: Slot [10] registered Feb 9 18:53:32.092980 kernel: acpiphp: Slot [11] registered Feb 9 18:53:32.092996 kernel: acpiphp: Slot [12] registered Feb 9 18:53:32.093010 kernel: acpiphp: Slot [13] registered Feb 9 18:53:32.093023 kernel: acpiphp: Slot [14] registered Feb 9 18:53:32.093036 kernel: acpiphp: Slot [15] registered Feb 9 18:53:32.093049 kernel: acpiphp: Slot [16] registered Feb 9 18:53:32.093122 kernel: acpiphp: Slot [17] registered Feb 9 18:53:32.093140 kernel: acpiphp: Slot [18] registered Feb 9 18:53:32.093154 kernel: acpiphp: Slot [19] registered Feb 9 18:53:32.093169 kernel: acpiphp: Slot [20] registered Feb 9 18:53:32.093197 kernel: acpiphp: Slot [21] registered Feb 9 18:53:32.093209 kernel: acpiphp: Slot [22] registered Feb 9 18:53:32.093221 kernel: acpiphp: Slot [23] registered Feb 9 18:53:32.093235 kernel: acpiphp: Slot [24] registered Feb 9 18:53:32.093249 kernel: acpiphp: Slot [25] registered Feb 9 18:53:32.093264 kernel: acpiphp: Slot [26] registered Feb 9 18:53:32.093276 kernel: acpiphp: Slot [27] registered Feb 9 18:53:32.093289 kernel: acpiphp: Slot [28] registered Feb 9 18:53:32.093303 kernel: acpiphp: Slot [29] registered Feb 9 18:53:32.093513 kernel: acpiphp: Slot [30] registered Feb 9 18:53:32.093538 kernel: acpiphp: Slot [31] registered Feb 9 18:53:32.093577 kernel: PCI host bridge to bus 0000:00 Feb 9 18:53:32.093816 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 18:53:32.094073 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 18:53:32.094441 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 18:53:32.094624 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Feb 9 18:53:32.094730 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 9 18:53:32.094919 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 9 18:53:32.095110 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 9 18:53:32.095434 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Feb 9 18:53:32.095679 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Feb 9 18:53:32.095819 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Feb 9 18:53:32.095946 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Feb 9 18:53:32.096271 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Feb 9 18:53:32.096672 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Feb 9 18:53:32.096837 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Feb 9 18:53:32.097293 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Feb 9 18:53:32.097549 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Feb 9 18:53:32.097844 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Feb 9 18:53:32.098182 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Feb 9 18:53:32.098317 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Feb 9 18:53:32.098461 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 18:53:32.098596 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Feb 9 18:53:32.098776 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Feb 9 18:53:32.098924 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Feb 9 18:53:32.099100 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Feb 9 18:53:32.099119 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 9 18:53:32.099137 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 9 18:53:32.099150 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 9 18:53:32.099163 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 9 18:53:32.099177 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 9 18:53:32.099191 kernel: iommu: Default domain type: Translated Feb 9 18:53:32.099204 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 18:53:32.105432 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Feb 9 18:53:32.105951 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 18:53:32.106098 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Feb 9 18:53:32.106124 kernel: vgaarb: loaded Feb 9 18:53:32.106139 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 18:53:32.106153 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 18:53:32.106167 kernel: PTP clock support registered Feb 9 18:53:32.106181 kernel: PCI: Using ACPI for IRQ routing Feb 9 18:53:32.106279 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 18:53:32.106294 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 9 18:53:32.106307 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Feb 9 18:53:32.106336 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Feb 9 18:53:32.106350 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Feb 9 18:53:32.106363 kernel: clocksource: Switched to clocksource kvm-clock Feb 9 18:53:32.106376 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 18:53:32.106390 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 18:53:32.106404 kernel: pnp: PnP ACPI init Feb 9 18:53:32.106417 kernel: pnp: PnP ACPI: found 5 devices Feb 9 18:53:32.106431 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 18:53:32.106445 kernel: NET: Registered PF_INET protocol family Feb 9 18:53:32.106462 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 18:53:32.106476 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Feb 9 18:53:32.106490 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 18:53:32.106503 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 18:53:32.106517 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 9 18:53:32.106529 kernel: TCP: Hash tables configured (established 16384 bind 16384) Feb 9 18:53:32.106543 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 9 18:53:32.106555 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 9 18:53:32.106568 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 18:53:32.106584 kernel: NET: Registered PF_XDP protocol family Feb 9 18:53:32.106712 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 18:53:32.106824 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 18:53:32.106930 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 18:53:32.107038 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Feb 9 18:53:32.107188 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 9 18:53:32.110407 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 9 18:53:32.110444 kernel: PCI: CLS 0 bytes, default 64 Feb 9 18:53:32.110459 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 9 18:53:32.110473 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240933eba6e, max_idle_ns: 440795246008 ns Feb 9 18:53:32.110486 kernel: clocksource: Switched to clocksource tsc Feb 9 18:53:32.110500 kernel: Initialise system trusted keyrings Feb 9 18:53:32.110562 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Feb 9 18:53:32.110578 kernel: Key type asymmetric registered Feb 9 18:53:32.110592 kernel: Asymmetric key parser 'x509' registered Feb 9 18:53:32.110604 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 18:53:32.110622 kernel: io scheduler mq-deadline registered Feb 9 18:53:32.110634 kernel: io scheduler kyber registered Feb 9 18:53:32.110647 kernel: io scheduler bfq registered Feb 9 18:53:32.110661 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 18:53:32.110674 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 18:53:32.110688 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 18:53:32.110702 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 9 18:53:32.110715 kernel: i8042: Warning: Keylock active Feb 9 18:53:32.110728 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 9 18:53:32.110744 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 9 18:53:32.110894 kernel: rtc_cmos 00:00: RTC can wake from S4 Feb 9 18:53:32.111010 kernel: rtc_cmos 00:00: registered as rtc0 Feb 9 18:53:32.111188 kernel: rtc_cmos 00:00: setting system clock to 2024-02-09T18:53:31 UTC (1707504811) Feb 9 18:53:32.111441 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Feb 9 18:53:32.111462 kernel: intel_pstate: CPU model not supported Feb 9 18:53:32.111476 kernel: NET: Registered PF_INET6 protocol family Feb 9 18:53:32.111490 kernel: Segment Routing with IPv6 Feb 9 18:53:32.111544 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 18:53:32.111560 kernel: NET: Registered PF_PACKET protocol family Feb 9 18:53:32.111573 kernel: Key type dns_resolver registered Feb 9 18:53:32.111661 kernel: IPI shorthand broadcast: enabled Feb 9 18:53:32.111678 kernel: sched_clock: Marking stable (468483449, 303007275)->(911403713, -139912989) Feb 9 18:53:32.111692 kernel: registered taskstats version 1 Feb 9 18:53:32.111705 kernel: Loading compiled-in X.509 certificates Feb 9 18:53:32.111751 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 9 18:53:32.111767 kernel: Key type .fscrypt registered Feb 9 18:53:32.111784 kernel: Key type fscrypt-provisioning registered Feb 9 18:53:32.111829 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 18:53:32.111847 kernel: ima: Allocated hash algorithm: sha1 Feb 9 18:53:32.111862 kernel: ima: No architecture policies found Feb 9 18:53:32.111875 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 18:53:32.111920 kernel: Write protecting the kernel read-only data: 28672k Feb 9 18:53:32.111937 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 18:53:32.111951 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 18:53:32.111965 kernel: Run /init as init process Feb 9 18:53:32.112015 kernel: with arguments: Feb 9 18:53:32.112030 kernel: /init Feb 9 18:53:32.112044 kernel: with environment: Feb 9 18:53:32.112057 kernel: HOME=/ Feb 9 18:53:32.112104 kernel: TERM=linux Feb 9 18:53:32.112376 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 18:53:32.112397 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 18:53:32.112449 systemd[1]: Detected virtualization amazon. Feb 9 18:53:32.112470 systemd[1]: Detected architecture x86-64. Feb 9 18:53:32.112484 systemd[1]: Running in initrd. Feb 9 18:53:32.112530 systemd[1]: No hostname configured, using default hostname. Feb 9 18:53:32.112548 systemd[1]: Hostname set to . Feb 9 18:53:32.112581 systemd[1]: Initializing machine ID from VM UUID. Feb 9 18:53:32.112634 systemd[1]: Queued start job for default target initrd.target. Feb 9 18:53:32.112649 systemd[1]: Started systemd-ask-password-console.path. Feb 9 18:53:32.112739 systemd[1]: Reached target cryptsetup.target. Feb 9 18:53:32.112756 systemd[1]: Reached target paths.target. Feb 9 18:53:32.112770 systemd[1]: Reached target slices.target. Feb 9 18:53:32.112783 systemd[1]: Reached target swap.target. Feb 9 18:53:32.112833 systemd[1]: Reached target timers.target. Feb 9 18:53:32.112850 systemd[1]: Listening on iscsid.socket. Feb 9 18:53:32.112868 systemd[1]: Listening on iscsiuio.socket. Feb 9 18:53:32.112916 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 18:53:32.112933 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 18:53:32.112949 systemd[1]: Listening on systemd-journald.socket. Feb 9 18:53:32.112997 systemd[1]: Listening on systemd-networkd.socket. Feb 9 18:53:32.113017 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 18:53:32.113033 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 18:53:32.113080 systemd[1]: Reached target sockets.target. Feb 9 18:53:32.113099 systemd[1]: Starting kmod-static-nodes.service... Feb 9 18:53:32.113117 systemd[1]: Finished network-cleanup.service. Feb 9 18:53:32.113132 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 18:53:32.113181 systemd[1]: Starting systemd-journald.service... Feb 9 18:53:32.113197 systemd[1]: Starting systemd-modules-load.service... Feb 9 18:53:32.113213 systemd[1]: Starting systemd-resolved.service... Feb 9 18:53:32.113294 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 18:53:32.113351 systemd[1]: Finished kmod-static-nodes.service. Feb 9 18:53:32.113370 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 18:53:32.113385 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 18:53:32.113438 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 9 18:53:32.113455 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 18:53:32.113476 systemd-journald[185]: Journal started Feb 9 18:53:32.113697 systemd-journald[185]: Runtime Journal (/run/log/journal/ec2e8c6341421ee3e55b2738d2445c12) is 4.8M, max 38.7M, 33.9M free. Feb 9 18:53:32.080448 systemd-resolved[187]: Positive Trust Anchors: Feb 9 18:53:32.261660 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 18:53:32.261695 kernel: Bridge firewalling registered Feb 9 18:53:32.261717 kernel: SCSI subsystem initialized Feb 9 18:53:32.261733 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 18:53:32.261751 kernel: device-mapper: uevent: version 1.0.3 Feb 9 18:53:32.261771 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 18:53:32.080462 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 18:53:32.270525 systemd[1]: Started systemd-resolved.service. Feb 9 18:53:32.270607 kernel: audit: type=1130 audit(1707504812.263:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:32.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:32.080513 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 18:53:32.086744 systemd-resolved[187]: Defaulting to hostname 'linux'. Feb 9 18:53:32.296244 systemd[1]: Started systemd-journald.service. Feb 9 18:53:32.296285 kernel: audit: type=1130 audit(1707504812.278:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:32.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:32.090939 systemd-modules-load[186]: Inserted module 'overlay' Feb 9 18:53:32.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:32.306409 kernel: audit: type=1130 audit(1707504812.296:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:32.142933 systemd-modules-load[186]: Inserted module 'br_netfilter' Feb 9 18:53:32.313351 kernel: audit: type=1130 audit(1707504812.307:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:32.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:32.194909 systemd-modules-load[186]: Inserted module 'dm_multipath' Feb 9 18:53:32.297846 systemd[1]: Finished systemd-modules-load.service. Feb 9 18:53:32.314737 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 18:53:32.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:32.317447 systemd[1]: Reached target nss-lookup.target. Feb 9 18:53:32.325451 kernel: audit: type=1130 audit(1707504812.314:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:32.326013 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 18:53:32.328953 systemd[1]: Starting systemd-sysctl.service... Feb 9 18:53:32.347619 systemd[1]: Finished systemd-sysctl.service. Feb 9 18:53:32.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:32.354344 kernel: audit: type=1130 audit(1707504812.347:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:32.354483 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 18:53:32.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:32.357641 systemd[1]: Starting dracut-cmdline.service... Feb 9 18:53:32.368158 kernel: audit: type=1130 audit(1707504812.356:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:32.374404 dracut-cmdline[206]: dracut-dracut-053 Feb 9 18:53:32.377177 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 18:53:32.451352 kernel: Loading iSCSI transport class v2.0-870. Feb 9 18:53:32.466351 kernel: iscsi: registered transport (tcp) Feb 9 18:53:32.490441 kernel: iscsi: registered transport (qla4xxx) Feb 9 18:53:32.490513 kernel: QLogic iSCSI HBA Driver Feb 9 18:53:32.526386 systemd[1]: Finished dracut-cmdline.service. Feb 9 18:53:32.534540 kernel: audit: type=1130 audit(1707504812.527:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:32.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:32.528570 systemd[1]: Starting dracut-pre-udev.service... Feb 9 18:53:32.604500 kernel: raid6: avx512x4 gen() 9506 MB/s Feb 9 18:53:32.621665 kernel: raid6: avx512x4 xor() 4927 MB/s Feb 9 18:53:32.639881 kernel: raid6: avx512x2 gen() 6360 MB/s Feb 9 18:53:32.657380 kernel: raid6: avx512x2 xor() 12222 MB/s Feb 9 18:53:32.674386 kernel: raid6: avx512x1 gen() 12408 MB/s Feb 9 18:53:32.691378 kernel: raid6: avx512x1 xor() 16269 MB/s Feb 9 18:53:32.709359 kernel: raid6: avx2x4 gen() 13148 MB/s Feb 9 18:53:32.727372 kernel: raid6: avx2x4 xor() 6069 MB/s Feb 9 18:53:32.745358 kernel: raid6: avx2x2 gen() 15322 MB/s Feb 9 18:53:32.762367 kernel: raid6: avx2x2 xor() 14283 MB/s Feb 9 18:53:32.781669 kernel: raid6: avx2x1 gen() 11242 MB/s Feb 9 18:53:32.799376 kernel: raid6: avx2x1 xor() 7656 MB/s Feb 9 18:53:32.817418 kernel: raid6: sse2x4 gen() 7725 MB/s Feb 9 18:53:32.834416 kernel: raid6: sse2x4 xor() 5303 MB/s Feb 9 18:53:32.851373 kernel: raid6: sse2x2 gen() 9635 MB/s Feb 9 18:53:32.869355 kernel: raid6: sse2x2 xor() 5531 MB/s Feb 9 18:53:32.887361 kernel: raid6: sse2x1 gen() 8510 MB/s Feb 9 18:53:32.905644 kernel: raid6: sse2x1 xor() 4190 MB/s Feb 9 18:53:32.905744 kernel: raid6: using algorithm avx2x2 gen() 15322 MB/s Feb 9 18:53:32.905760 kernel: raid6: .... xor() 14283 MB/s, rmw enabled Feb 9 18:53:32.906646 kernel: raid6: using avx512x2 recovery algorithm Feb 9 18:53:32.933722 kernel: xor: automatically using best checksumming function avx Feb 9 18:53:33.137498 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 18:53:33.148891 systemd[1]: Finished dracut-pre-udev.service. Feb 9 18:53:33.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:33.155425 kernel: audit: type=1130 audit(1707504813.148:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:33.151394 systemd[1]: Starting systemd-udevd.service... Feb 9 18:53:33.150000 audit: BPF prog-id=7 op=LOAD Feb 9 18:53:33.150000 audit: BPF prog-id=8 op=LOAD Feb 9 18:53:33.172851 systemd-udevd[383]: Using default interface naming scheme 'v252'. Feb 9 18:53:33.183051 systemd[1]: Started systemd-udevd.service. Feb 9 18:53:33.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:33.185282 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 18:53:33.207687 dracut-pre-trigger[388]: rd.md=0: removing MD RAID activation Feb 9 18:53:33.241688 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 18:53:33.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:33.244651 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 18:53:33.296676 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 18:53:33.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:33.346121 kernel: ena 0000:00:05.0: ENA device version: 0.10 Feb 9 18:53:33.346371 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Feb 9 18:53:33.368350 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Feb 9 18:53:33.368583 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 18:53:33.381341 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:6c:3c:5b:73:93 Feb 9 18:53:33.388698 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 18:53:33.388759 kernel: AES CTR mode by8 optimization enabled Feb 9 18:53:33.397701 kernel: nvme nvme0: pci function 0000:00:04.0 Feb 9 18:53:33.397981 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Feb 9 18:53:33.399313 (udev-worker)[439]: Network interface NamePolicy= disabled on kernel command line. Feb 9 18:53:33.552124 kernel: nvme nvme0: 2/0/0 default/read/poll queues Feb 9 18:53:33.552370 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 18:53:33.552390 kernel: GPT:9289727 != 16777215 Feb 9 18:53:33.552407 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 18:53:33.552425 kernel: GPT:9289727 != 16777215 Feb 9 18:53:33.552443 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 18:53:33.552461 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 18:53:33.552478 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (435) Feb 9 18:53:33.528895 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 18:53:33.575364 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 18:53:33.615550 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 18:53:33.615685 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 18:53:33.625953 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 18:53:33.627146 systemd[1]: Starting disk-uuid.service... Feb 9 18:53:33.639295 disk-uuid[593]: Primary Header is updated. Feb 9 18:53:33.639295 disk-uuid[593]: Secondary Entries is updated. Feb 9 18:53:33.639295 disk-uuid[593]: Secondary Header is updated. Feb 9 18:53:33.654394 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 18:53:33.662349 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 18:53:33.675384 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 18:53:34.670186 disk-uuid[594]: The operation has completed successfully. Feb 9 18:53:34.674854 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 18:53:34.843594 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 18:53:34.843726 systemd[1]: Finished disk-uuid.service. Feb 9 18:53:34.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:34.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:34.847717 systemd[1]: Starting verity-setup.service... Feb 9 18:53:34.873837 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 18:53:34.978803 systemd[1]: Found device dev-mapper-usr.device. Feb 9 18:53:34.982041 systemd[1]: Mounting sysusr-usr.mount... Feb 9 18:53:34.987985 systemd[1]: Finished verity-setup.service. Feb 9 18:53:34.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:35.114537 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 18:53:35.115305 systemd[1]: Mounted sysusr-usr.mount. Feb 9 18:53:35.116472 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 18:53:35.117441 systemd[1]: Starting ignition-setup.service... Feb 9 18:53:35.123730 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 18:53:35.159538 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Feb 9 18:53:35.159604 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 9 18:53:35.159617 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 9 18:53:35.169348 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 9 18:53:35.188224 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 18:53:35.222516 systemd[1]: Finished ignition-setup.service. Feb 9 18:53:35.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:35.226337 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 18:53:35.248429 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 18:53:35.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:35.252000 audit: BPF prog-id=9 op=LOAD Feb 9 18:53:35.253274 systemd[1]: Starting systemd-networkd.service... Feb 9 18:53:35.294440 systemd-networkd[1106]: lo: Link UP Feb 9 18:53:35.294451 systemd-networkd[1106]: lo: Gained carrier Feb 9 18:53:35.295480 systemd-networkd[1106]: Enumeration completed Feb 9 18:53:35.295738 systemd-networkd[1106]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 18:53:35.299228 systemd[1]: Started systemd-networkd.service. Feb 9 18:53:35.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:35.307936 systemd[1]: Reached target network.target. Feb 9 18:53:35.318195 systemd[1]: Starting iscsiuio.service... Feb 9 18:53:35.322442 systemd-networkd[1106]: eth0: Link UP Feb 9 18:53:35.322453 systemd-networkd[1106]: eth0: Gained carrier Feb 9 18:53:35.327719 systemd[1]: Started iscsiuio.service. Feb 9 18:53:35.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:35.330307 systemd[1]: Starting iscsid.service... Feb 9 18:53:35.334920 iscsid[1111]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 18:53:35.334920 iscsid[1111]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 18:53:35.334920 iscsid[1111]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 18:53:35.334920 iscsid[1111]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 18:53:35.334920 iscsid[1111]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 18:53:35.334920 iscsid[1111]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 18:53:35.351682 systemd[1]: Started iscsid.service. Feb 9 18:53:35.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:35.357211 systemd[1]: Starting dracut-initqueue.service... Feb 9 18:53:35.369531 systemd-networkd[1106]: eth0: DHCPv4 address 172.31.21.122/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 9 18:53:35.382803 systemd[1]: Finished dracut-initqueue.service. Feb 9 18:53:35.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:35.385880 systemd[1]: Reached target remote-fs-pre.target. Feb 9 18:53:35.389847 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 18:53:35.391048 systemd[1]: Reached target remote-fs.target. Feb 9 18:53:35.394687 systemd[1]: Starting dracut-pre-mount.service... Feb 9 18:53:35.420845 systemd[1]: Finished dracut-pre-mount.service. Feb 9 18:53:35.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:36.051908 ignition[1088]: Ignition 2.14.0 Feb 9 18:53:36.051925 ignition[1088]: Stage: fetch-offline Feb 9 18:53:36.052076 ignition[1088]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:53:36.052121 ignition[1088]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 18:53:36.079086 ignition[1088]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 18:53:36.080902 ignition[1088]: Ignition finished successfully Feb 9 18:53:36.083097 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 18:53:36.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:36.085473 systemd[1]: Starting ignition-fetch.service... Feb 9 18:53:36.095451 ignition[1130]: Ignition 2.14.0 Feb 9 18:53:36.095462 ignition[1130]: Stage: fetch Feb 9 18:53:36.095603 ignition[1130]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:53:36.095626 ignition[1130]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 18:53:36.103178 ignition[1130]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 18:53:36.105104 ignition[1130]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 18:53:36.112396 ignition[1130]: INFO : PUT result: OK Feb 9 18:53:36.114989 ignition[1130]: DEBUG : parsed url from cmdline: "" Feb 9 18:53:36.114989 ignition[1130]: INFO : no config URL provided Feb 9 18:53:36.114989 ignition[1130]: INFO : reading system config file "/usr/lib/ignition/user.ign" Feb 9 18:53:36.114989 ignition[1130]: INFO : no config at "/usr/lib/ignition/user.ign" Feb 9 18:53:36.114989 ignition[1130]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 18:53:36.121941 ignition[1130]: INFO : PUT result: OK Feb 9 18:53:36.121941 ignition[1130]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Feb 9 18:53:36.121941 ignition[1130]: INFO : GET result: OK Feb 9 18:53:36.121941 ignition[1130]: DEBUG : parsing config with SHA512: b6b34685c9706012ba813921eb4b8730ceceb7b059e750170734ffd8a8ffb88dcf3222202f845a6618a5e860cf1a4a2bdcc0bc90444d87512366aa1036e22641 Feb 9 18:53:36.162735 unknown[1130]: fetched base config from "system" Feb 9 18:53:36.162745 unknown[1130]: fetched base config from "system" Feb 9 18:53:36.162751 unknown[1130]: fetched user config from "aws" Feb 9 18:53:36.166756 ignition[1130]: fetch: fetch complete Feb 9 18:53:36.166765 ignition[1130]: fetch: fetch passed Feb 9 18:53:36.167537 ignition[1130]: Ignition finished successfully Feb 9 18:53:36.171382 systemd[1]: Finished ignition-fetch.service. Feb 9 18:53:36.185894 kernel: kauditd_printk_skb: 17 callbacks suppressed Feb 9 18:53:36.185920 kernel: audit: type=1130 audit(1707504816.171:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:36.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:36.172455 systemd[1]: Starting ignition-kargs.service... Feb 9 18:53:36.193791 ignition[1136]: Ignition 2.14.0 Feb 9 18:53:36.193806 ignition[1136]: Stage: kargs Feb 9 18:53:36.194118 ignition[1136]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:53:36.194149 ignition[1136]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 18:53:36.211025 ignition[1136]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 18:53:36.212777 ignition[1136]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 18:53:36.218211 ignition[1136]: INFO : PUT result: OK Feb 9 18:53:36.222358 ignition[1136]: kargs: kargs passed Feb 9 18:53:36.222561 ignition[1136]: Ignition finished successfully Feb 9 18:53:36.227093 systemd[1]: Finished ignition-kargs.service. Feb 9 18:53:36.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:36.228360 systemd[1]: Starting ignition-disks.service... Feb 9 18:53:36.237116 kernel: audit: type=1130 audit(1707504816.226:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:36.242024 ignition[1142]: Ignition 2.14.0 Feb 9 18:53:36.242038 ignition[1142]: Stage: disks Feb 9 18:53:36.242245 ignition[1142]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:53:36.242275 ignition[1142]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 18:53:36.252431 ignition[1142]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 18:53:36.253925 ignition[1142]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 18:53:36.255951 ignition[1142]: INFO : PUT result: OK Feb 9 18:53:36.259382 ignition[1142]: disks: disks passed Feb 9 18:53:36.259436 ignition[1142]: Ignition finished successfully Feb 9 18:53:36.261529 systemd[1]: Finished ignition-disks.service. Feb 9 18:53:36.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:36.263062 systemd[1]: Reached target initrd-root-device.target. Feb 9 18:53:36.268519 kernel: audit: type=1130 audit(1707504816.262:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:36.271078 systemd[1]: Reached target local-fs-pre.target. Feb 9 18:53:36.273735 systemd[1]: Reached target local-fs.target. Feb 9 18:53:36.273839 systemd[1]: Reached target sysinit.target. Feb 9 18:53:36.279054 systemd[1]: Reached target basic.target. Feb 9 18:53:36.283314 systemd[1]: Starting systemd-fsck-root.service... Feb 9 18:53:36.333012 systemd-fsck[1150]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 9 18:53:36.339115 systemd[1]: Finished systemd-fsck-root.service. Feb 9 18:53:36.353753 kernel: audit: type=1130 audit(1707504816.340:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:36.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:36.352706 systemd[1]: Mounting sysroot.mount... Feb 9 18:53:36.384297 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 18:53:36.384163 systemd[1]: Mounted sysroot.mount. Feb 9 18:53:36.385650 systemd[1]: Reached target initrd-root-fs.target. Feb 9 18:53:36.401093 systemd[1]: Mounting sysroot-usr.mount... Feb 9 18:53:36.402729 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 9 18:53:36.402805 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 18:53:36.402838 systemd[1]: Reached target ignition-diskful.target. Feb 9 18:53:36.419807 systemd[1]: Mounted sysroot-usr.mount. Feb 9 18:53:36.432373 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 18:53:36.436201 systemd[1]: Starting initrd-setup-root.service... Feb 9 18:53:36.454122 initrd-setup-root[1172]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 18:53:36.462351 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1167) Feb 9 18:53:36.467863 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Feb 9 18:53:36.467914 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 9 18:53:36.467927 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 9 18:53:36.471228 initrd-setup-root[1196]: cut: /sysroot/etc/group: No such file or directory Feb 9 18:53:36.477342 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 9 18:53:36.480563 initrd-setup-root[1206]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 18:53:36.481467 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 18:53:36.494171 initrd-setup-root[1214]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 18:53:36.569831 systemd-networkd[1106]: eth0: Gained IPv6LL Feb 9 18:53:36.691709 systemd[1]: Finished initrd-setup-root.service. Feb 9 18:53:36.701371 kernel: audit: type=1130 audit(1707504816.691:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:36.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:36.693280 systemd[1]: Starting ignition-mount.service... Feb 9 18:53:36.704799 systemd[1]: Starting sysroot-boot.service... Feb 9 18:53:36.709424 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 18:53:36.709541 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 18:53:36.738378 ignition[1232]: INFO : Ignition 2.14.0 Feb 9 18:53:36.738378 ignition[1232]: INFO : Stage: mount Feb 9 18:53:36.741018 ignition[1232]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:53:36.741018 ignition[1232]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 18:53:36.757786 ignition[1232]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 18:53:36.759481 ignition[1232]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 18:53:36.760998 ignition[1232]: INFO : PUT result: OK Feb 9 18:53:36.766184 ignition[1232]: INFO : mount: mount passed Feb 9 18:53:36.767173 ignition[1232]: INFO : Ignition finished successfully Feb 9 18:53:36.768126 systemd[1]: Finished ignition-mount.service. Feb 9 18:53:36.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:36.772872 systemd[1]: Finished sysroot-boot.service. Feb 9 18:53:36.776335 kernel: audit: type=1130 audit(1707504816.770:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:36.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:36.779744 systemd[1]: Starting ignition-files.service... Feb 9 18:53:36.786466 kernel: audit: type=1130 audit(1707504816.777:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:36.791503 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 18:53:36.819353 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1242) Feb 9 18:53:36.823507 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Feb 9 18:53:36.823575 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 9 18:53:36.823603 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 9 18:53:36.838357 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 9 18:53:36.842498 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 18:53:36.867898 ignition[1261]: INFO : Ignition 2.14.0 Feb 9 18:53:36.867898 ignition[1261]: INFO : Stage: files Feb 9 18:53:36.871339 ignition[1261]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:53:36.871339 ignition[1261]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 18:53:36.883369 ignition[1261]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 18:53:36.885759 ignition[1261]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 18:53:36.887421 ignition[1261]: INFO : PUT result: OK Feb 9 18:53:36.892542 ignition[1261]: DEBUG : files: compiled without relabeling support, skipping Feb 9 18:53:36.899527 ignition[1261]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 18:53:36.901848 ignition[1261]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 18:53:36.924334 ignition[1261]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 18:53:36.924334 ignition[1261]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 18:53:36.934119 unknown[1261]: wrote ssh authorized keys file for user: core Feb 9 18:53:36.935990 ignition[1261]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 18:53:36.935990 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 18:53:36.935990 ignition[1261]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 9 18:53:37.403042 ignition[1261]: INFO : GET result: OK Feb 9 18:53:37.710410 ignition[1261]: DEBUG : file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 9 18:53:37.713276 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 18:53:37.713276 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 18:53:37.713276 ignition[1261]: INFO : GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 9 18:53:37.787365 ignition[1261]: INFO : GET result: OK Feb 9 18:53:37.934631 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 18:53:37.937283 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 18:53:37.937283 ignition[1261]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 9 18:53:38.314192 ignition[1261]: INFO : GET result: OK Feb 9 18:53:38.467688 ignition[1261]: DEBUG : file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 9 18:53:38.470819 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 18:53:38.470819 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 18:53:38.475796 ignition[1261]: INFO : GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubectl: attempt #1 Feb 9 18:53:38.580541 ignition[1261]: INFO : GET result: OK Feb 9 18:53:38.905910 ignition[1261]: DEBUG : file matches expected sum of: 857e67001e74840518413593d90c6e64ad3f00d55fa44ad9a8e2ed6135392c908caff7ec19af18cbe10784b8f83afe687a0bc3bacbc9eee984cdeb9c0749cb83 Feb 9 18:53:38.908836 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 18:53:38.908836 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 9 18:53:38.908836 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 18:53:38.924068 ignition[1261]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1676284011" Feb 9 18:53:38.926000 ignition[1261]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1676284011": device or resource busy Feb 9 18:53:38.926000 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1676284011", trying btrfs: device or resource busy Feb 9 18:53:38.926000 ignition[1261]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1676284011" Feb 9 18:53:38.940796 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1264) Feb 9 18:53:38.940821 ignition[1261]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1676284011" Feb 9 18:53:38.943589 ignition[1261]: INFO : op(3): [started] unmounting "/mnt/oem1676284011" Feb 9 18:53:38.945358 ignition[1261]: INFO : op(3): [finished] unmounting "/mnt/oem1676284011" Feb 9 18:53:38.946798 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 9 18:53:38.946798 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 18:53:38.946798 ignition[1261]: INFO : GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Feb 9 18:53:38.955762 systemd[1]: mnt-oem1676284011.mount: Deactivated successfully. Feb 9 18:53:39.009601 ignition[1261]: INFO : GET result: OK Feb 9 18:53:41.566572 ignition[1261]: DEBUG : file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Feb 9 18:53:41.571353 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 18:53:41.571353 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 18:53:41.571353 ignition[1261]: INFO : GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Feb 9 18:53:41.846426 ignition[1261]: INFO : GET result: OK Feb 9 18:53:56.342592 ignition[1261]: DEBUG : file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Feb 9 18:53:56.346489 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 18:53:56.346489 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 18:53:56.346489 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 18:53:56.346489 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" Feb 9 18:53:56.346489 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 18:53:56.346489 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 18:53:56.346489 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 18:53:56.346489 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 18:53:56.346489 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 18:53:56.346489 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 18:53:56.346489 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 18:53:56.346489 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 18:53:56.346489 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 18:53:56.346489 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 18:53:56.346489 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 18:53:56.422798 ignition[1261]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1778691491" Feb 9 18:53:56.422798 ignition[1261]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1778691491": device or resource busy Feb 9 18:53:56.422798 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1778691491", trying btrfs: device or resource busy Feb 9 18:53:56.422798 ignition[1261]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1778691491" Feb 9 18:53:56.422798 ignition[1261]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1778691491" Feb 9 18:53:56.422798 ignition[1261]: INFO : op(6): [started] unmounting "/mnt/oem1778691491" Feb 9 18:53:56.422798 ignition[1261]: INFO : op(6): [finished] unmounting "/mnt/oem1778691491" Feb 9 18:53:56.422798 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 18:53:56.422798 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 9 18:53:56.422798 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 18:53:56.413967 systemd[1]: mnt-oem1778691491.mount: Deactivated successfully. Feb 9 18:53:56.453945 ignition[1261]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem690124038" Feb 9 18:53:56.453945 ignition[1261]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem690124038": device or resource busy Feb 9 18:53:56.453945 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem690124038", trying btrfs: device or resource busy Feb 9 18:53:56.453945 ignition[1261]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem690124038" Feb 9 18:53:56.453945 ignition[1261]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem690124038" Feb 9 18:53:56.453945 ignition[1261]: INFO : op(9): [started] unmounting "/mnt/oem690124038" Feb 9 18:53:56.453945 ignition[1261]: INFO : op(9): [finished] unmounting "/mnt/oem690124038" Feb 9 18:53:56.453945 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 9 18:53:56.470539 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 9 18:53:56.470539 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 18:53:56.461087 systemd[1]: mnt-oem690124038.mount: Deactivated successfully. Feb 9 18:53:56.480027 ignition[1261]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4178246660" Feb 9 18:53:56.482418 ignition[1261]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4178246660": device or resource busy Feb 9 18:53:56.482418 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4178246660", trying btrfs: device or resource busy Feb 9 18:53:56.482418 ignition[1261]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4178246660" Feb 9 18:53:56.491476 ignition[1261]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4178246660" Feb 9 18:53:56.493659 ignition[1261]: INFO : op(c): [started] unmounting "/mnt/oem4178246660" Feb 9 18:53:56.498414 ignition[1261]: INFO : op(c): [finished] unmounting "/mnt/oem4178246660" Feb 9 18:53:56.501435 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 9 18:53:56.501435 ignition[1261]: INFO : files: op(13): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 18:53:56.501435 ignition[1261]: INFO : files: op(13): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 18:53:56.501435 ignition[1261]: INFO : files: op(14): [started] processing unit "amazon-ssm-agent.service" Feb 9 18:53:56.501435 ignition[1261]: INFO : files: op(14): op(15): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 9 18:53:56.501435 ignition[1261]: INFO : files: op(14): op(15): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 9 18:53:56.501435 ignition[1261]: INFO : files: op(14): [finished] processing unit "amazon-ssm-agent.service" Feb 9 18:53:56.501435 ignition[1261]: INFO : files: op(16): [started] processing unit "nvidia.service" Feb 9 18:53:56.501435 ignition[1261]: INFO : files: op(16): [finished] processing unit "nvidia.service" Feb 9 18:53:56.501435 ignition[1261]: INFO : files: op(17): [started] processing unit "prepare-cni-plugins.service" Feb 9 18:53:56.501435 ignition[1261]: INFO : files: op(17): op(18): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 18:53:56.501435 ignition[1261]: INFO : files: op(17): op(18): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 18:53:56.501435 ignition[1261]: INFO : files: op(17): [finished] processing unit "prepare-cni-plugins.service" Feb 9 18:53:56.501435 ignition[1261]: INFO : files: op(19): [started] processing unit "prepare-critools.service" Feb 9 18:53:56.501435 ignition[1261]: INFO : files: op(19): op(1a): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 18:53:56.501435 ignition[1261]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 18:53:56.501435 ignition[1261]: INFO : files: op(19): [finished] processing unit "prepare-critools.service" Feb 9 18:53:56.501435 ignition[1261]: INFO : files: op(1b): [started] processing unit "prepare-helm.service" Feb 9 18:53:56.501435 ignition[1261]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 18:53:56.559935 kernel: audit: type=1130 audit(1707504836.539:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.560038 ignition[1261]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 18:53:56.560038 ignition[1261]: INFO : files: op(1b): [finished] processing unit "prepare-helm.service" Feb 9 18:53:56.560038 ignition[1261]: INFO : files: op(1d): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 18:53:56.560038 ignition[1261]: INFO : files: op(1d): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 18:53:56.560038 ignition[1261]: INFO : files: op(1e): [started] setting preset to enabled for "prepare-critools.service" Feb 9 18:53:56.560038 ignition[1261]: INFO : files: op(1e): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 18:53:56.560038 ignition[1261]: INFO : files: op(1f): [started] setting preset to enabled for "prepare-helm.service" Feb 9 18:53:56.560038 ignition[1261]: INFO : files: op(1f): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 18:53:56.560038 ignition[1261]: INFO : files: op(20): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 18:53:56.560038 ignition[1261]: INFO : files: op(20): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 18:53:56.560038 ignition[1261]: INFO : files: op(21): [started] setting preset to enabled for "amazon-ssm-agent.service" Feb 9 18:53:56.560038 ignition[1261]: INFO : files: op(21): [finished] setting preset to enabled for "amazon-ssm-agent.service" Feb 9 18:53:56.560038 ignition[1261]: INFO : files: op(22): [started] setting preset to enabled for "nvidia.service" Feb 9 18:53:56.560038 ignition[1261]: INFO : files: op(22): [finished] setting preset to enabled for "nvidia.service" Feb 9 18:53:56.560038 ignition[1261]: INFO : files: createResultFile: createFiles: op(23): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 18:53:56.560038 ignition[1261]: INFO : files: createResultFile: createFiles: op(23): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 18:53:56.560038 ignition[1261]: INFO : files: files passed Feb 9 18:53:56.560038 ignition[1261]: INFO : Ignition finished successfully Feb 9 18:53:56.603950 kernel: audit: type=1130 audit(1707504836.583:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.603980 kernel: audit: type=1131 audit(1707504836.589:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.524462 systemd[1]: Finished ignition-files.service. Feb 9 18:53:56.570185 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 18:53:56.571521 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 18:53:56.605053 initrd-setup-root-after-ignition[1286]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 18:53:56.572746 systemd[1]: Starting ignition-quench.service... Feb 9 18:53:56.582115 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 18:53:56.582374 systemd[1]: Finished ignition-quench.service. Feb 9 18:53:56.596776 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 18:53:56.602660 systemd[1]: Reached target ignition-complete.target. Feb 9 18:53:56.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.611520 kernel: audit: type=1130 audit(1707504836.598:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.635361 systemd[1]: Starting initrd-parse-etc.service... Feb 9 18:53:56.659316 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 18:53:56.659517 systemd[1]: Finished initrd-parse-etc.service. Feb 9 18:53:56.673486 kernel: audit: type=1130 audit(1707504836.662:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.673515 kernel: audit: type=1131 audit(1707504836.662:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.663095 systemd[1]: Reached target initrd-fs.target. Feb 9 18:53:56.677505 systemd[1]: Reached target initrd.target. Feb 9 18:53:56.679578 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 18:53:56.682396 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 18:53:56.697997 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 18:53:56.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.708359 kernel: audit: type=1130 audit(1707504836.699:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.704518 systemd[1]: Starting initrd-cleanup.service... Feb 9 18:53:56.720085 systemd[1]: Stopped target nss-lookup.target. Feb 9 18:53:56.723046 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 18:53:56.725498 systemd[1]: Stopped target timers.target. Feb 9 18:53:56.728820 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 18:53:56.730690 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 18:53:56.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.733732 systemd[1]: Stopped target initrd.target. Feb 9 18:53:56.741226 kernel: audit: type=1131 audit(1707504836.733:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.741376 systemd[1]: Stopped target basic.target. Feb 9 18:53:56.743374 systemd[1]: Stopped target ignition-complete.target. Feb 9 18:53:56.745452 systemd[1]: Stopped target ignition-diskful.target. Feb 9 18:53:56.747416 systemd[1]: Stopped target initrd-root-device.target. Feb 9 18:53:56.749786 systemd[1]: Stopped target remote-fs.target. Feb 9 18:53:56.752007 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 18:53:56.754042 systemd[1]: Stopped target sysinit.target. Feb 9 18:53:56.756294 systemd[1]: Stopped target local-fs.target. Feb 9 18:53:56.758228 systemd[1]: Stopped target local-fs-pre.target. Feb 9 18:53:56.760618 systemd[1]: Stopped target swap.target. Feb 9 18:53:56.762364 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 18:53:56.763553 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 18:53:56.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.765617 systemd[1]: Stopped target cryptsetup.target. Feb 9 18:53:56.770346 kernel: audit: type=1131 audit(1707504836.765:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.773255 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 18:53:56.774614 systemd[1]: Stopped dracut-initqueue.service. Feb 9 18:53:56.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.776705 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 18:53:56.794716 kernel: audit: type=1131 audit(1707504836.776:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.776816 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 18:53:56.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.799159 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 18:53:56.799329 systemd[1]: Stopped ignition-files.service. Feb 9 18:53:56.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.805816 systemd[1]: Stopping ignition-mount.service... Feb 9 18:53:56.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.832878 iscsid[1111]: iscsid shutting down. Feb 9 18:53:56.808078 systemd[1]: Stopping iscsid.service... Feb 9 18:53:56.810469 systemd[1]: Stopping sysroot-boot.service... Feb 9 18:53:56.813508 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 18:53:56.813980 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 18:53:56.816667 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 18:53:56.816893 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 18:53:56.823058 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 18:53:56.823189 systemd[1]: Stopped iscsid.service. Feb 9 18:53:56.825722 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 18:53:56.825852 systemd[1]: Finished initrd-cleanup.service. Feb 9 18:53:56.828688 systemd[1]: Stopping iscsiuio.service... Feb 9 18:53:56.837706 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 18:53:56.837895 systemd[1]: Stopped iscsiuio.service. Feb 9 18:53:56.859141 ignition[1299]: INFO : Ignition 2.14.0 Feb 9 18:53:56.859141 ignition[1299]: INFO : Stage: umount Feb 9 18:53:56.862657 ignition[1299]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:53:56.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.866079 ignition[1299]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 18:53:56.880354 ignition[1299]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 18:53:56.882602 ignition[1299]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 18:53:56.883143 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 18:53:56.883256 systemd[1]: Stopped sysroot-boot.service. Feb 9 18:53:56.889293 ignition[1299]: INFO : PUT result: OK Feb 9 18:53:56.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.893670 ignition[1299]: INFO : umount: umount passed Feb 9 18:53:56.894776 ignition[1299]: INFO : Ignition finished successfully Feb 9 18:53:56.896861 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 18:53:56.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.896959 systemd[1]: Stopped ignition-mount.service. Feb 9 18:53:56.898102 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 18:53:56.898163 systemd[1]: Stopped ignition-disks.service. Feb 9 18:53:56.904611 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 18:53:56.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.904702 systemd[1]: Stopped ignition-kargs.service. Feb 9 18:53:56.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.908669 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 18:53:56.908742 systemd[1]: Stopped ignition-fetch.service. Feb 9 18:53:56.910971 systemd[1]: Stopped target network.target. Feb 9 18:53:56.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.914957 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 18:53:56.915066 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 18:53:56.918440 systemd[1]: Stopped target paths.target. Feb 9 18:53:56.924030 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 18:53:56.925411 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 18:53:56.928525 systemd[1]: Stopped target slices.target. Feb 9 18:53:56.929528 systemd[1]: Stopped target sockets.target. Feb 9 18:53:56.932831 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 18:53:56.932939 systemd[1]: Closed iscsid.socket. Feb 9 18:53:56.936520 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 18:53:56.936580 systemd[1]: Closed iscsiuio.socket. Feb 9 18:53:56.938973 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 18:53:56.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.939043 systemd[1]: Stopped ignition-setup.service. Feb 9 18:53:56.944331 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 18:53:56.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.944409 systemd[1]: Stopped initrd-setup-root.service. Feb 9 18:53:56.947935 systemd[1]: Stopping systemd-networkd.service... Feb 9 18:53:56.952907 systemd[1]: Stopping systemd-resolved.service... Feb 9 18:53:56.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.956395 systemd-networkd[1106]: eth0: DHCPv6 lease lost Feb 9 18:53:56.960510 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 18:53:56.960638 systemd[1]: Stopped systemd-networkd.service. Feb 9 18:53:56.965853 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 18:53:56.967888 systemd[1]: Stopped systemd-resolved.service. Feb 9 18:53:56.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.972000 audit: BPF prog-id=9 op=UNLOAD Feb 9 18:53:56.972000 audit: BPF prog-id=6 op=UNLOAD Feb 9 18:53:56.973847 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 18:53:56.973924 systemd[1]: Closed systemd-networkd.socket. Feb 9 18:53:56.977098 systemd[1]: Stopping network-cleanup.service... Feb 9 18:53:56.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.978180 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 18:53:56.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.978257 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 18:53:56.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.981229 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 18:53:56.981298 systemd[1]: Stopped systemd-sysctl.service. Feb 9 18:53:56.984270 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 18:53:56.984356 systemd[1]: Stopped systemd-modules-load.service. Feb 9 18:53:56.987944 systemd[1]: Stopping systemd-udevd.service... Feb 9 18:53:56.991959 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 18:53:56.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:56.992182 systemd[1]: Stopped systemd-udevd.service. Feb 9 18:53:57.002078 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 18:53:57.003461 systemd[1]: Stopped network-cleanup.service. Feb 9 18:53:57.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:57.005972 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 18:53:57.006034 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 18:53:57.009359 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 18:53:57.009423 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 18:53:57.012609 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 18:53:57.012683 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 18:53:57.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:57.015671 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 18:53:57.015731 systemd[1]: Stopped dracut-cmdline.service. Feb 9 18:53:57.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:57.018397 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 18:53:57.018457 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 18:53:57.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:57.033583 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 18:53:57.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:57.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:57.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:57.034754 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 9 18:53:57.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:57.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:53:57.034820 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 9 18:53:57.036365 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 18:53:57.036409 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 18:53:57.038176 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 18:53:57.038220 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 18:53:57.041871 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 18:53:57.041975 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 18:53:57.043382 systemd[1]: Reached target initrd-switch-root.target. Feb 9 18:53:57.045614 systemd[1]: Starting initrd-switch-root.service... Feb 9 18:53:57.062026 systemd[1]: Switching root. Feb 9 18:53:57.082935 systemd-journald[185]: Journal stopped Feb 9 18:54:02.370775 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Feb 9 18:54:02.370845 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 18:54:02.370869 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 18:54:02.370891 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 18:54:02.370908 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 18:54:02.370930 kernel: SELinux: policy capability open_perms=1 Feb 9 18:54:02.370947 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 18:54:02.370965 kernel: SELinux: policy capability always_check_network=0 Feb 9 18:54:02.370986 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 18:54:02.371011 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 18:54:02.371028 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 18:54:02.371047 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 18:54:02.371065 systemd[1]: Successfully loaded SELinux policy in 81.335ms. Feb 9 18:54:02.371091 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.776ms. Feb 9 18:54:02.371113 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 18:54:02.371132 systemd[1]: Detected virtualization amazon. Feb 9 18:54:02.371155 systemd[1]: Detected architecture x86-64. Feb 9 18:54:02.371174 systemd[1]: Detected first boot. Feb 9 18:54:02.371196 systemd[1]: Initializing machine ID from VM UUID. Feb 9 18:54:02.371214 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 18:54:02.371231 systemd[1]: Populated /etc with preset unit settings. Feb 9 18:54:02.371248 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:54:02.371266 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:54:02.371286 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:54:02.371308 kernel: kauditd_printk_skb: 49 callbacks suppressed Feb 9 18:54:02.371352 kernel: audit: type=1334 audit(1707504841.728:87): prog-id=12 op=LOAD Feb 9 18:54:02.371369 kernel: audit: type=1334 audit(1707504841.728:88): prog-id=3 op=UNLOAD Feb 9 18:54:02.371384 kernel: audit: type=1334 audit(1707504841.729:89): prog-id=13 op=LOAD Feb 9 18:54:02.371400 kernel: audit: type=1334 audit(1707504841.731:90): prog-id=14 op=LOAD Feb 9 18:54:02.371421 kernel: audit: type=1334 audit(1707504841.731:91): prog-id=4 op=UNLOAD Feb 9 18:54:02.371438 kernel: audit: type=1334 audit(1707504841.731:92): prog-id=5 op=UNLOAD Feb 9 18:54:02.372518 kernel: audit: type=1334 audit(1707504841.738:93): prog-id=15 op=LOAD Feb 9 18:54:02.372545 kernel: audit: type=1334 audit(1707504841.738:94): prog-id=12 op=UNLOAD Feb 9 18:54:02.372575 kernel: audit: type=1334 audit(1707504841.742:95): prog-id=16 op=LOAD Feb 9 18:54:02.372592 kernel: audit: type=1334 audit(1707504841.744:96): prog-id=17 op=LOAD Feb 9 18:54:02.372610 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 18:54:02.372647 systemd[1]: Stopped initrd-switch-root.service. Feb 9 18:54:02.372669 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 18:54:02.372689 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 18:54:02.372710 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 18:54:02.372729 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 18:54:02.372752 systemd[1]: Created slice system-getty.slice. Feb 9 18:54:02.372771 systemd[1]: Created slice system-modprobe.slice. Feb 9 18:54:02.372793 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 18:54:02.372814 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 18:54:02.372836 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 18:54:02.372859 systemd[1]: Created slice user.slice. Feb 9 18:54:02.372890 systemd[1]: Started systemd-ask-password-console.path. Feb 9 18:54:02.372916 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 18:54:02.372938 systemd[1]: Set up automount boot.automount. Feb 9 18:54:02.372957 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 18:54:02.372979 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 18:54:02.372997 systemd[1]: Stopped target initrd-fs.target. Feb 9 18:54:02.373316 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 18:54:02.373391 systemd[1]: Reached target integritysetup.target. Feb 9 18:54:02.373411 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 18:54:02.373432 systemd[1]: Reached target remote-fs.target. Feb 9 18:54:02.373452 systemd[1]: Reached target slices.target. Feb 9 18:54:02.373471 systemd[1]: Reached target swap.target. Feb 9 18:54:02.373491 systemd[1]: Reached target torcx.target. Feb 9 18:54:02.373510 systemd[1]: Reached target veritysetup.target. Feb 9 18:54:02.373530 systemd[1]: Listening on systemd-coredump.socket. Feb 9 18:54:02.373549 systemd[1]: Listening on systemd-initctl.socket. Feb 9 18:54:02.373572 systemd[1]: Listening on systemd-networkd.socket. Feb 9 18:54:02.373592 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 18:54:02.373611 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 18:54:02.373630 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 18:54:02.373650 systemd[1]: Mounting dev-hugepages.mount... Feb 9 18:54:02.373669 systemd[1]: Mounting dev-mqueue.mount... Feb 9 18:54:02.373690 systemd[1]: Mounting media.mount... Feb 9 18:54:02.373710 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 18:54:02.373729 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 18:54:02.373752 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 18:54:02.373778 systemd[1]: Mounting tmp.mount... Feb 9 18:54:02.373797 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 18:54:02.373816 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 18:54:02.373887 systemd[1]: Starting kmod-static-nodes.service... Feb 9 18:54:02.373909 systemd[1]: Starting modprobe@configfs.service... Feb 9 18:54:02.373929 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 18:54:02.373950 systemd[1]: Starting modprobe@drm.service... Feb 9 18:54:02.373969 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 18:54:02.373991 systemd[1]: Starting modprobe@fuse.service... Feb 9 18:54:02.374010 systemd[1]: Starting modprobe@loop.service... Feb 9 18:54:02.374030 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 18:54:02.374048 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 18:54:02.374068 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 18:54:02.374086 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 18:54:02.374105 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 18:54:02.374124 systemd[1]: Stopped systemd-journald.service. Feb 9 18:54:02.374143 kernel: loop: module loaded Feb 9 18:54:02.374164 systemd[1]: Starting systemd-journald.service... Feb 9 18:54:02.374183 systemd[1]: Starting systemd-modules-load.service... Feb 9 18:54:02.374202 kernel: fuse: init (API version 7.34) Feb 9 18:54:02.374364 systemd[1]: Starting systemd-network-generator.service... Feb 9 18:54:02.374391 systemd[1]: Starting systemd-remount-fs.service... Feb 9 18:54:02.374411 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 18:54:02.374430 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 18:54:02.374449 systemd[1]: Stopped verity-setup.service. Feb 9 18:54:02.374470 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 18:54:02.374915 systemd[1]: Mounted dev-hugepages.mount. Feb 9 18:54:02.374950 systemd[1]: Mounted dev-mqueue.mount. Feb 9 18:54:02.374970 systemd[1]: Mounted media.mount. Feb 9 18:54:02.374990 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 18:54:02.375010 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 18:54:02.375029 systemd[1]: Mounted tmp.mount. Feb 9 18:54:02.375048 systemd[1]: Finished kmod-static-nodes.service. Feb 9 18:54:02.375067 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 18:54:02.375085 systemd[1]: Finished modprobe@configfs.service. Feb 9 18:54:02.375102 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 18:54:02.375124 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 18:54:02.375143 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 18:54:02.375163 systemd[1]: Finished modprobe@drm.service. Feb 9 18:54:02.377300 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 18:54:02.377353 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 18:54:02.377373 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 18:54:02.377391 systemd[1]: Finished modprobe@fuse.service. Feb 9 18:54:02.377410 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 18:54:02.377428 systemd[1]: Finished modprobe@loop.service. Feb 9 18:54:02.377447 systemd[1]: Finished systemd-modules-load.service. Feb 9 18:54:02.377513 systemd[1]: Finished systemd-network-generator.service. Feb 9 18:54:02.377539 systemd[1]: Finished systemd-remount-fs.service. Feb 9 18:54:02.377558 systemd[1]: Reached target network-pre.target. Feb 9 18:54:02.377588 systemd-journald[1413]: Journal started Feb 9 18:54:02.377673 systemd-journald[1413]: Runtime Journal (/run/log/journal/ec2e8c6341421ee3e55b2738d2445c12) is 4.8M, max 38.7M, 33.9M free. Feb 9 18:53:57.481000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 18:53:57.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 18:53:57.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 18:53:57.569000 audit: BPF prog-id=10 op=LOAD Feb 9 18:53:57.569000 audit: BPF prog-id=10 op=UNLOAD Feb 9 18:53:57.569000 audit: BPF prog-id=11 op=LOAD Feb 9 18:53:57.569000 audit: BPF prog-id=11 op=UNLOAD Feb 9 18:53:57.758000 audit[1333]: AVC avc: denied { associate } for pid=1333 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 18:53:57.758000 audit[1333]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001078e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=1316 pid=1333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:53:57.758000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 18:53:57.761000 audit[1333]: AVC avc: denied { associate } for pid=1333 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 18:53:57.761000 audit[1333]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001079b9 a2=1ed a3=0 items=2 ppid=1316 pid=1333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:53:57.761000 audit: CWD cwd="/" Feb 9 18:53:57.761000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:53:57.761000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:53:57.761000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 18:54:01.728000 audit: BPF prog-id=12 op=LOAD Feb 9 18:54:01.728000 audit: BPF prog-id=3 op=UNLOAD Feb 9 18:54:01.729000 audit: BPF prog-id=13 op=LOAD Feb 9 18:54:01.731000 audit: BPF prog-id=14 op=LOAD Feb 9 18:54:01.731000 audit: BPF prog-id=4 op=UNLOAD Feb 9 18:54:01.731000 audit: BPF prog-id=5 op=UNLOAD Feb 9 18:54:01.738000 audit: BPF prog-id=15 op=LOAD Feb 9 18:54:01.738000 audit: BPF prog-id=12 op=UNLOAD Feb 9 18:54:01.742000 audit: BPF prog-id=16 op=LOAD Feb 9 18:54:01.744000 audit: BPF prog-id=17 op=LOAD Feb 9 18:54:01.744000 audit: BPF prog-id=13 op=UNLOAD Feb 9 18:54:01.744000 audit: BPF prog-id=14 op=UNLOAD Feb 9 18:54:01.777000 audit: BPF prog-id=18 op=LOAD Feb 9 18:54:01.777000 audit: BPF prog-id=15 op=UNLOAD Feb 9 18:54:01.783000 audit: BPF prog-id=19 op=LOAD Feb 9 18:54:01.783000 audit: BPF prog-id=20 op=LOAD Feb 9 18:54:01.783000 audit: BPF prog-id=16 op=UNLOAD Feb 9 18:54:01.783000 audit: BPF prog-id=17 op=UNLOAD Feb 9 18:54:01.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:01.789000 audit: BPF prog-id=18 op=UNLOAD Feb 9 18:54:01.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:01.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.119000 audit: BPF prog-id=21 op=LOAD Feb 9 18:54:02.119000 audit: BPF prog-id=22 op=LOAD Feb 9 18:54:02.119000 audit: BPF prog-id=23 op=LOAD Feb 9 18:54:02.119000 audit: BPF prog-id=19 op=UNLOAD Feb 9 18:54:02.119000 audit: BPF prog-id=20 op=UNLOAD Feb 9 18:54:02.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.368000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 18:54:02.368000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffd19cfc4e0 a2=4000 a3=7ffd19cfc57c items=0 ppid=1 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:02.368000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 18:54:02.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:01.717979 systemd[1]: Queued start job for default target multi-user.target. Feb 9 18:53:57.754056 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-02-09T18:53:57Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:54:01.785089 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 18:53:57.755436 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-02-09T18:53:57Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 18:54:02.381335 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 18:53:57.755467 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-02-09T18:53:57Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 18:53:57.755554 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-02-09T18:53:57Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 18:53:57.755571 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-02-09T18:53:57Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 18:53:57.755767 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-02-09T18:53:57Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 18:53:57.755910 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-02-09T18:53:57Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 18:53:57.756179 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-02-09T18:53:57Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 18:53:57.756229 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-02-09T18:53:57Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 18:53:57.756250 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-02-09T18:53:57Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 18:53:57.757293 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-02-09T18:53:57Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 18:53:57.757368 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-02-09T18:53:57Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 18:53:57.757397 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-02-09T18:53:57Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 18:53:57.757419 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-02-09T18:53:57Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 18:53:57.757451 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-02-09T18:53:57Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 18:53:57.757472 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-02-09T18:53:57Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 18:54:00.673875 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-02-09T18:54:00Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:54:00.674271 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-02-09T18:54:00Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:54:00.674406 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-02-09T18:54:00Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:54:00.674628 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-02-09T18:54:00Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:54:00.674680 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-02-09T18:54:00Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 18:54:00.675020 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-02-09T18:54:00Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 18:54:02.409145 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 18:54:02.409231 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 18:54:02.422674 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 18:54:02.422751 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 18:54:02.422782 systemd[1]: Starting systemd-random-seed.service... Feb 9 18:54:02.428626 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 18:54:02.433448 systemd[1]: Starting systemd-sysctl.service... Feb 9 18:54:02.443341 systemd[1]: Started systemd-journald.service. Feb 9 18:54:02.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.446980 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 18:54:02.448280 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 18:54:02.449860 systemd[1]: Finished systemd-random-seed.service. Feb 9 18:54:02.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.451602 systemd[1]: Reached target first-boot-complete.target. Feb 9 18:54:02.456715 systemd[1]: Starting systemd-journal-flush.service... Feb 9 18:54:02.466554 systemd-journald[1413]: Time spent on flushing to /var/log/journal/ec2e8c6341421ee3e55b2738d2445c12 is 75.728ms for 1238 entries. Feb 9 18:54:02.466554 systemd-journald[1413]: System Journal (/var/log/journal/ec2e8c6341421ee3e55b2738d2445c12) is 8.0M, max 195.6M, 187.6M free. Feb 9 18:54:02.566656 systemd-journald[1413]: Received client request to flush runtime journal. Feb 9 18:54:02.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.506573 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 18:54:02.508470 systemd[1]: Finished systemd-sysctl.service. Feb 9 18:54:02.512713 systemd[1]: Starting systemd-sysusers.service... Feb 9 18:54:02.561481 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 18:54:02.564347 systemd[1]: Starting systemd-udev-settle.service... Feb 9 18:54:02.568096 systemd[1]: Finished systemd-journal-flush.service. Feb 9 18:54:02.584072 systemd[1]: Finished systemd-sysusers.service. Feb 9 18:54:02.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:02.588519 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 18:54:02.593419 udevadm[1450]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 18:54:02.641876 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 18:54:02.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:03.167920 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 18:54:03.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:03.170000 audit: BPF prog-id=24 op=LOAD Feb 9 18:54:03.170000 audit: BPF prog-id=25 op=LOAD Feb 9 18:54:03.170000 audit: BPF prog-id=7 op=UNLOAD Feb 9 18:54:03.170000 audit: BPF prog-id=8 op=UNLOAD Feb 9 18:54:03.171266 systemd[1]: Starting systemd-udevd.service... Feb 9 18:54:03.192536 systemd-udevd[1453]: Using default interface naming scheme 'v252'. Feb 9 18:54:03.237452 systemd[1]: Started systemd-udevd.service. Feb 9 18:54:03.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:03.239000 audit: BPF prog-id=26 op=LOAD Feb 9 18:54:03.241093 systemd[1]: Starting systemd-networkd.service... Feb 9 18:54:03.252000 audit: BPF prog-id=27 op=LOAD Feb 9 18:54:03.252000 audit: BPF prog-id=28 op=LOAD Feb 9 18:54:03.252000 audit: BPF prog-id=29 op=LOAD Feb 9 18:54:03.254298 systemd[1]: Starting systemd-userdbd.service... Feb 9 18:54:03.297155 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 18:54:03.313110 (udev-worker)[1461]: Network interface NamePolicy= disabled on kernel command line. Feb 9 18:54:03.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:03.336227 systemd[1]: Started systemd-userdbd.service. Feb 9 18:54:03.407734 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 9 18:54:03.424346 kernel: ACPI: button: Power Button [PWRF] Feb 9 18:54:03.433467 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input4 Feb 9 18:54:03.454344 kernel: ACPI: button: Sleep Button [SLPF] Feb 9 18:54:03.471575 systemd-networkd[1462]: lo: Link UP Feb 9 18:54:03.471589 systemd-networkd[1462]: lo: Gained carrier Feb 9 18:54:03.472204 systemd-networkd[1462]: Enumeration completed Feb 9 18:54:03.472347 systemd[1]: Started systemd-networkd.service. Feb 9 18:54:03.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:03.475914 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 18:54:03.478799 systemd-networkd[1462]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 18:54:03.485253 systemd-networkd[1462]: eth0: Link UP Feb 9 18:54:03.485745 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:54:03.486446 systemd-networkd[1462]: eth0: Gained carrier Feb 9 18:54:03.441000 audit[1465]: AVC avc: denied { confidentiality } for pid=1465 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 18:54:03.441000 audit[1465]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55de1051fcc0 a1=32194 a2=7f297d41ebc5 a3=5 items=108 ppid=1453 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:03.441000 audit: CWD cwd="/" Feb 9 18:54:03.441000 audit: PATH item=0 name=(null) inode=32 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=1 name=(null) inode=13985 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=2 name=(null) inode=13985 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.499593 systemd-networkd[1462]: eth0: DHCPv4 address 172.31.21.122/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 9 18:54:03.441000 audit: PATH item=3 name=(null) inode=13986 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=4 name=(null) inode=13985 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=5 name=(null) inode=13987 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=6 name=(null) inode=13985 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=7 name=(null) inode=13988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=8 name=(null) inode=13988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=9 name=(null) inode=13989 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=10 name=(null) inode=13988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=11 name=(null) inode=13990 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=12 name=(null) inode=13988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=13 name=(null) inode=13991 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=14 name=(null) inode=13988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=15 name=(null) inode=13992 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=16 name=(null) inode=13988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=17 name=(null) inode=13993 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=18 name=(null) inode=13985 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=19 name=(null) inode=13994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=20 name=(null) inode=13994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=21 name=(null) inode=13995 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=22 name=(null) inode=13994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=23 name=(null) inode=13996 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=24 name=(null) inode=13994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=25 name=(null) inode=13997 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=26 name=(null) inode=13994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=27 name=(null) inode=13998 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=28 name=(null) inode=13994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=29 name=(null) inode=13999 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=30 name=(null) inode=13985 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=31 name=(null) inode=14000 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=32 name=(null) inode=14000 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=33 name=(null) inode=14001 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=34 name=(null) inode=14000 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=35 name=(null) inode=14002 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=36 name=(null) inode=14000 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=37 name=(null) inode=14003 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=38 name=(null) inode=14000 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=39 name=(null) inode=14004 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=40 name=(null) inode=14000 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=41 name=(null) inode=14005 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=42 name=(null) inode=13985 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=43 name=(null) inode=14006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=44 name=(null) inode=14006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=45 name=(null) inode=14007 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=46 name=(null) inode=14006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=47 name=(null) inode=14008 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=48 name=(null) inode=14006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=49 name=(null) inode=14009 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=50 name=(null) inode=14006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=51 name=(null) inode=14010 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=52 name=(null) inode=14006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=53 name=(null) inode=14011 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=54 name=(null) inode=32 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=55 name=(null) inode=14012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=56 name=(null) inode=14012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=57 name=(null) inode=14013 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=58 name=(null) inode=14012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=59 name=(null) inode=14014 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=60 name=(null) inode=14012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=61 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=62 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=63 name=(null) inode=14016 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=64 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=65 name=(null) inode=14017 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=66 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=67 name=(null) inode=14018 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=68 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=69 name=(null) inode=14019 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=70 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=71 name=(null) inode=14020 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=72 name=(null) inode=14012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=73 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=74 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=75 name=(null) inode=14022 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=76 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=77 name=(null) inode=14023 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=78 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=79 name=(null) inode=14024 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=80 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=81 name=(null) inode=14025 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=82 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=83 name=(null) inode=14026 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=84 name=(null) inode=14012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=85 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=86 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=87 name=(null) inode=14028 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=88 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=89 name=(null) inode=14029 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=90 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=91 name=(null) inode=14030 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=92 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=93 name=(null) inode=14031 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=94 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=95 name=(null) inode=14032 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=96 name=(null) inode=14012 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=97 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=98 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=99 name=(null) inode=14034 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=100 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=101 name=(null) inode=14035 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=102 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=103 name=(null) inode=14036 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=104 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=105 name=(null) inode=14037 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=106 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PATH item=107 name=(null) inode=14038 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:54:03.441000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 18:54:03.531377 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Feb 9 18:54:03.557369 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input5 Feb 9 18:54:03.562384 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 18:54:03.582340 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1455) Feb 9 18:54:03.682163 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 18:54:03.782898 systemd[1]: Finished systemd-udev-settle.service. Feb 9 18:54:03.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:03.785303 systemd[1]: Starting lvm2-activation-early.service... Feb 9 18:54:03.814484 lvm[1567]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 18:54:03.843550 systemd[1]: Finished lvm2-activation-early.service. Feb 9 18:54:03.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:03.844895 systemd[1]: Reached target cryptsetup.target. Feb 9 18:54:03.847264 systemd[1]: Starting lvm2-activation.service... Feb 9 18:54:03.852873 lvm[1568]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 18:54:03.881088 systemd[1]: Finished lvm2-activation.service. Feb 9 18:54:03.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:03.882740 systemd[1]: Reached target local-fs-pre.target. Feb 9 18:54:03.883913 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 18:54:03.883953 systemd[1]: Reached target local-fs.target. Feb 9 18:54:03.885100 systemd[1]: Reached target machines.target. Feb 9 18:54:03.887802 systemd[1]: Starting ldconfig.service... Feb 9 18:54:03.889629 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 18:54:03.889799 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 18:54:03.891288 systemd[1]: Starting systemd-boot-update.service... Feb 9 18:54:03.894110 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 18:54:03.898488 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 18:54:03.899954 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 18:54:03.900041 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 18:54:03.901812 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 18:54:03.925508 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1570 (bootctl) Feb 9 18:54:03.927388 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 18:54:03.935200 systemd-tmpfiles[1573]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 18:54:03.938968 systemd-tmpfiles[1573]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 18:54:03.942978 systemd-tmpfiles[1573]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 18:54:03.943089 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 18:54:03.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:04.312115 systemd-fsck[1578]: fsck.fat 4.2 (2021-01-31) Feb 9 18:54:04.312115 systemd-fsck[1578]: /dev/nvme0n1p1: 789 files, 115339/258078 clusters Feb 9 18:54:04.315090 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 18:54:04.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:04.318474 systemd[1]: Mounting boot.mount... Feb 9 18:54:04.358028 systemd[1]: Mounted boot.mount. Feb 9 18:54:04.424554 systemd[1]: Finished systemd-boot-update.service. Feb 9 18:54:04.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:04.463554 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 18:54:04.466211 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 18:54:04.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:04.549982 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 18:54:04.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:04.555292 systemd[1]: Starting audit-rules.service... Feb 9 18:54:04.559294 systemd[1]: Starting clean-ca-certificates.service... Feb 9 18:54:04.566023 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 18:54:04.570000 audit: BPF prog-id=30 op=LOAD Feb 9 18:54:04.574102 systemd[1]: Starting systemd-resolved.service... Feb 9 18:54:04.581000 audit: BPF prog-id=31 op=LOAD Feb 9 18:54:04.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:04.585217 systemd[1]: Starting systemd-timesyncd.service... Feb 9 18:54:04.591385 systemd[1]: Starting systemd-update-utmp.service... Feb 9 18:54:04.593896 systemd[1]: Finished clean-ca-certificates.service. Feb 9 18:54:04.596955 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 18:54:04.608000 audit[1600]: SYSTEM_BOOT pid=1600 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 18:54:04.619960 systemd[1]: Finished systemd-update-utmp.service. Feb 9 18:54:04.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:04.690850 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 18:54:04.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:04.723000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 18:54:04.723000 audit[1612]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc41eafa50 a2=420 a3=0 items=0 ppid=1592 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:04.723000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 18:54:04.724386 augenrules[1612]: No rules Feb 9 18:54:04.725220 systemd[1]: Finished audit-rules.service. Feb 9 18:54:04.764825 systemd[1]: Started systemd-timesyncd.service. Feb 9 18:54:04.766502 systemd[1]: Reached target time-set.target. Feb 9 18:54:04.804343 systemd-resolved[1596]: Positive Trust Anchors: Feb 9 18:54:04.804911 systemd-resolved[1596]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 18:54:04.805121 systemd-resolved[1596]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 18:54:05.398415 systemd-timesyncd[1597]: Contacted time server 205.233.73.201:123 (0.flatcar.pool.ntp.org). Feb 9 18:54:05.399365 systemd-timesyncd[1597]: Initial clock synchronization to Fri 2024-02-09 18:54:05.397841 UTC. Feb 9 18:54:05.444164 systemd-resolved[1596]: Defaulting to hostname 'linux'. Feb 9 18:54:05.446895 systemd[1]: Started systemd-resolved.service. Feb 9 18:54:05.448375 systemd[1]: Reached target network.target. Feb 9 18:54:05.450374 systemd[1]: Reached target nss-lookup.target. Feb 9 18:54:05.514403 ldconfig[1569]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 18:54:05.526716 systemd[1]: Finished ldconfig.service. Feb 9 18:54:05.529843 systemd[1]: Starting systemd-update-done.service... Feb 9 18:54:05.543258 systemd[1]: Finished systemd-update-done.service. Feb 9 18:54:05.546033 systemd[1]: Reached target sysinit.target. Feb 9 18:54:05.547239 systemd[1]: Started motdgen.path. Feb 9 18:54:05.548410 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 18:54:05.550369 systemd[1]: Started logrotate.timer. Feb 9 18:54:05.551707 systemd[1]: Started mdadm.timer. Feb 9 18:54:05.552613 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 18:54:05.553655 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 18:54:05.553689 systemd[1]: Reached target paths.target. Feb 9 18:54:05.554583 systemd[1]: Reached target timers.target. Feb 9 18:54:05.555966 systemd[1]: Listening on dbus.socket. Feb 9 18:54:05.559581 systemd[1]: Starting docker.socket... Feb 9 18:54:05.564466 systemd[1]: Listening on sshd.socket. Feb 9 18:54:05.566764 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 18:54:05.567694 systemd[1]: Listening on docker.socket. Feb 9 18:54:05.568768 systemd[1]: Reached target sockets.target. Feb 9 18:54:05.569814 systemd[1]: Reached target basic.target. Feb 9 18:54:05.571244 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 18:54:05.571315 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 18:54:05.572958 systemd[1]: Starting containerd.service... Feb 9 18:54:05.574970 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 18:54:05.578706 systemd[1]: Starting dbus.service... Feb 9 18:54:05.581682 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 18:54:05.585206 systemd[1]: Starting extend-filesystems.service... Feb 9 18:54:05.586915 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 18:54:05.589118 systemd[1]: Starting motdgen.service... Feb 9 18:54:05.591411 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 18:54:05.594232 systemd[1]: Starting prepare-critools.service... Feb 9 18:54:05.598926 systemd[1]: Starting prepare-helm.service... Feb 9 18:54:05.601644 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 18:54:05.605504 systemd[1]: Starting sshd-keygen.service... Feb 9 18:54:05.608889 jq[1624]: false Feb 9 18:54:05.612512 systemd[1]: Starting systemd-logind.service... Feb 9 18:54:05.613531 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 18:54:05.613606 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 18:54:05.614235 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 18:54:05.658957 jq[1635]: true Feb 9 18:54:05.615634 systemd[1]: Starting update-engine.service... Feb 9 18:54:05.619656 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 18:54:05.623444 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 18:54:05.623936 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 18:54:05.678312 tar[1640]: crictl Feb 9 18:54:05.683809 tar[1641]: linux-amd64/helm Feb 9 18:54:05.687527 tar[1639]: ./ Feb 9 18:54:05.687527 tar[1639]: ./loopback Feb 9 18:54:05.704417 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 18:54:05.717464 jq[1642]: true Feb 9 18:54:05.711900 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 18:54:05.737192 extend-filesystems[1625]: Found nvme0n1 Feb 9 18:54:05.740446 extend-filesystems[1625]: Found nvme0n1p1 Feb 9 18:54:05.740446 extend-filesystems[1625]: Found nvme0n1p2 Feb 9 18:54:05.740446 extend-filesystems[1625]: Found nvme0n1p3 Feb 9 18:54:05.740446 extend-filesystems[1625]: Found usr Feb 9 18:54:05.740446 extend-filesystems[1625]: Found nvme0n1p4 Feb 9 18:54:05.740446 extend-filesystems[1625]: Found nvme0n1p6 Feb 9 18:54:05.740446 extend-filesystems[1625]: Found nvme0n1p7 Feb 9 18:54:05.751702 extend-filesystems[1625]: Found nvme0n1p9 Feb 9 18:54:05.751702 extend-filesystems[1625]: Checking size of /dev/nvme0n1p9 Feb 9 18:54:05.764521 systemd-networkd[1462]: eth0: Gained IPv6LL Feb 9 18:54:05.766511 dbus-daemon[1623]: [system] SELinux support is enabled Feb 9 18:54:05.767061 systemd[1]: Started dbus.service. Feb 9 18:54:05.771562 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 18:54:05.773136 systemd[1]: Reached target network-online.target. Feb 9 18:54:05.775858 systemd[1]: Started amazon-ssm-agent.service. Feb 9 18:54:05.779030 systemd[1]: Started nvidia.service. Feb 9 18:54:05.780185 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 18:54:05.780232 systemd[1]: Reached target system-config.target. Feb 9 18:54:05.781616 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 18:54:05.781653 systemd[1]: Reached target user-config.target. Feb 9 18:54:05.812993 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 18:54:05.813217 systemd[1]: Finished motdgen.service. Feb 9 18:54:05.828028 dbus-daemon[1623]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1462 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Feb 9 18:54:05.842868 systemd[1]: Starting systemd-hostnamed.service... Feb 9 18:54:05.938660 extend-filesystems[1625]: Resized partition /dev/nvme0n1p9 Feb 9 18:54:05.958646 extend-filesystems[1688]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 18:54:05.975660 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Feb 9 18:54:06.143468 update_engine[1634]: I0209 18:54:06.142397 1634 main.cc:92] Flatcar Update Engine starting Feb 9 18:54:06.180784 amazon-ssm-agent[1665]: 2024/02/09 18:54:06 Failed to load instance info from vault. RegistrationKey does not exist. Feb 9 18:54:06.186271 env[1643]: time="2024-02-09T18:54:06.183109891Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 18:54:06.191812 systemd[1]: Started update-engine.service. Feb 9 18:54:06.235513 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Feb 9 18:54:06.235613 update_engine[1634]: I0209 18:54:06.197208 1634 update_check_scheduler.cc:74] Next update check in 6m12s Feb 9 18:54:06.235680 amazon-ssm-agent[1665]: Initializing new seelog logger Feb 9 18:54:06.235680 amazon-ssm-agent[1665]: New Seelog Logger Creation Complete Feb 9 18:54:06.235680 amazon-ssm-agent[1665]: 2024/02/09 18:54:06 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Feb 9 18:54:06.235680 amazon-ssm-agent[1665]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Feb 9 18:54:06.235680 amazon-ssm-agent[1665]: 2024/02/09 18:54:06 processing appconfig overrides Feb 9 18:54:06.195443 systemd[1]: Started locksmithd.service. Feb 9 18:54:06.215794 systemd-logind[1633]: Watching system buttons on /dev/input/event1 (Power Button) Feb 9 18:54:06.215884 systemd-logind[1633]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 9 18:54:06.215912 systemd-logind[1633]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 18:54:06.219878 systemd-logind[1633]: New seat seat0. Feb 9 18:54:06.226344 systemd[1]: Started systemd-logind.service. Feb 9 18:54:06.251757 extend-filesystems[1688]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Feb 9 18:54:06.251757 extend-filesystems[1688]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 9 18:54:06.251757 extend-filesystems[1688]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Feb 9 18:54:06.247681 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 18:54:06.258610 bash[1689]: Updated "/home/core/.ssh/authorized_keys" Feb 9 18:54:06.258796 extend-filesystems[1625]: Resized filesystem in /dev/nvme0n1p9 Feb 9 18:54:06.261339 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 18:54:06.261562 systemd[1]: Finished extend-filesystems.service. Feb 9 18:54:06.266987 tar[1639]: ./bandwidth Feb 9 18:54:06.394235 env[1643]: time="2024-02-09T18:54:06.394178530Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 18:54:06.394426 env[1643]: time="2024-02-09T18:54:06.394401082Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:54:06.400982 systemd[1]: nvidia.service: Deactivated successfully. Feb 9 18:54:06.409103 dbus-daemon[1623]: [system] Successfully activated service 'org.freedesktop.hostname1' Feb 9 18:54:06.409300 systemd[1]: Started systemd-hostnamed.service. Feb 9 18:54:06.414557 dbus-daemon[1623]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1673 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Feb 9 18:54:06.420924 env[1643]: time="2024-02-09T18:54:06.416326276Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 18:54:06.420924 env[1643]: time="2024-02-09T18:54:06.416379173Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:54:06.420924 env[1643]: time="2024-02-09T18:54:06.416686659Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 18:54:06.420924 env[1643]: time="2024-02-09T18:54:06.416711812Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 18:54:06.420924 env[1643]: time="2024-02-09T18:54:06.416731704Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 18:54:06.420924 env[1643]: time="2024-02-09T18:54:06.416747630Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 18:54:06.420924 env[1643]: time="2024-02-09T18:54:06.416851458Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:54:06.420924 env[1643]: time="2024-02-09T18:54:06.417115710Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:54:06.420924 env[1643]: time="2024-02-09T18:54:06.417306055Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 18:54:06.420924 env[1643]: time="2024-02-09T18:54:06.417332712Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 18:54:06.419366 systemd[1]: Starting polkit.service... Feb 9 18:54:06.421602 env[1643]: time="2024-02-09T18:54:06.417790742Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 18:54:06.421602 env[1643]: time="2024-02-09T18:54:06.417818262Z" level=info msg="metadata content store policy set" policy=shared Feb 9 18:54:06.454373 env[1643]: time="2024-02-09T18:54:06.454278539Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 18:54:06.454525 env[1643]: time="2024-02-09T18:54:06.454388466Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 18:54:06.454525 env[1643]: time="2024-02-09T18:54:06.454407568Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 18:54:06.454525 env[1643]: time="2024-02-09T18:54:06.454468256Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 18:54:06.454525 env[1643]: time="2024-02-09T18:54:06.454489375Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 18:54:06.454693 env[1643]: time="2024-02-09T18:54:06.454561844Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 18:54:06.454693 env[1643]: time="2024-02-09T18:54:06.454582840Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 18:54:06.454693 env[1643]: time="2024-02-09T18:54:06.454604328Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 18:54:06.454838 env[1643]: time="2024-02-09T18:54:06.454642317Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 18:54:06.454838 env[1643]: time="2024-02-09T18:54:06.454723166Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 18:54:06.454838 env[1643]: time="2024-02-09T18:54:06.454762763Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 18:54:06.454838 env[1643]: time="2024-02-09T18:54:06.454799564Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 18:54:06.455005 env[1643]: time="2024-02-09T18:54:06.454985227Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 18:54:06.455156 env[1643]: time="2024-02-09T18:54:06.455132360Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 18:54:06.455673 env[1643]: time="2024-02-09T18:54:06.455648477Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 18:54:06.455744 env[1643]: time="2024-02-09T18:54:06.455706782Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 18:54:06.455744 env[1643]: time="2024-02-09T18:54:06.455728902Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 18:54:06.455833 env[1643]: time="2024-02-09T18:54:06.455812814Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 18:54:06.456195 env[1643]: time="2024-02-09T18:54:06.456167760Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 18:54:06.456270 env[1643]: time="2024-02-09T18:54:06.456206232Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 18:54:06.456270 env[1643]: time="2024-02-09T18:54:06.456236396Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 18:54:06.456270 env[1643]: time="2024-02-09T18:54:06.456256154Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 18:54:06.456399 env[1643]: time="2024-02-09T18:54:06.456275770Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 18:54:06.456399 env[1643]: time="2024-02-09T18:54:06.456314504Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 18:54:06.456399 env[1643]: time="2024-02-09T18:54:06.456339024Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 18:54:06.456399 env[1643]: time="2024-02-09T18:54:06.456378978Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 18:54:06.456602 env[1643]: time="2024-02-09T18:54:06.456581150Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 18:54:06.456657 env[1643]: time="2024-02-09T18:54:06.456624197Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 18:54:06.456657 env[1643]: time="2024-02-09T18:54:06.456645509Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 18:54:06.456738 env[1643]: time="2024-02-09T18:54:06.456663706Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 18:54:06.456738 env[1643]: time="2024-02-09T18:54:06.456705529Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 18:54:06.456738 env[1643]: time="2024-02-09T18:54:06.456726151Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 18:54:06.456846 env[1643]: time="2024-02-09T18:54:06.456751270Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 18:54:06.456846 env[1643]: time="2024-02-09T18:54:06.456811056Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 18:54:06.457578 env[1643]: time="2024-02-09T18:54:06.457485310Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 18:54:06.464515 env[1643]: time="2024-02-09T18:54:06.457589157Z" level=info msg="Connect containerd service" Feb 9 18:54:06.464515 env[1643]: time="2024-02-09T18:54:06.457656142Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 18:54:06.464515 env[1643]: time="2024-02-09T18:54:06.459205377Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 18:54:06.464515 env[1643]: time="2024-02-09T18:54:06.459685147Z" level=info msg="Start subscribing containerd event" Feb 9 18:54:06.464515 env[1643]: time="2024-02-09T18:54:06.459825519Z" level=info msg="Start recovering state" Feb 9 18:54:06.464515 env[1643]: time="2024-02-09T18:54:06.459905850Z" level=info msg="Start event monitor" Feb 9 18:54:06.464515 env[1643]: time="2024-02-09T18:54:06.459921442Z" level=info msg="Start snapshots syncer" Feb 9 18:54:06.464515 env[1643]: time="2024-02-09T18:54:06.459934725Z" level=info msg="Start cni network conf syncer for default" Feb 9 18:54:06.464515 env[1643]: time="2024-02-09T18:54:06.459945347Z" level=info msg="Start streaming server" Feb 9 18:54:06.464515 env[1643]: time="2024-02-09T18:54:06.460820921Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 18:54:06.464515 env[1643]: time="2024-02-09T18:54:06.460920323Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 18:54:06.461122 systemd[1]: Started containerd.service. Feb 9 18:54:06.477971 polkitd[1725]: Started polkitd version 121 Feb 9 18:54:06.511783 polkitd[1725]: Loading rules from directory /etc/polkit-1/rules.d Feb 9 18:54:06.512062 polkitd[1725]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 9 18:54:06.515510 polkitd[1725]: Finished loading, compiling and executing 2 rules Feb 9 18:54:06.516068 dbus-daemon[1623]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Feb 9 18:54:06.516254 systemd[1]: Started polkit.service. Feb 9 18:54:06.518768 polkitd[1725]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 9 18:54:06.522753 env[1643]: time="2024-02-09T18:54:06.522389165Z" level=info msg="containerd successfully booted in 0.403619s" Feb 9 18:54:06.568297 systemd-hostnamed[1673]: Hostname set to (transient) Feb 9 18:54:06.568479 systemd-resolved[1596]: System hostname changed to 'ip-172-31-21-122'. Feb 9 18:54:06.576389 tar[1639]: ./ptp Feb 9 18:54:06.761994 coreos-metadata[1622]: Feb 09 18:54:06.757 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Feb 9 18:54:06.765049 coreos-metadata[1622]: Feb 09 18:54:06.764 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Feb 9 18:54:06.766814 coreos-metadata[1622]: Feb 09 18:54:06.766 INFO Fetch successful Feb 9 18:54:06.767797 coreos-metadata[1622]: Feb 09 18:54:06.766 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Feb 9 18:54:06.767952 coreos-metadata[1622]: Feb 09 18:54:06.767 INFO Fetch successful Feb 9 18:54:06.770855 unknown[1622]: wrote ssh authorized keys file for user: core Feb 9 18:54:06.773408 tar[1639]: ./vlan Feb 9 18:54:06.809905 update-ssh-keys[1794]: Updated "/home/core/.ssh/authorized_keys" Feb 9 18:54:06.810634 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 18:54:06.913058 tar[1639]: ./host-device Feb 9 18:54:06.949346 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO Create new startup processor Feb 9 18:54:06.950100 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [LongRunningPluginsManager] registered plugins: {} Feb 9 18:54:06.950100 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO Initializing bookkeeping folders Feb 9 18:54:06.950339 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO removing the completed state files Feb 9 18:54:06.950339 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO Initializing bookkeeping folders for long running plugins Feb 9 18:54:06.950339 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Feb 9 18:54:06.950339 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO Initializing healthcheck folders for long running plugins Feb 9 18:54:06.950339 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO Initializing locations for inventory plugin Feb 9 18:54:06.950339 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO Initializing default location for custom inventory Feb 9 18:54:06.950339 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO Initializing default location for file inventory Feb 9 18:54:06.950339 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO Initializing default location for role inventory Feb 9 18:54:06.950339 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO Init the cloudwatchlogs publisher Feb 9 18:54:06.950339 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [instanceID=i-0392fb1cd1ec45640] Successfully loaded platform independent plugin aws:downloadContent Feb 9 18:54:06.950339 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [instanceID=i-0392fb1cd1ec45640] Successfully loaded platform independent plugin aws:configureDocker Feb 9 18:54:06.950754 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [instanceID=i-0392fb1cd1ec45640] Successfully loaded platform independent plugin aws:runDockerAction Feb 9 18:54:06.950754 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [instanceID=i-0392fb1cd1ec45640] Successfully loaded platform independent plugin aws:refreshAssociation Feb 9 18:54:06.950754 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [instanceID=i-0392fb1cd1ec45640] Successfully loaded platform independent plugin aws:configurePackage Feb 9 18:54:06.950754 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [instanceID=i-0392fb1cd1ec45640] Successfully loaded platform independent plugin aws:runDocument Feb 9 18:54:06.950754 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [instanceID=i-0392fb1cd1ec45640] Successfully loaded platform independent plugin aws:softwareInventory Feb 9 18:54:06.950754 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [instanceID=i-0392fb1cd1ec45640] Successfully loaded platform independent plugin aws:runPowerShellScript Feb 9 18:54:06.950754 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [instanceID=i-0392fb1cd1ec45640] Successfully loaded platform independent plugin aws:updateSsmAgent Feb 9 18:54:06.950754 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [instanceID=i-0392fb1cd1ec45640] Successfully loaded platform dependent plugin aws:runShellScript Feb 9 18:54:06.950754 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Feb 9 18:54:06.950754 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO OS: linux, Arch: amd64 Feb 9 18:54:06.982192 amazon-ssm-agent[1665]: datastore file /var/lib/amazon/ssm/i-0392fb1cd1ec45640/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Feb 9 18:54:07.049446 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [MessagingDeliveryService] Starting document processing engine... Feb 9 18:54:07.056401 tar[1639]: ./tuning Feb 9 18:54:07.144513 tar[1639]: ./vrf Feb 9 18:54:07.144673 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [MessagingDeliveryService] [EngineProcessor] Starting Feb 9 18:54:07.205521 tar[1639]: ./sbr Feb 9 18:54:07.238876 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Feb 9 18:54:07.302949 tar[1639]: ./tap Feb 9 18:54:07.333395 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [MessagingDeliveryService] Starting message polling Feb 9 18:54:07.408092 tar[1639]: ./dhcp Feb 9 18:54:07.428117 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [MessagingDeliveryService] Starting send replies to MDS Feb 9 18:54:07.522956 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [instanceID=i-0392fb1cd1ec45640] Starting association polling Feb 9 18:54:07.618114 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Feb 9 18:54:07.652985 tar[1639]: ./static Feb 9 18:54:07.713402 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [MessagingDeliveryService] [Association] Launching response handler Feb 9 18:54:07.724091 tar[1639]: ./firewall Feb 9 18:54:07.809534 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Feb 9 18:54:07.834309 tar[1639]: ./macvlan Feb 9 18:54:07.851309 tar[1641]: linux-amd64/LICENSE Feb 9 18:54:07.851309 tar[1641]: linux-amd64/README.md Feb 9 18:54:07.857644 systemd[1]: Finished prepare-helm.service. Feb 9 18:54:07.903070 tar[1639]: ./dummy Feb 9 18:54:07.904571 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Feb 9 18:54:07.955650 tar[1639]: ./bridge Feb 9 18:54:07.992767 systemd[1]: Finished prepare-critools.service. Feb 9 18:54:08.001162 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Feb 9 18:54:08.026082 tar[1639]: ./ipvlan Feb 9 18:54:08.074548 tar[1639]: ./portmap Feb 9 18:54:08.097036 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [HealthCheck] HealthCheck reporting agent health. Feb 9 18:54:08.122818 tar[1639]: ./host-local Feb 9 18:54:08.184020 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 18:54:08.193335 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [MessageGatewayService] Starting session document processing engine... Feb 9 18:54:08.289837 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [MessageGatewayService] [EngineProcessor] Starting Feb 9 18:54:08.323827 locksmithd[1712]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 18:54:08.386405 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Feb 9 18:54:08.483168 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0392fb1cd1ec45640, requestId: 88cfc408-7e4d-4966-8e7f-88d6d08f7a69 Feb 9 18:54:08.579998 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [LongRunningPluginsManager] starting long running plugin manager Feb 9 18:54:08.677087 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Feb 9 18:54:08.774605 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [OfflineService] Starting document processing engine... Feb 9 18:54:08.872247 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [OfflineService] [EngineProcessor] Starting Feb 9 18:54:08.969921 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [OfflineService] [EngineProcessor] Initial processing Feb 9 18:54:09.067865 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [OfflineService] Starting message polling Feb 9 18:54:09.165943 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [OfflineService] Starting send replies to MDS Feb 9 18:54:09.264180 amazon-ssm-agent[1665]: 2024-02-09 18:54:06 INFO [MessageGatewayService] listening reply. Feb 9 18:54:09.362708 amazon-ssm-agent[1665]: 2024-02-09 18:54:07 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Feb 9 18:54:09.382657 sshd_keygen[1657]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 18:54:09.409671 systemd[1]: Finished sshd-keygen.service. Feb 9 18:54:09.413095 systemd[1]: Starting issuegen.service... Feb 9 18:54:09.419297 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 18:54:09.419513 systemd[1]: Finished issuegen.service. Feb 9 18:54:09.422433 systemd[1]: Starting systemd-user-sessions.service... Feb 9 18:54:09.430882 systemd[1]: Finished systemd-user-sessions.service. Feb 9 18:54:09.434097 systemd[1]: Started getty@tty1.service. Feb 9 18:54:09.438024 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 18:54:09.439430 systemd[1]: Reached target getty.target. Feb 9 18:54:09.441726 systemd[1]: Reached target multi-user.target. Feb 9 18:54:09.446387 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 18:54:09.461868 amazon-ssm-agent[1665]: 2024-02-09 18:54:07 INFO [StartupProcessor] Executing startup processor tasks Feb 9 18:54:09.464353 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 18:54:09.464567 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 18:54:09.465993 systemd[1]: Startup finished in 727ms (kernel) + 25.611s (initrd) + 11.493s (userspace) = 37.833s. Feb 9 18:54:09.560662 amazon-ssm-agent[1665]: 2024-02-09 18:54:07 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Feb 9 18:54:09.659316 amazon-ssm-agent[1665]: 2024-02-09 18:54:07 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Feb 9 18:54:09.758565 amazon-ssm-agent[1665]: 2024-02-09 18:54:07 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.2 Feb 9 18:54:09.858000 amazon-ssm-agent[1665]: 2024-02-09 18:54:07 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0392fb1cd1ec45640?role=subscribe&stream=input Feb 9 18:54:09.957686 amazon-ssm-agent[1665]: 2024-02-09 18:54:07 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0392fb1cd1ec45640?role=subscribe&stream=input Feb 9 18:54:10.057529 amazon-ssm-agent[1665]: 2024-02-09 18:54:07 INFO [MessageGatewayService] Starting receiving message from control channel Feb 9 18:54:10.157564 amazon-ssm-agent[1665]: 2024-02-09 18:54:07 INFO [MessageGatewayService] [EngineProcessor] Initial processing Feb 9 18:54:10.257869 amazon-ssm-agent[1665]: 2024-02-09 18:54:07 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Feb 9 18:54:15.239629 systemd[1]: Created slice system-sshd.slice. Feb 9 18:54:15.241646 systemd[1]: Started sshd@0-172.31.21.122:22-139.178.68.195:34544.service. Feb 9 18:54:15.420942 sshd[1839]: Accepted publickey for core from 139.178.68.195 port 34544 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:54:15.424062 sshd[1839]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:54:15.444663 systemd[1]: Created slice user-500.slice. Feb 9 18:54:15.446464 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 18:54:15.451628 systemd-logind[1633]: New session 1 of user core. Feb 9 18:54:15.476264 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 18:54:15.481443 systemd[1]: Starting user@500.service... Feb 9 18:54:15.490277 (systemd)[1842]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:54:15.638077 systemd[1842]: Queued start job for default target default.target. Feb 9 18:54:15.639098 systemd[1842]: Reached target paths.target. Feb 9 18:54:15.639133 systemd[1842]: Reached target sockets.target. Feb 9 18:54:15.639151 systemd[1842]: Reached target timers.target. Feb 9 18:54:15.639202 systemd[1842]: Reached target basic.target. Feb 9 18:54:15.639380 systemd[1]: Started user@500.service. Feb 9 18:54:15.641761 systemd[1]: Started session-1.scope. Feb 9 18:54:15.642958 systemd[1842]: Reached target default.target. Feb 9 18:54:15.643487 systemd[1842]: Startup finished in 143ms. Feb 9 18:54:15.809441 systemd[1]: Started sshd@1-172.31.21.122:22-139.178.68.195:34558.service. Feb 9 18:54:15.990773 sshd[1851]: Accepted publickey for core from 139.178.68.195 port 34558 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:54:15.992216 sshd[1851]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:54:15.997356 systemd-logind[1633]: New session 2 of user core. Feb 9 18:54:15.997815 systemd[1]: Started session-2.scope. Feb 9 18:54:16.128083 sshd[1851]: pam_unix(sshd:session): session closed for user core Feb 9 18:54:16.131940 systemd[1]: sshd@1-172.31.21.122:22-139.178.68.195:34558.service: Deactivated successfully. Feb 9 18:54:16.132948 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 18:54:16.133649 systemd-logind[1633]: Session 2 logged out. Waiting for processes to exit. Feb 9 18:54:16.134581 systemd-logind[1633]: Removed session 2. Feb 9 18:54:16.153975 systemd[1]: Started sshd@2-172.31.21.122:22-139.178.68.195:45710.service. Feb 9 18:54:16.311674 sshd[1857]: Accepted publickey for core from 139.178.68.195 port 45710 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:54:16.313189 sshd[1857]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:54:16.318462 systemd-logind[1633]: New session 3 of user core. Feb 9 18:54:16.319109 systemd[1]: Started session-3.scope. Feb 9 18:54:16.440026 sshd[1857]: pam_unix(sshd:session): session closed for user core Feb 9 18:54:16.443125 systemd[1]: sshd@2-172.31.21.122:22-139.178.68.195:45710.service: Deactivated successfully. Feb 9 18:54:16.444019 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 18:54:16.444675 systemd-logind[1633]: Session 3 logged out. Waiting for processes to exit. Feb 9 18:54:16.445612 systemd-logind[1633]: Removed session 3. Feb 9 18:54:16.476596 systemd[1]: Started sshd@3-172.31.21.122:22-139.178.68.195:45718.service. Feb 9 18:54:16.631109 sshd[1863]: Accepted publickey for core from 139.178.68.195 port 45718 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:54:16.632987 sshd[1863]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:54:16.646104 systemd-logind[1633]: New session 4 of user core. Feb 9 18:54:16.646682 systemd[1]: Started session-4.scope. Feb 9 18:54:16.775251 sshd[1863]: pam_unix(sshd:session): session closed for user core Feb 9 18:54:16.779120 systemd[1]: sshd@3-172.31.21.122:22-139.178.68.195:45718.service: Deactivated successfully. Feb 9 18:54:16.780105 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 18:54:16.780786 systemd-logind[1633]: Session 4 logged out. Waiting for processes to exit. Feb 9 18:54:16.781654 systemd-logind[1633]: Removed session 4. Feb 9 18:54:16.802335 systemd[1]: Started sshd@4-172.31.21.122:22-139.178.68.195:45724.service. Feb 9 18:54:16.964789 sshd[1869]: Accepted publickey for core from 139.178.68.195 port 45724 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:54:16.966387 sshd[1869]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:54:16.972355 systemd-logind[1633]: New session 5 of user core. Feb 9 18:54:16.972533 systemd[1]: Started session-5.scope. Feb 9 18:54:17.107828 sudo[1872]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 18:54:17.108980 sudo[1872]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:54:17.119604 dbus-daemon[1623]: Н\xed\xf4\xbeU: received setenforce notice (enforcing=-948214928) Feb 9 18:54:17.122697 sudo[1872]: pam_unix(sudo:session): session closed for user root Feb 9 18:54:17.149407 sshd[1869]: pam_unix(sshd:session): session closed for user core Feb 9 18:54:17.153098 systemd[1]: sshd@4-172.31.21.122:22-139.178.68.195:45724.service: Deactivated successfully. Feb 9 18:54:17.154220 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 18:54:17.154927 systemd-logind[1633]: Session 5 logged out. Waiting for processes to exit. Feb 9 18:54:17.156100 systemd-logind[1633]: Removed session 5. Feb 9 18:54:17.175417 systemd[1]: Started sshd@5-172.31.21.122:22-139.178.68.195:45730.service. Feb 9 18:54:17.339406 sshd[1876]: Accepted publickey for core from 139.178.68.195 port 45730 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:54:17.341042 sshd[1876]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:54:17.348352 systemd-logind[1633]: New session 6 of user core. Feb 9 18:54:17.349476 systemd[1]: Started session-6.scope. Feb 9 18:54:17.453176 sudo[1880]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 18:54:17.454519 sudo[1880]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:54:17.459275 sudo[1880]: pam_unix(sudo:session): session closed for user root Feb 9 18:54:17.465593 sudo[1879]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 18:54:17.466048 sudo[1879]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:54:17.478336 systemd[1]: Stopping audit-rules.service... Feb 9 18:54:17.478000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 18:54:17.481147 kernel: kauditd_printk_skb: 190 callbacks suppressed Feb 9 18:54:17.481217 kernel: audit: type=1305 audit(1707504857.478:172): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 18:54:17.481248 auditctl[1883]: No rules Feb 9 18:54:17.481768 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 18:54:17.481973 systemd[1]: Stopped audit-rules.service. Feb 9 18:54:17.478000 audit[1883]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe4daea7d0 a2=420 a3=0 items=0 ppid=1 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:17.485148 systemd[1]: Starting audit-rules.service... Feb 9 18:54:17.478000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 18:54:17.499661 kernel: audit: type=1300 audit(1707504857.478:172): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe4daea7d0 a2=420 a3=0 items=0 ppid=1 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:17.499765 kernel: audit: type=1327 audit(1707504857.478:172): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 18:54:17.499800 kernel: audit: type=1131 audit(1707504857.480:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:17.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:17.525583 augenrules[1900]: No rules Feb 9 18:54:17.526293 systemd[1]: Finished audit-rules.service. Feb 9 18:54:17.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:17.528047 sudo[1879]: pam_unix(sudo:session): session closed for user root Feb 9 18:54:17.525000 audit[1879]: USER_END pid=1879 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:54:17.538488 kernel: audit: type=1130 audit(1707504857.525:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:17.538645 kernel: audit: type=1106 audit(1707504857.525:175): pid=1879 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:54:17.538706 kernel: audit: type=1104 audit(1707504857.525:176): pid=1879 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:54:17.525000 audit[1879]: CRED_DISP pid=1879 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:54:17.551533 sshd[1876]: pam_unix(sshd:session): session closed for user core Feb 9 18:54:17.555000 audit[1876]: USER_END pid=1876 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:54:17.569470 systemd[1]: sshd@5-172.31.21.122:22-139.178.68.195:45730.service: Deactivated successfully. Feb 9 18:54:17.571864 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 18:54:17.576411 kernel: audit: type=1106 audit(1707504857.555:177): pid=1876 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:54:17.555000 audit[1876]: CRED_DISP pid=1876 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:54:17.579998 systemd-logind[1633]: Session 6 logged out. Waiting for processes to exit. Feb 9 18:54:17.581862 systemd-logind[1633]: Removed session 6. Feb 9 18:54:17.594133 kernel: audit: type=1104 audit(1707504857.555:178): pid=1876 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:54:17.594248 kernel: audit: type=1131 audit(1707504857.569:179): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.21.122:22-139.178.68.195:45730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:17.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.21.122:22-139.178.68.195:45730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:17.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.21.122:22-139.178.68.195:45736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:17.592081 systemd[1]: Started sshd@6-172.31.21.122:22-139.178.68.195:45736.service. Feb 9 18:54:17.753000 audit[1906]: USER_ACCT pid=1906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:54:17.756962 sshd[1906]: Accepted publickey for core from 139.178.68.195 port 45736 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:54:17.755000 audit[1906]: CRED_ACQ pid=1906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:54:17.755000 audit[1906]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7f9ba160 a2=3 a3=0 items=0 ppid=1 pid=1906 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:17.755000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:54:17.757697 sshd[1906]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:54:17.762877 systemd[1]: Started session-7.scope. Feb 9 18:54:17.763401 systemd-logind[1633]: New session 7 of user core. Feb 9 18:54:17.767000 audit[1906]: USER_START pid=1906 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:54:17.769000 audit[1908]: CRED_ACQ pid=1908 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:54:17.868000 audit[1909]: USER_ACCT pid=1909 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:54:17.869752 sudo[1909]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 18:54:17.868000 audit[1909]: CRED_REFR pid=1909 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:54:17.870054 sudo[1909]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:54:17.870000 audit[1909]: USER_START pid=1909 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:54:18.477771 systemd[1]: Starting docker.service... Feb 9 18:54:18.548581 env[1925]: time="2024-02-09T18:54:18.548519809Z" level=info msg="Starting up" Feb 9 18:54:18.550732 env[1925]: time="2024-02-09T18:54:18.550690837Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 18:54:18.550732 env[1925]: time="2024-02-09T18:54:18.550716388Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 18:54:18.550924 env[1925]: time="2024-02-09T18:54:18.550738953Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 18:54:18.550924 env[1925]: time="2024-02-09T18:54:18.550752841Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 18:54:18.553404 env[1925]: time="2024-02-09T18:54:18.553371060Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 18:54:18.553404 env[1925]: time="2024-02-09T18:54:18.553394027Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 18:54:18.553558 env[1925]: time="2024-02-09T18:54:18.553417645Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 18:54:18.553558 env[1925]: time="2024-02-09T18:54:18.553430671Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 18:54:18.559984 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3190336767-merged.mount: Deactivated successfully. Feb 9 18:54:18.614708 env[1925]: time="2024-02-09T18:54:18.614629627Z" level=info msg="Loading containers: start." Feb 9 18:54:18.694000 audit[1957]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1957 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:18.694000 audit[1957]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffda94b9180 a2=0 a3=7ffda94b916c items=0 ppid=1925 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:18.694000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 18:54:18.696000 audit[1959]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1959 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:18.696000 audit[1959]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fffc487f8d0 a2=0 a3=7fffc487f8bc items=0 ppid=1925 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:18.696000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 18:54:18.698000 audit[1961]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1961 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:18.698000 audit[1961]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffb6858ac0 a2=0 a3=7fffb6858aac items=0 ppid=1925 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:18.698000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 18:54:18.701000 audit[1963]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1963 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:18.701000 audit[1963]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe4f7fba40 a2=0 a3=7ffe4f7fba2c items=0 ppid=1925 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:18.701000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 18:54:18.704000 audit[1965]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1965 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:18.704000 audit[1965]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc0ac74900 a2=0 a3=7ffc0ac748ec items=0 ppid=1925 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:18.704000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 18:54:18.721000 audit[1970]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1970 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:18.721000 audit[1970]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdb6d30540 a2=0 a3=7ffdb6d3052c items=0 ppid=1925 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:18.721000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 18:54:18.733000 audit[1972]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1972 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:18.733000 audit[1972]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcd5857340 a2=0 a3=7ffcd585732c items=0 ppid=1925 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:18.733000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 18:54:18.736000 audit[1974]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1974 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:18.736000 audit[1974]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffcb56e7d90 a2=0 a3=7ffcb56e7d7c items=0 ppid=1925 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:18.736000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 18:54:18.738000 audit[1976]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1976 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:18.738000 audit[1976]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc2b7a7380 a2=0 a3=7ffc2b7a736c items=0 ppid=1925 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:18.738000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 18:54:18.756000 audit[1980]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1980 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:18.756000 audit[1980]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fffa76ecff0 a2=0 a3=7fffa76ecfdc items=0 ppid=1925 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:18.756000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 18:54:18.759000 audit[1981]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1981 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:18.759000 audit[1981]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcc5d6dec0 a2=0 a3=7ffcc5d6deac items=0 ppid=1925 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:18.759000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 18:54:18.779317 kernel: Initializing XFRM netlink socket Feb 9 18:54:18.825293 env[1925]: time="2024-02-09T18:54:18.825243408Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 18:54:18.827249 (udev-worker)[1937]: Network interface NamePolicy= disabled on kernel command line. Feb 9 18:54:18.885000 audit[1989]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1989 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:18.885000 audit[1989]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fffdd9e3cc0 a2=0 a3=7fffdd9e3cac items=0 ppid=1925 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:18.885000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 18:54:18.972000 audit[1992]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1992 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:18.972000 audit[1992]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe7a43ee30 a2=0 a3=7ffe7a43ee1c items=0 ppid=1925 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:18.972000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 18:54:18.980000 audit[1995]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1995 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:18.980000 audit[1995]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffda5fec750 a2=0 a3=7ffda5fec73c items=0 ppid=1925 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:18.980000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 18:54:18.986000 audit[1997]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1997 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:18.986000 audit[1997]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffebcdc9210 a2=0 a3=7ffebcdc91fc items=0 ppid=1925 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:18.986000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 18:54:18.992000 audit[1999]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1999 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:18.992000 audit[1999]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff89ee0320 a2=0 a3=7fff89ee030c items=0 ppid=1925 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:18.992000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 18:54:18.996000 audit[2001]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2001 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:18.996000 audit[2001]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff90cce710 a2=0 a3=7fff90cce6fc items=0 ppid=1925 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:18.996000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 18:54:19.004000 audit[2003]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2003 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:19.004000 audit[2003]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd92fbc060 a2=0 a3=7ffd92fbc04c items=0 ppid=1925 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:19.004000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 18:54:19.021000 audit[2006]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2006 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:19.021000 audit[2006]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffcf8dbfcd0 a2=0 a3=7ffcf8dbfcbc items=0 ppid=1925 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:19.021000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 18:54:19.024000 audit[2008]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2008 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:19.024000 audit[2008]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffce4444130 a2=0 a3=7ffce444411c items=0 ppid=1925 pid=2008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:19.024000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 18:54:19.032000 audit[2010]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2010 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:19.032000 audit[2010]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff3afc2bb0 a2=0 a3=7fff3afc2b9c items=0 ppid=1925 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:19.032000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 18:54:19.039000 audit[2012]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2012 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:19.039000 audit[2012]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc0e842fb0 a2=0 a3=7ffc0e842f9c items=0 ppid=1925 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:19.039000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 18:54:19.042025 systemd-networkd[1462]: docker0: Link UP Feb 9 18:54:19.077000 audit[2016]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2016 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:19.077000 audit[2016]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcd3cc0fe0 a2=0 a3=7ffcd3cc0fcc items=0 ppid=1925 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:19.077000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 18:54:19.079000 audit[2017]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2017 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:19.079000 audit[2017]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc6d056a90 a2=0 a3=7ffc6d056a7c items=0 ppid=1925 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:19.079000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 18:54:19.083816 env[1925]: time="2024-02-09T18:54:19.082143972Z" level=info msg="Loading containers: done." Feb 9 18:54:19.102977 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck840403252-merged.mount: Deactivated successfully. Feb 9 18:54:19.120568 env[1925]: time="2024-02-09T18:54:19.120496707Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 18:54:19.120910 env[1925]: time="2024-02-09T18:54:19.120865700Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 18:54:19.121021 env[1925]: time="2024-02-09T18:54:19.120993769Z" level=info msg="Daemon has completed initialization" Feb 9 18:54:19.151385 systemd[1]: Started docker.service. Feb 9 18:54:19.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:19.164523 env[1925]: time="2024-02-09T18:54:19.164380134Z" level=info msg="API listen on /run/docker.sock" Feb 9 18:54:19.191565 systemd[1]: Reloading. Feb 9 18:54:19.329172 /usr/lib/systemd/system-generators/torcx-generator[2066]: time="2024-02-09T18:54:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:54:19.329937 /usr/lib/systemd/system-generators/torcx-generator[2066]: time="2024-02-09T18:54:19Z" level=info msg="torcx already run" Feb 9 18:54:19.513372 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:54:19.513401 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:54:19.538422 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:54:19.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.627000 audit: BPF prog-id=40 op=LOAD Feb 9 18:54:19.627000 audit: BPF prog-id=30 op=UNLOAD Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit: BPF prog-id=41 op=LOAD Feb 9 18:54:19.629000 audit: BPF prog-id=32 op=UNLOAD Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit: BPF prog-id=42 op=LOAD Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.629000 audit: BPF prog-id=43 op=LOAD Feb 9 18:54:19.629000 audit: BPF prog-id=33 op=UNLOAD Feb 9 18:54:19.630000 audit: BPF prog-id=34 op=UNLOAD Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit: BPF prog-id=44 op=LOAD Feb 9 18:54:19.631000 audit: BPF prog-id=27 op=UNLOAD Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit: BPF prog-id=45 op=LOAD Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.631000 audit: BPF prog-id=46 op=LOAD Feb 9 18:54:19.631000 audit: BPF prog-id=28 op=UNLOAD Feb 9 18:54:19.631000 audit: BPF prog-id=29 op=UNLOAD Feb 9 18:54:19.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.633000 audit: BPF prog-id=47 op=LOAD Feb 9 18:54:19.633000 audit: BPF prog-id=38 op=UNLOAD Feb 9 18:54:19.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.634000 audit: BPF prog-id=48 op=LOAD Feb 9 18:54:19.634000 audit: BPF prog-id=35 op=UNLOAD Feb 9 18:54:19.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.634000 audit: BPF prog-id=49 op=LOAD Feb 9 18:54:19.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.634000 audit: BPF prog-id=50 op=LOAD Feb 9 18:54:19.634000 audit: BPF prog-id=36 op=UNLOAD Feb 9 18:54:19.634000 audit: BPF prog-id=37 op=UNLOAD Feb 9 18:54:19.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.640000 audit: BPF prog-id=51 op=LOAD Feb 9 18:54:19.640000 audit: BPF prog-id=21 op=UNLOAD Feb 9 18:54:19.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.641000 audit: BPF prog-id=52 op=LOAD Feb 9 18:54:19.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.641000 audit: BPF prog-id=53 op=LOAD Feb 9 18:54:19.641000 audit: BPF prog-id=22 op=UNLOAD Feb 9 18:54:19.641000 audit: BPF prog-id=23 op=UNLOAD Feb 9 18:54:19.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.649000 audit: BPF prog-id=54 op=LOAD Feb 9 18:54:19.649000 audit: BPF prog-id=26 op=UNLOAD Feb 9 18:54:19.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.651000 audit: BPF prog-id=55 op=LOAD Feb 9 18:54:19.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.651000 audit: BPF prog-id=56 op=LOAD Feb 9 18:54:19.651000 audit: BPF prog-id=24 op=UNLOAD Feb 9 18:54:19.651000 audit: BPF prog-id=25 op=UNLOAD Feb 9 18:54:19.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:19.652000 audit: BPF prog-id=57 op=LOAD Feb 9 18:54:19.652000 audit: BPF prog-id=31 op=UNLOAD Feb 9 18:54:19.687091 systemd[1]: Started kubelet.service. Feb 9 18:54:19.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:19.784336 kubelet[2115]: E0209 18:54:19.784040 2115 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 18:54:19.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 18:54:19.786940 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 18:54:19.787172 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 18:54:20.393919 env[1643]: time="2024-02-09T18:54:20.393884759Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\"" Feb 9 18:54:21.038684 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3800479756.mount: Deactivated successfully. Feb 9 18:54:23.324300 env[1643]: time="2024-02-09T18:54:23.324237335Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:23.327749 env[1643]: time="2024-02-09T18:54:23.327708746Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7968fc5c824ed95404f421a90882835f250220c0fd799b4fceef340dd5585ed5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:23.336346 env[1643]: time="2024-02-09T18:54:23.336300641Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:23.339012 env[1643]: time="2024-02-09T18:54:23.338968989Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:cfcebda74d6e665b68931d3589ee69fde81cd503ff3169888e4502af65579d98,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:23.339924 env[1643]: time="2024-02-09T18:54:23.339888110Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\" returns image reference \"sha256:7968fc5c824ed95404f421a90882835f250220c0fd799b4fceef340dd5585ed5\"" Feb 9 18:54:23.354978 env[1643]: time="2024-02-09T18:54:23.354899475Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\"" Feb 9 18:54:25.887463 env[1643]: time="2024-02-09T18:54:25.887321141Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:25.891955 env[1643]: time="2024-02-09T18:54:25.891909618Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c8134be729ba23c6e0c3e5dd52c393fc8d3cfc688bcec33540f64bb0137b67e0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:25.894798 env[1643]: time="2024-02-09T18:54:25.894757363Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:25.904663 env[1643]: time="2024-02-09T18:54:25.904605794Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fa168ebca1f6dbfe86ef0a690e007531c1f53569274fc7dc2774fe228b6ce8c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:25.905352 env[1643]: time="2024-02-09T18:54:25.905310112Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\" returns image reference \"sha256:c8134be729ba23c6e0c3e5dd52c393fc8d3cfc688bcec33540f64bb0137b67e0\"" Feb 9 18:54:25.923314 env[1643]: time="2024-02-09T18:54:25.923261774Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\"" Feb 9 18:54:27.299319 env[1643]: time="2024-02-09T18:54:27.299180510Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:27.303036 env[1643]: time="2024-02-09T18:54:27.302992680Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5eed9876e7181341b7015e3486dfd234f8e0d0d7d3d19b1bb971d720cd320975,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:27.306543 env[1643]: time="2024-02-09T18:54:27.306395450Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:27.310136 env[1643]: time="2024-02-09T18:54:27.310051142Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09294de61e63987f181077cbc2f5c82463878af9cd8ecc6110c54150c9ae3143,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:27.311592 env[1643]: time="2024-02-09T18:54:27.311548942Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\" returns image reference \"sha256:5eed9876e7181341b7015e3486dfd234f8e0d0d7d3d19b1bb971d720cd320975\"" Feb 9 18:54:27.327390 env[1643]: time="2024-02-09T18:54:27.327331477Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 9 18:54:28.670909 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1470523798.mount: Deactivated successfully. Feb 9 18:54:29.432304 env[1643]: time="2024-02-09T18:54:29.432198963Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:29.435424 env[1643]: time="2024-02-09T18:54:29.435369995Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:29.438549 env[1643]: time="2024-02-09T18:54:29.438509123Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:29.440441 env[1643]: time="2024-02-09T18:54:29.440396282Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:29.440971 env[1643]: time="2024-02-09T18:54:29.440937772Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae\"" Feb 9 18:54:29.455173 env[1643]: time="2024-02-09T18:54:29.455123541Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 18:54:29.805721 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 18:54:29.814407 kernel: kauditd_printk_skb: 292 callbacks suppressed Feb 9 18:54:29.814557 kernel: audit: type=1130 audit(1707504869.804:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:29.814603 kernel: audit: type=1131 audit(1707504869.804:423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:29.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:29.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:29.805993 systemd[1]: Stopped kubelet.service. Feb 9 18:54:29.807958 systemd[1]: Started kubelet.service. Feb 9 18:54:29.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:29.824517 kernel: audit: type=1130 audit(1707504869.806:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:29.891364 kubelet[2155]: E0209 18:54:29.891325 2155 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 18:54:29.896911 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 18:54:29.897297 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 18:54:29.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 18:54:29.903310 kernel: audit: type=1131 audit(1707504869.896:425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 18:54:29.972566 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3248505013.mount: Deactivated successfully. Feb 9 18:54:29.981789 env[1643]: time="2024-02-09T18:54:29.981663201Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:29.985051 env[1643]: time="2024-02-09T18:54:29.985006811Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:29.987729 env[1643]: time="2024-02-09T18:54:29.987694233Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:29.990336 env[1643]: time="2024-02-09T18:54:29.990130128Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:29.990894 env[1643]: time="2024-02-09T18:54:29.990861825Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 9 18:54:30.004067 env[1643]: time="2024-02-09T18:54:30.004022984Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Feb 9 18:54:30.848390 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount386679453.mount: Deactivated successfully. Feb 9 18:54:36.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:36.591838 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 9 18:54:36.599436 kernel: audit: type=1131 audit(1707504876.590:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:36.622520 kernel: audit: type=1334 audit(1707504876.615:427): prog-id=50 op=UNLOAD Feb 9 18:54:36.622651 kernel: audit: type=1334 audit(1707504876.615:428): prog-id=49 op=UNLOAD Feb 9 18:54:36.622691 kernel: audit: type=1334 audit(1707504876.615:429): prog-id=48 op=UNLOAD Feb 9 18:54:36.615000 audit: BPF prog-id=50 op=UNLOAD Feb 9 18:54:36.615000 audit: BPF prog-id=49 op=UNLOAD Feb 9 18:54:36.615000 audit: BPF prog-id=48 op=UNLOAD Feb 9 18:54:36.622887 env[1643]: time="2024-02-09T18:54:36.620037355Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:36.624533 env[1643]: time="2024-02-09T18:54:36.624496311Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:36.626935 env[1643]: time="2024-02-09T18:54:36.626903077Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:36.629325 env[1643]: time="2024-02-09T18:54:36.629272638Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:36.630024 env[1643]: time="2024-02-09T18:54:36.629993655Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\"" Feb 9 18:54:36.647409 env[1643]: time="2024-02-09T18:54:36.647344285Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 9 18:54:37.216293 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4241655053.mount: Deactivated successfully. Feb 9 18:54:38.020845 amazon-ssm-agent[1665]: 2024-02-09 18:54:38 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Feb 9 18:54:38.127497 env[1643]: time="2024-02-09T18:54:38.127445265Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:38.130736 env[1643]: time="2024-02-09T18:54:38.130666850Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:38.138763 env[1643]: time="2024-02-09T18:54:38.138722870Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:38.142556 env[1643]: time="2024-02-09T18:54:38.142498008Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:38.143087 env[1643]: time="2024-02-09T18:54:38.143046495Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 9 18:54:40.055828 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 9 18:54:40.056505 systemd[1]: Stopped kubelet.service. Feb 9 18:54:40.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:40.066308 kernel: audit: type=1130 audit(1707504880.055:430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:40.071567 systemd[1]: Started kubelet.service. Feb 9 18:54:40.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:40.078318 kernel: audit: type=1131 audit(1707504880.055:431): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:40.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:40.089321 kernel: audit: type=1130 audit(1707504880.070:432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:40.182175 kubelet[2232]: E0209 18:54:40.182130 2232 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 18:54:40.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 18:54:40.186018 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 18:54:40.186193 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 18:54:40.192439 kernel: audit: type=1131 audit(1707504880.185:433): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 18:54:41.531851 systemd[1]: Stopped kubelet.service. Feb 9 18:54:41.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:41.543683 kernel: audit: type=1130 audit(1707504881.530:434): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:41.543862 kernel: audit: type=1131 audit(1707504881.530:435): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:41.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:41.557943 systemd[1]: Reloading. Feb 9 18:54:41.675033 /usr/lib/systemd/system-generators/torcx-generator[2262]: time="2024-02-09T18:54:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:54:41.675071 /usr/lib/systemd/system-generators/torcx-generator[2262]: time="2024-02-09T18:54:41Z" level=info msg="torcx already run" Feb 9 18:54:41.775682 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:54:41.775703 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:54:41.802450 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:54:41.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.920436 kernel: audit: type=1400 audit(1707504881.909:436): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.920528 kernel: audit: type=1400 audit(1707504881.909:437): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.925984 kernel: audit: type=1400 audit(1707504881.909:438): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.926138 kernel: audit: type=1400 audit(1707504881.909:439): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.935387 kernel: audit: type=1400 audit(1707504881.909:440): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.935494 kernel: audit: type=1400 audit(1707504881.909:441): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.940501 kernel: audit: type=1400 audit(1707504881.909:442): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.950539 kernel: audit: type=1400 audit(1707504881.909:443): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.950657 kernel: audit: type=1400 audit(1707504881.909:444): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.919000 audit: BPF prog-id=58 op=LOAD Feb 9 18:54:41.919000 audit: BPF prog-id=40 op=UNLOAD Feb 9 18:54:41.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.962304 kernel: audit: type=1400 audit(1707504881.919:445): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.929000 audit: BPF prog-id=59 op=LOAD Feb 9 18:54:41.929000 audit: BPF prog-id=41 op=UNLOAD Feb 9 18:54:41.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.949000 audit: BPF prog-id=60 op=LOAD Feb 9 18:54:41.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.955000 audit: BPF prog-id=61 op=LOAD Feb 9 18:54:41.955000 audit: BPF prog-id=42 op=UNLOAD Feb 9 18:54:41.955000 audit: BPF prog-id=43 op=UNLOAD Feb 9 18:54:41.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.960000 audit: BPF prog-id=62 op=LOAD Feb 9 18:54:41.960000 audit: BPF prog-id=44 op=UNLOAD Feb 9 18:54:41.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.960000 audit: BPF prog-id=63 op=LOAD Feb 9 18:54:41.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.960000 audit: BPF prog-id=64 op=LOAD Feb 9 18:54:41.960000 audit: BPF prog-id=45 op=UNLOAD Feb 9 18:54:41.960000 audit: BPF prog-id=46 op=UNLOAD Feb 9 18:54:41.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.962000 audit: BPF prog-id=65 op=LOAD Feb 9 18:54:41.962000 audit: BPF prog-id=47 op=UNLOAD Feb 9 18:54:41.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.979000 audit: BPF prog-id=66 op=LOAD Feb 9 18:54:41.979000 audit: BPF prog-id=51 op=UNLOAD Feb 9 18:54:41.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.979000 audit: BPF prog-id=67 op=LOAD Feb 9 18:54:41.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.980000 audit: BPF prog-id=68 op=LOAD Feb 9 18:54:41.980000 audit: BPF prog-id=52 op=UNLOAD Feb 9 18:54:41.980000 audit: BPF prog-id=53 op=UNLOAD Feb 9 18:54:41.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.982000 audit: BPF prog-id=69 op=LOAD Feb 9 18:54:41.982000 audit: BPF prog-id=54 op=UNLOAD Feb 9 18:54:41.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.982000 audit: BPF prog-id=70 op=LOAD Feb 9 18:54:41.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.983000 audit: BPF prog-id=71 op=LOAD Feb 9 18:54:41.983000 audit: BPF prog-id=55 op=UNLOAD Feb 9 18:54:41.983000 audit: BPF prog-id=56 op=UNLOAD Feb 9 18:54:41.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:41.983000 audit: BPF prog-id=72 op=LOAD Feb 9 18:54:41.984000 audit: BPF prog-id=57 op=UNLOAD Feb 9 18:54:42.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:42.023996 systemd[1]: Started kubelet.service. Feb 9 18:54:42.106270 kubelet[2314]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 18:54:42.106270 kubelet[2314]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 18:54:42.106270 kubelet[2314]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 18:54:42.107182 kubelet[2314]: I0209 18:54:42.106769 2314 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 18:54:42.504414 kubelet[2314]: I0209 18:54:42.504160 2314 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 9 18:54:42.504414 kubelet[2314]: I0209 18:54:42.504188 2314 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 18:54:42.506051 kubelet[2314]: I0209 18:54:42.506025 2314 server.go:837] "Client rotation is on, will bootstrap in background" Feb 9 18:54:42.511723 kubelet[2314]: E0209 18:54:42.511694 2314 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.21.122:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.21.122:6443: connect: connection refused Feb 9 18:54:42.512061 kubelet[2314]: I0209 18:54:42.512038 2314 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 18:54:42.513760 kubelet[2314]: I0209 18:54:42.513739 2314 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 18:54:42.514094 kubelet[2314]: I0209 18:54:42.514074 2314 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 18:54:42.514336 kubelet[2314]: I0209 18:54:42.514167 2314 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 18:54:42.514571 kubelet[2314]: I0209 18:54:42.514349 2314 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 18:54:42.514571 kubelet[2314]: I0209 18:54:42.514366 2314 container_manager_linux.go:302] "Creating device plugin manager" Feb 9 18:54:42.514571 kubelet[2314]: I0209 18:54:42.514559 2314 state_mem.go:36] "Initialized new in-memory state store" Feb 9 18:54:42.520424 kubelet[2314]: I0209 18:54:42.520401 2314 kubelet.go:405] "Attempting to sync node with API server" Feb 9 18:54:42.520591 kubelet[2314]: I0209 18:54:42.520580 2314 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 18:54:42.520842 kubelet[2314]: I0209 18:54:42.520828 2314 kubelet.go:309] "Adding apiserver pod source" Feb 9 18:54:42.520939 kubelet[2314]: I0209 18:54:42.520930 2314 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 18:54:42.525066 kubelet[2314]: I0209 18:54:42.525042 2314 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 18:54:42.525592 kubelet[2314]: W0209 18:54:42.525574 2314 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 18:54:42.526456 kubelet[2314]: I0209 18:54:42.526436 2314 server.go:1168] "Started kubelet" Feb 9 18:54:42.526889 kubelet[2314]: W0209 18:54:42.526680 2314 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.21.122:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-21-122&limit=500&resourceVersion=0": dial tcp 172.31.21.122:6443: connect: connection refused Feb 9 18:54:42.527102 kubelet[2314]: E0209 18:54:42.527036 2314 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.21.122:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-21-122&limit=500&resourceVersion=0": dial tcp 172.31.21.122:6443: connect: connection refused Feb 9 18:54:42.528000 audit[2314]: AVC avc: denied { mac_admin } for pid=2314 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:42.528000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:54:42.528000 audit[2314]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a230e0 a1=c000a1aae0 a2=c000a230b0 a3=25 items=0 ppid=1 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:42.528000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:54:42.528000 audit[2314]: AVC avc: denied { mac_admin } for pid=2314 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:42.528000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:54:42.528000 audit[2314]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e90a80 a1=c000a1aaf8 a2=c000a23170 a3=25 items=0 ppid=1 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:42.528000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:54:42.530624 kubelet[2314]: I0209 18:54:42.530060 2314 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 18:54:42.530624 kubelet[2314]: I0209 18:54:42.530107 2314 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 18:54:42.530624 kubelet[2314]: I0209 18:54:42.530262 2314 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 18:54:42.533106 kubelet[2314]: W0209 18:54:42.533051 2314 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.21.122:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.21.122:6443: connect: connection refused Feb 9 18:54:42.533265 kubelet[2314]: E0209 18:54:42.533252 2314 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.21.122:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.21.122:6443: connect: connection refused Feb 9 18:54:42.533931 kubelet[2314]: E0209 18:54:42.533913 2314 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 18:54:42.534062 kubelet[2314]: E0209 18:54:42.534050 2314 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 18:54:42.534350 kubelet[2314]: E0209 18:54:42.534246 2314 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-21-122.17b246a4d73b2dd8", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-21-122", UID:"ip-172-31-21-122", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-21-122"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 54, 42, 526399960, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 54, 42, 526399960, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://172.31.21.122:6443/api/v1/namespaces/default/events": dial tcp 172.31.21.122:6443: connect: connection refused'(may retry after sleeping) Feb 9 18:54:42.537588 kubelet[2314]: I0209 18:54:42.537560 2314 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 18:54:42.538499 kubelet[2314]: I0209 18:54:42.538474 2314 server.go:461] "Adding debug handlers to kubelet server" Feb 9 18:54:42.539839 kubelet[2314]: I0209 18:54:42.539814 2314 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 18:54:42.541047 kubelet[2314]: I0209 18:54:42.540538 2314 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 9 18:54:42.541047 kubelet[2314]: I0209 18:54:42.540631 2314 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 9 18:54:42.541177 kubelet[2314]: W0209 18:54:42.541126 2314 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.21.122:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.21.122:6443: connect: connection refused Feb 9 18:54:42.541226 kubelet[2314]: E0209 18:54:42.541178 2314 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.21.122:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.21.122:6443: connect: connection refused Feb 9 18:54:42.543959 kubelet[2314]: E0209 18:54:42.541548 2314 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.122:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-122?timeout=10s\": dial tcp 172.31.21.122:6443: connect: connection refused" interval="200ms" Feb 9 18:54:42.544000 audit[2324]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:42.544000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff11f58080 a2=0 a3=7fff11f5806c items=0 ppid=2314 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:42.544000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 18:54:42.548000 audit[2325]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:42.548000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd199d3f0 a2=0 a3=7fffd199d3dc items=0 ppid=2314 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:42.548000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 18:54:42.553000 audit[2327]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:42.553000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe4aa00ee0 a2=0 a3=7ffe4aa00ecc items=0 ppid=2314 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:42.553000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:54:42.556000 audit[2329]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:42.556000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe82f7ff30 a2=0 a3=7ffe82f7ff1c items=0 ppid=2314 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:42.556000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:54:42.596000 audit[2335]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:42.596000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd0f93ff00 a2=0 a3=7ffd0f93feec items=0 ppid=2314 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:42.596000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 18:54:42.600661 kubelet[2314]: I0209 18:54:42.600618 2314 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 18:54:42.603000 audit[2339]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:54:42.603000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc74d9de10 a2=0 a3=7ffc74d9ddfc items=0 ppid=2314 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:42.603000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 18:54:42.607600 kubelet[2314]: I0209 18:54:42.607572 2314 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 18:54:42.607967 kubelet[2314]: I0209 18:54:42.607687 2314 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 9 18:54:42.607967 kubelet[2314]: I0209 18:54:42.607717 2314 kubelet.go:2257] "Starting kubelet main sync loop" Feb 9 18:54:42.607967 kubelet[2314]: E0209 18:54:42.607774 2314 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 18:54:42.613000 audit[2340]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:42.613000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca1e1b030 a2=0 a3=7ffca1e1b01c items=0 ppid=2314 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:42.613000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 18:54:42.616127 kubelet[2314]: W0209 18:54:42.616095 2314 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.21.122:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.122:6443: connect: connection refused Feb 9 18:54:42.616310 kubelet[2314]: E0209 18:54:42.616140 2314 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.21.122:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.122:6443: connect: connection refused Feb 9 18:54:42.617000 audit[2341]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:54:42.617000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe86fd5d70 a2=0 a3=7ffe86fd5d5c items=0 ppid=2314 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:42.617000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 18:54:42.623000 audit[2342]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=2342 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:54:42.623000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe993a5fb0 a2=0 a3=7ffe993a5f9c items=0 ppid=2314 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:42.623000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 18:54:42.627753 kubelet[2314]: I0209 18:54:42.627727 2314 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 18:54:42.627753 kubelet[2314]: I0209 18:54:42.627749 2314 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 18:54:42.628088 kubelet[2314]: I0209 18:54:42.627767 2314 state_mem.go:36] "Initialized new in-memory state store" Feb 9 18:54:42.628000 audit[2343]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:42.628000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd468ee960 a2=0 a3=7ffd468ee94c items=0 ppid=2314 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:42.628000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 18:54:42.631953 kubelet[2314]: I0209 18:54:42.631928 2314 policy_none.go:49] "None policy: Start" Feb 9 18:54:42.630000 audit[2344]: NETFILTER_CFG table=filter:36 family=10 entries=2 op=nft_register_chain pid=2344 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:54:42.630000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff7777b1f0 a2=0 a3=7fff7777b1dc items=0 ppid=2314 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:42.630000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 18:54:42.633110 kubelet[2314]: I0209 18:54:42.633095 2314 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 18:54:42.633245 kubelet[2314]: I0209 18:54:42.633234 2314 state_mem.go:35] "Initializing new in-memory state store" Feb 9 18:54:42.632000 audit[2345]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:54:42.632000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcdcfa6ab0 a2=0 a3=7ffcdcfa6a9c items=0 ppid=2314 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:42.632000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 18:54:42.640515 systemd[1]: Created slice kubepods.slice. Feb 9 18:54:42.644270 kubelet[2314]: I0209 18:54:42.644244 2314 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-122" Feb 9 18:54:42.644727 kubelet[2314]: E0209 18:54:42.644641 2314 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.21.122:6443/api/v1/nodes\": dial tcp 172.31.21.122:6443: connect: connection refused" node="ip-172-31-21-122" Feb 9 18:54:42.646141 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 18:54:42.648978 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 18:54:42.655108 kubelet[2314]: I0209 18:54:42.655075 2314 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 18:54:42.653000 audit[2314]: AVC avc: denied { mac_admin } for pid=2314 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:42.653000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:54:42.653000 audit[2314]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000fd0c00 a1=c000fda8a0 a2=c000fd0bd0 a3=25 items=0 ppid=1 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:42.653000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:54:42.655546 kubelet[2314]: I0209 18:54:42.655154 2314 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 18:54:42.655546 kubelet[2314]: I0209 18:54:42.655401 2314 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 18:54:42.658646 kubelet[2314]: E0209 18:54:42.658467 2314 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-21-122\" not found" Feb 9 18:54:42.708173 kubelet[2314]: I0209 18:54:42.708132 2314 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:54:42.709956 kubelet[2314]: I0209 18:54:42.709931 2314 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:54:42.711376 kubelet[2314]: I0209 18:54:42.711357 2314 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:54:42.718606 systemd[1]: Created slice kubepods-burstable-pod4be57714e5b909b6594466af2fde44fb.slice. Feb 9 18:54:42.729660 systemd[1]: Created slice kubepods-burstable-pod0c1c8a58dec3b6e0763bbeb61681e634.slice. Feb 9 18:54:42.735234 systemd[1]: Created slice kubepods-burstable-pod6f54d988863da50445106db14bbf476e.slice. Feb 9 18:54:42.742060 kubelet[2314]: E0209 18:54:42.742025 2314 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.122:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-122?timeout=10s\": dial tcp 172.31.21.122:6443: connect: connection refused" interval="400ms" Feb 9 18:54:42.842460 kubelet[2314]: I0209 18:54:42.842406 2314 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6f54d988863da50445106db14bbf476e-ca-certs\") pod \"kube-controller-manager-ip-172-31-21-122\" (UID: \"6f54d988863da50445106db14bbf476e\") " pod="kube-system/kube-controller-manager-ip-172-31-21-122" Feb 9 18:54:42.842460 kubelet[2314]: I0209 18:54:42.842466 2314 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6f54d988863da50445106db14bbf476e-k8s-certs\") pod \"kube-controller-manager-ip-172-31-21-122\" (UID: \"6f54d988863da50445106db14bbf476e\") " pod="kube-system/kube-controller-manager-ip-172-31-21-122" Feb 9 18:54:42.842753 kubelet[2314]: I0209 18:54:42.842506 2314 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6f54d988863da50445106db14bbf476e-kubeconfig\") pod \"kube-controller-manager-ip-172-31-21-122\" (UID: \"6f54d988863da50445106db14bbf476e\") " pod="kube-system/kube-controller-manager-ip-172-31-21-122" Feb 9 18:54:42.842753 kubelet[2314]: I0209 18:54:42.842583 2314 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0c1c8a58dec3b6e0763bbeb61681e634-kubeconfig\") pod \"kube-scheduler-ip-172-31-21-122\" (UID: \"0c1c8a58dec3b6e0763bbeb61681e634\") " pod="kube-system/kube-scheduler-ip-172-31-21-122" Feb 9 18:54:42.842753 kubelet[2314]: I0209 18:54:42.842621 2314 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4be57714e5b909b6594466af2fde44fb-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-21-122\" (UID: \"4be57714e5b909b6594466af2fde44fb\") " pod="kube-system/kube-apiserver-ip-172-31-21-122" Feb 9 18:54:42.842753 kubelet[2314]: I0209 18:54:42.842652 2314 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4be57714e5b909b6594466af2fde44fb-k8s-certs\") pod \"kube-apiserver-ip-172-31-21-122\" (UID: \"4be57714e5b909b6594466af2fde44fb\") " pod="kube-system/kube-apiserver-ip-172-31-21-122" Feb 9 18:54:42.842753 kubelet[2314]: I0209 18:54:42.842678 2314 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/6f54d988863da50445106db14bbf476e-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-21-122\" (UID: \"6f54d988863da50445106db14bbf476e\") " pod="kube-system/kube-controller-manager-ip-172-31-21-122" Feb 9 18:54:42.842967 kubelet[2314]: I0209 18:54:42.842715 2314 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6f54d988863da50445106db14bbf476e-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-21-122\" (UID: \"6f54d988863da50445106db14bbf476e\") " pod="kube-system/kube-controller-manager-ip-172-31-21-122" Feb 9 18:54:42.842967 kubelet[2314]: I0209 18:54:42.842749 2314 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4be57714e5b909b6594466af2fde44fb-ca-certs\") pod \"kube-apiserver-ip-172-31-21-122\" (UID: \"4be57714e5b909b6594466af2fde44fb\") " pod="kube-system/kube-apiserver-ip-172-31-21-122" Feb 9 18:54:42.847363 kubelet[2314]: I0209 18:54:42.847329 2314 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-122" Feb 9 18:54:42.847951 kubelet[2314]: E0209 18:54:42.847751 2314 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.21.122:6443/api/v1/nodes\": dial tcp 172.31.21.122:6443: connect: connection refused" node="ip-172-31-21-122" Feb 9 18:54:43.027683 env[1643]: time="2024-02-09T18:54:43.027633863Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-21-122,Uid:4be57714e5b909b6594466af2fde44fb,Namespace:kube-system,Attempt:0,}" Feb 9 18:54:43.035606 env[1643]: time="2024-02-09T18:54:43.035551703Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-21-122,Uid:0c1c8a58dec3b6e0763bbeb61681e634,Namespace:kube-system,Attempt:0,}" Feb 9 18:54:43.043341 env[1643]: time="2024-02-09T18:54:43.043169606Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-21-122,Uid:6f54d988863da50445106db14bbf476e,Namespace:kube-system,Attempt:0,}" Feb 9 18:54:43.143183 kubelet[2314]: E0209 18:54:43.143083 2314 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.122:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-122?timeout=10s\": dial tcp 172.31.21.122:6443: connect: connection refused" interval="800ms" Feb 9 18:54:43.250307 kubelet[2314]: I0209 18:54:43.250267 2314 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-122" Feb 9 18:54:43.250623 kubelet[2314]: E0209 18:54:43.250593 2314 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.21.122:6443/api/v1/nodes\": dial tcp 172.31.21.122:6443: connect: connection refused" node="ip-172-31-21-122" Feb 9 18:54:43.544450 kubelet[2314]: W0209 18:54:43.543909 2314 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.21.122:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.122:6443: connect: connection refused Feb 9 18:54:43.544450 kubelet[2314]: E0209 18:54:43.544109 2314 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.21.122:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.122:6443: connect: connection refused Feb 9 18:54:43.551702 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1691891580.mount: Deactivated successfully. Feb 9 18:54:43.563442 env[1643]: time="2024-02-09T18:54:43.563396176Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:43.566370 env[1643]: time="2024-02-09T18:54:43.566327976Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:43.568072 env[1643]: time="2024-02-09T18:54:43.568030644Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:43.569827 env[1643]: time="2024-02-09T18:54:43.569783318Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:43.574768 env[1643]: time="2024-02-09T18:54:43.574725367Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:43.576268 env[1643]: time="2024-02-09T18:54:43.576231275Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:43.578457 env[1643]: time="2024-02-09T18:54:43.578419283Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:43.580233 env[1643]: time="2024-02-09T18:54:43.580197564Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:43.582228 env[1643]: time="2024-02-09T18:54:43.582189400Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:43.583655 env[1643]: time="2024-02-09T18:54:43.583575773Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:43.585112 env[1643]: time="2024-02-09T18:54:43.585033504Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:43.593798 env[1643]: time="2024-02-09T18:54:43.593744000Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:54:43.731545 env[1643]: time="2024-02-09T18:54:43.726553233Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:54:43.731545 env[1643]: time="2024-02-09T18:54:43.726614156Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:54:43.731545 env[1643]: time="2024-02-09T18:54:43.726631670Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:54:43.731545 env[1643]: time="2024-02-09T18:54:43.726766980Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9e751667eac6013cb5a591d75f7feba23866c603e8bf41737617c3fa2127a5bd pid=2354 runtime=io.containerd.runc.v2 Feb 9 18:54:43.753028 kubelet[2314]: W0209 18:54:43.752923 2314 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.21.122:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.21.122:6443: connect: connection refused Feb 9 18:54:43.753028 kubelet[2314]: E0209 18:54:43.752980 2314 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.21.122:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.21.122:6443: connect: connection refused Feb 9 18:54:43.757057 env[1643]: time="2024-02-09T18:54:43.756946493Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:54:43.757057 env[1643]: time="2024-02-09T18:54:43.757022249Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:54:43.757488 env[1643]: time="2024-02-09T18:54:43.757040450Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:54:43.757488 env[1643]: time="2024-02-09T18:54:43.757357930Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2d7627842dd1b3d14bbe2cfa80e03db895b29cd3338f2236639f7c25d058bb46 pid=2374 runtime=io.containerd.runc.v2 Feb 9 18:54:43.762491 env[1643]: time="2024-02-09T18:54:43.762209967Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:54:43.762491 env[1643]: time="2024-02-09T18:54:43.762267979Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:54:43.762491 env[1643]: time="2024-02-09T18:54:43.762304920Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:54:43.762748 env[1643]: time="2024-02-09T18:54:43.762584988Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d04fbe026763491a3bf37e276e9bde3c63d7c9f97e6d7d7116d5a19f7199c14f pid=2385 runtime=io.containerd.runc.v2 Feb 9 18:54:43.783176 systemd[1]: Started cri-containerd-2d7627842dd1b3d14bbe2cfa80e03db895b29cd3338f2236639f7c25d058bb46.scope. Feb 9 18:54:43.812083 systemd[1]: Started cri-containerd-9e751667eac6013cb5a591d75f7feba23866c603e8bf41737617c3fa2127a5bd.scope. Feb 9 18:54:43.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.820000 audit: BPF prog-id=73 op=LOAD Feb 9 18:54:43.822000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.822000 audit[2396]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2374 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:43.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264373632373834326464316233643134626265326366613830653033 Feb 9 18:54:43.826000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.826000 audit[2396]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2374 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:43.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264373632373834326464316233643134626265326366613830653033 Feb 9 18:54:43.827000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.827000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.827000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.827000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.827000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.827000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.827000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.827000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.827000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.827000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.827000 audit: BPF prog-id=74 op=LOAD Feb 9 18:54:43.827000 audit[2396]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002a1be0 items=0 ppid=2374 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:43.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264373632373834326464316233643134626265326366613830653033 Feb 9 18:54:43.828000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.828000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.828000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.828000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.828000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.828000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.828000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.828000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.828000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.828000 audit: BPF prog-id=75 op=LOAD Feb 9 18:54:43.828000 audit[2396]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002a1c28 items=0 ppid=2374 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:43.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264373632373834326464316233643134626265326366613830653033 Feb 9 18:54:43.829000 audit: BPF prog-id=75 op=UNLOAD Feb 9 18:54:43.829000 audit: BPF prog-id=74 op=UNLOAD Feb 9 18:54:43.829000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.829000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.829000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.829000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.829000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.829000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.829000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.829000 audit[2396]: AVC avc: denied { perfmon } for pid=2396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.829000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.829000 audit[2396]: AVC avc: denied { bpf } for pid=2396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.829000 audit: BPF prog-id=76 op=LOAD Feb 9 18:54:43.829000 audit[2396]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00030e038 items=0 ppid=2374 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:43.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264373632373834326464316233643134626265326366613830653033 Feb 9 18:54:43.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.857000 audit: BPF prog-id=77 op=LOAD Feb 9 18:54:43.858000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.858000 audit[2369]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2354 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:43.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965373531363637656163363031336362356135393164373566376665 Feb 9 18:54:43.858000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.858000 audit[2369]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2354 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:43.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965373531363637656163363031336362356135393164373566376665 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit: BPF prog-id=78 op=LOAD Feb 9 18:54:43.859000 audit[2369]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002848e0 items=0 ppid=2354 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:43.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965373531363637656163363031336362356135393164373566376665 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit: BPF prog-id=79 op=LOAD Feb 9 18:54:43.859000 audit[2369]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000284928 items=0 ppid=2354 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:43.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965373531363637656163363031336362356135393164373566376665 Feb 9 18:54:43.859000 audit: BPF prog-id=79 op=UNLOAD Feb 9 18:54:43.859000 audit: BPF prog-id=78 op=UNLOAD Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.859000 audit: BPF prog-id=80 op=LOAD Feb 9 18:54:43.859000 audit[2369]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000284d38 items=0 ppid=2354 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:43.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965373531363637656163363031336362356135393164373566376665 Feb 9 18:54:43.894695 systemd[1]: Started cri-containerd-d04fbe026763491a3bf37e276e9bde3c63d7c9f97e6d7d7116d5a19f7199c14f.scope. Feb 9 18:54:43.944478 kubelet[2314]: E0209 18:54:43.944442 2314 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.122:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-122?timeout=10s\": dial tcp 172.31.21.122:6443: connect: connection refused" interval="1.6s" Feb 9 18:54:43.945242 env[1643]: time="2024-02-09T18:54:43.945199841Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-21-122,Uid:4be57714e5b909b6594466af2fde44fb,Namespace:kube-system,Attempt:0,} returns sandbox id \"2d7627842dd1b3d14bbe2cfa80e03db895b29cd3338f2236639f7c25d058bb46\"" Feb 9 18:54:43.950595 env[1643]: time="2024-02-09T18:54:43.950550319Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-21-122,Uid:6f54d988863da50445106db14bbf476e,Namespace:kube-system,Attempt:0,} returns sandbox id \"9e751667eac6013cb5a591d75f7feba23866c603e8bf41737617c3fa2127a5bd\"" Feb 9 18:54:43.962872 env[1643]: time="2024-02-09T18:54:43.961193421Z" level=info msg="CreateContainer within sandbox \"2d7627842dd1b3d14bbe2cfa80e03db895b29cd3338f2236639f7c25d058bb46\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 18:54:43.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.965000 audit: BPF prog-id=81 op=LOAD Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2385 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:43.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430346662653032363736333439316133626633376532373665396264 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2385 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:43.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430346662653032363736333439316133626633376532373665396264 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit: BPF prog-id=82 op=LOAD Feb 9 18:54:43.969000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d4570 items=0 ppid=2385 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:43.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430346662653032363736333439316133626633376532373665396264 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit: BPF prog-id=83 op=LOAD Feb 9 18:54:43.969000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d45b8 items=0 ppid=2385 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:43.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430346662653032363736333439316133626633376532373665396264 Feb 9 18:54:43.969000 audit: BPF prog-id=83 op=UNLOAD Feb 9 18:54:43.969000 audit: BPF prog-id=82 op=UNLOAD Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { perfmon } for pid=2410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit[2410]: AVC avc: denied { bpf } for pid=2410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:43.969000 audit: BPF prog-id=84 op=LOAD Feb 9 18:54:43.969000 audit[2410]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d49c8 items=0 ppid=2385 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:43.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430346662653032363736333439316133626633376532373665396264 Feb 9 18:54:43.986514 env[1643]: time="2024-02-09T18:54:43.986409351Z" level=info msg="CreateContainer within sandbox \"9e751667eac6013cb5a591d75f7feba23866c603e8bf41737617c3fa2127a5bd\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 18:54:44.005037 env[1643]: time="2024-02-09T18:54:44.004966808Z" level=info msg="CreateContainer within sandbox \"2d7627842dd1b3d14bbe2cfa80e03db895b29cd3338f2236639f7c25d058bb46\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"1639e47cf45a98fb8bd982c0fe24ca62efcb490ca6b2a480b5ada3c1026210e2\"" Feb 9 18:54:44.006314 env[1643]: time="2024-02-09T18:54:44.006263522Z" level=info msg="StartContainer for \"1639e47cf45a98fb8bd982c0fe24ca62efcb490ca6b2a480b5ada3c1026210e2\"" Feb 9 18:54:44.037682 env[1643]: time="2024-02-09T18:54:44.037076272Z" level=info msg="CreateContainer within sandbox \"9e751667eac6013cb5a591d75f7feba23866c603e8bf41737617c3fa2127a5bd\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"d4ca606d7f6f111e63dc2d987ca1e04908bdfe920dddf35edd0788a95966d538\"" Feb 9 18:54:44.041396 env[1643]: time="2024-02-09T18:54:44.041326664Z" level=info msg="StartContainer for \"d4ca606d7f6f111e63dc2d987ca1e04908bdfe920dddf35edd0788a95966d538\"" Feb 9 18:54:44.054068 kubelet[2314]: I0209 18:54:44.053676 2314 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-122" Feb 9 18:54:44.054068 kubelet[2314]: E0209 18:54:44.054042 2314 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.21.122:6443/api/v1/nodes\": dial tcp 172.31.21.122:6443: connect: connection refused" node="ip-172-31-21-122" Feb 9 18:54:44.066985 systemd[1]: Started cri-containerd-1639e47cf45a98fb8bd982c0fe24ca62efcb490ca6b2a480b5ada3c1026210e2.scope. Feb 9 18:54:44.086668 env[1643]: time="2024-02-09T18:54:44.086609671Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-21-122,Uid:0c1c8a58dec3b6e0763bbeb61681e634,Namespace:kube-system,Attempt:0,} returns sandbox id \"d04fbe026763491a3bf37e276e9bde3c63d7c9f97e6d7d7116d5a19f7199c14f\"" Feb 9 18:54:44.097519 kubelet[2314]: W0209 18:54:44.097452 2314 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.21.122:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-21-122&limit=500&resourceVersion=0": dial tcp 172.31.21.122:6443: connect: connection refused Feb 9 18:54:44.097519 kubelet[2314]: E0209 18:54:44.097515 2314 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.21.122:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-21-122&limit=500&resourceVersion=0": dial tcp 172.31.21.122:6443: connect: connection refused Feb 9 18:54:44.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.098000 audit: BPF prog-id=85 op=LOAD Feb 9 18:54:44.100851 kubelet[2314]: W0209 18:54:44.100028 2314 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.21.122:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.21.122:6443: connect: connection refused Feb 9 18:54:44.100851 kubelet[2314]: E0209 18:54:44.100107 2314 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.21.122:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.21.122:6443: connect: connection refused Feb 9 18:54:44.101175 env[1643]: time="2024-02-09T18:54:44.101132869Z" level=info msg="CreateContainer within sandbox \"d04fbe026763491a3bf37e276e9bde3c63d7c9f97e6d7d7116d5a19f7199c14f\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2374 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:44.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136333965343763663435613938666238626439383263306665323463 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2374 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:44.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136333965343763663435613938666238626439383263306665323463 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit: BPF prog-id=86 op=LOAD Feb 9 18:54:44.101000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002843d0 items=0 ppid=2374 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:44.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136333965343763663435613938666238626439383263306665323463 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit: BPF prog-id=87 op=LOAD Feb 9 18:54:44.101000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000284418 items=0 ppid=2374 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:44.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136333965343763663435613938666238626439383263306665323463 Feb 9 18:54:44.101000 audit: BPF prog-id=87 op=UNLOAD Feb 9 18:54:44.101000 audit: BPF prog-id=86 op=UNLOAD Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.101000 audit: BPF prog-id=88 op=LOAD Feb 9 18:54:44.101000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000284828 items=0 ppid=2374 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:44.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136333965343763663435613938666238626439383263306665323463 Feb 9 18:54:44.122862 systemd[1]: Started cri-containerd-d4ca606d7f6f111e63dc2d987ca1e04908bdfe920dddf35edd0788a95966d538.scope. Feb 9 18:54:44.140871 env[1643]: time="2024-02-09T18:54:44.140794548Z" level=info msg="CreateContainer within sandbox \"d04fbe026763491a3bf37e276e9bde3c63d7c9f97e6d7d7116d5a19f7199c14f\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"186987e3c8c5845fbf131957b109ec5baaf57beec6e4516bb22b552db4d4503e\"" Feb 9 18:54:44.141844 env[1643]: time="2024-02-09T18:54:44.141806753Z" level=info msg="StartContainer for \"186987e3c8c5845fbf131957b109ec5baaf57beec6e4516bb22b552db4d4503e\"" Feb 9 18:54:44.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.170000 audit: BPF prog-id=89 op=LOAD Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2354 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:44.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434636136303664376636663131316536336463326439383763613165 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2354 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:44.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434636136303664376636663131316536336463326439383763613165 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit: BPF prog-id=90 op=LOAD Feb 9 18:54:44.172000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003a29a0 items=0 ppid=2354 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:44.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434636136303664376636663131316536336463326439383763613165 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit: BPF prog-id=91 op=LOAD Feb 9 18:54:44.172000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003a29e8 items=0 ppid=2354 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:44.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434636136303664376636663131316536336463326439383763613165 Feb 9 18:54:44.172000 audit: BPF prog-id=91 op=UNLOAD Feb 9 18:54:44.172000 audit: BPF prog-id=90 op=UNLOAD Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.172000 audit: BPF prog-id=92 op=LOAD Feb 9 18:54:44.172000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003a2df8 items=0 ppid=2354 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:44.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434636136303664376636663131316536336463326439383763613165 Feb 9 18:54:44.187699 env[1643]: time="2024-02-09T18:54:44.185663288Z" level=info msg="StartContainer for \"1639e47cf45a98fb8bd982c0fe24ca62efcb490ca6b2a480b5ada3c1026210e2\" returns successfully" Feb 9 18:54:44.199930 systemd[1]: Started cri-containerd-186987e3c8c5845fbf131957b109ec5baaf57beec6e4516bb22b552db4d4503e.scope. Feb 9 18:54:44.233979 env[1643]: time="2024-02-09T18:54:44.233894635Z" level=info msg="StartContainer for \"d4ca606d7f6f111e63dc2d987ca1e04908bdfe920dddf35edd0788a95966d538\" returns successfully" Feb 9 18:54:44.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.236000 audit: BPF prog-id=93 op=LOAD Feb 9 18:54:44.237000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.237000 audit[2540]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2385 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:44.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138363938376533633863353834356662663133313935376231303965 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit[2540]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2385 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:44.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138363938376533633863353834356662663133313935376231303965 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit: BPF prog-id=94 op=LOAD Feb 9 18:54:44.238000 audit[2540]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003e2080 items=0 ppid=2385 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:44.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138363938376533633863353834356662663133313935376231303965 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit: BPF prog-id=95 op=LOAD Feb 9 18:54:44.238000 audit[2540]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003e20c8 items=0 ppid=2385 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:44.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138363938376533633863353834356662663133313935376231303965 Feb 9 18:54:44.238000 audit: BPF prog-id=95 op=UNLOAD Feb 9 18:54:44.238000 audit: BPF prog-id=94 op=UNLOAD Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:44.238000 audit: BPF prog-id=96 op=LOAD Feb 9 18:54:44.238000 audit[2540]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003e24d8 items=0 ppid=2385 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:44.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138363938376533633863353834356662663133313935376231303965 Feb 9 18:54:44.282992 env[1643]: time="2024-02-09T18:54:44.282940675Z" level=info msg="StartContainer for \"186987e3c8c5845fbf131957b109ec5baaf57beec6e4516bb22b552db4d4503e\" returns successfully" Feb 9 18:54:44.614542 kubelet[2314]: E0209 18:54:44.614504 2314 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.21.122:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.21.122:6443: connect: connection refused Feb 9 18:54:45.340873 kubelet[2314]: W0209 18:54:45.340802 2314 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.21.122:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.122:6443: connect: connection refused Feb 9 18:54:45.340873 kubelet[2314]: E0209 18:54:45.340880 2314 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.21.122:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.122:6443: connect: connection refused Feb 9 18:54:45.545788 kubelet[2314]: E0209 18:54:45.545746 2314 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.122:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-122?timeout=10s\": dial tcp 172.31.21.122:6443: connect: connection refused" interval="3.2s" Feb 9 18:54:45.657083 kubelet[2314]: I0209 18:54:45.656980 2314 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-122" Feb 9 18:54:46.093000 audit[2518]: AVC avc: denied { watch } for pid=2518 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:54:46.093000 audit[2518]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000322750 a2=fc6 a3=0 items=0 ppid=2354 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 key=(null) Feb 9 18:54:46.093000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:54:46.095000 audit[2518]: AVC avc: denied { watch } for pid=2518 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:54:46.095000 audit[2518]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0000577c0 a2=fc6 a3=0 items=0 ppid=2354 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 key=(null) Feb 9 18:54:46.095000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:54:47.598000 audit[2496]: AVC avc: denied { watch } for pid=2496 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:54:47.601341 kernel: kauditd_printk_skb: 559 callbacks suppressed Feb 9 18:54:47.601413 kernel: audit: type=1400 audit(1707504887.598:734): avc: denied { watch } for pid=2496 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:54:47.600000 audit[2496]: AVC avc: denied { watch } for pid=2496 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:54:47.612563 kernel: audit: type=1400 audit(1707504887.600:735): avc: denied { watch } for pid=2496 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:54:47.619630 kernel: audit: type=1300 audit(1707504887.600:735): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00ab3d1a0 a2=fc6 a3=0 items=0 ppid=2374 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 key=(null) Feb 9 18:54:47.600000 audit[2496]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00ab3d1a0 a2=fc6 a3=0 items=0 ppid=2374 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 key=(null) Feb 9 18:54:47.625902 kernel: audit: type=1327 audit(1707504887.600:735): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 18:54:47.600000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 18:54:47.633145 kernel: audit: type=1300 audit(1707504887.598:734): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0099fa000 a2=fc6 a3=0 items=0 ppid=2374 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 key=(null) Feb 9 18:54:47.598000 audit[2496]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0099fa000 a2=fc6 a3=0 items=0 ppid=2374 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 key=(null) Feb 9 18:54:47.598000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 18:54:47.639333 kernel: audit: type=1327 audit(1707504887.598:734): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 18:54:47.601000 audit[2496]: AVC avc: denied { watch } for pid=2496 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:54:47.649307 kernel: audit: type=1400 audit(1707504887.601:736): avc: denied { watch } for pid=2496 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:54:47.601000 audit[2496]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00665e040 a2=fc6 a3=0 items=0 ppid=2374 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 key=(null) Feb 9 18:54:47.657308 kernel: audit: type=1300 audit(1707504887.601:736): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00665e040 a2=fc6 a3=0 items=0 ppid=2374 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 key=(null) Feb 9 18:54:47.601000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 18:54:47.670794 kernel: audit: type=1327 audit(1707504887.601:736): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 18:54:47.671006 kernel: audit: type=1400 audit(1707504887.607:737): avc: denied { watch } for pid=2496 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521018 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:54:47.607000 audit[2496]: AVC avc: denied { watch } for pid=2496 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521018 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:54:47.607000 audit[2496]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c0099fb1a0 a2=fc6 a3=0 items=0 ppid=2374 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 key=(null) Feb 9 18:54:47.607000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 18:54:47.690000 audit[2496]: AVC avc: denied { watch } for pid=2496 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:54:47.690000 audit[2496]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7f a1=c0037d98c0 a2=fc6 a3=0 items=0 ppid=2374 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 key=(null) Feb 9 18:54:47.690000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 18:54:47.690000 audit[2496]: AVC avc: denied { watch } for pid=2496 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:54:47.690000 audit[2496]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7f a1=c00140d7a0 a2=fc6 a3=0 items=0 ppid=2374 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 key=(null) Feb 9 18:54:47.690000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 18:54:47.851606 kubelet[2314]: I0209 18:54:47.851501 2314 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-21-122" Feb 9 18:54:48.528968 kubelet[2314]: I0209 18:54:48.528857 2314 apiserver.go:52] "Watching apiserver" Feb 9 18:54:48.541170 kubelet[2314]: I0209 18:54:48.541122 2314 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 9 18:54:48.578484 kubelet[2314]: I0209 18:54:48.578428 2314 reconciler.go:41] "Reconciler: start to sync state" Feb 9 18:54:49.926000 audit[2518]: AVC avc: denied { watch } for pid=2518 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:54:49.926000 audit[2518]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ea70a0 a2=fc6 a3=0 items=0 ppid=2354 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 key=(null) Feb 9 18:54:49.926000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:54:49.931000 audit[2518]: AVC avc: denied { watch } for pid=2518 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:54:49.931000 audit[2518]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ea7320 a2=fc6 a3=0 items=0 ppid=2354 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 key=(null) Feb 9 18:54:49.933000 audit[2518]: AVC avc: denied { watch } for pid=2518 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:54:49.933000 audit[2518]: AVC avc: denied { watch } for pid=2518 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:54:49.933000 audit[2518]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f41900 a2=fc6 a3=0 items=0 ppid=2354 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 key=(null) Feb 9 18:54:49.933000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:54:49.933000 audit[2518]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ea7580 a2=fc6 a3=0 items=0 ppid=2354 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 key=(null) Feb 9 18:54:49.933000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:54:49.931000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:54:50.675118 systemd[1]: Reloading. Feb 9 18:54:50.828995 /usr/lib/systemd/system-generators/torcx-generator[2614]: time="2024-02-09T18:54:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:54:50.829758 /usr/lib/systemd/system-generators/torcx-generator[2614]: time="2024-02-09T18:54:50Z" level=info msg="torcx already run" Feb 9 18:54:50.973475 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:54:50.973497 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:54:51.002548 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:54:51.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.116000 audit: BPF prog-id=97 op=LOAD Feb 9 18:54:51.116000 audit: BPF prog-id=77 op=UNLOAD Feb 9 18:54:51.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.120000 audit: BPF prog-id=98 op=LOAD Feb 9 18:54:51.120000 audit: BPF prog-id=85 op=UNLOAD Feb 9 18:54:51.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.121000 audit: BPF prog-id=99 op=LOAD Feb 9 18:54:51.121000 audit: BPF prog-id=58 op=UNLOAD Feb 9 18:54:51.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.122000 audit: BPF prog-id=100 op=LOAD Feb 9 18:54:51.122000 audit: BPF prog-id=81 op=UNLOAD Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit: BPF prog-id=101 op=LOAD Feb 9 18:54:51.124000 audit: BPF prog-id=59 op=UNLOAD Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit: BPF prog-id=102 op=LOAD Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.124000 audit: BPF prog-id=103 op=LOAD Feb 9 18:54:51.124000 audit: BPF prog-id=60 op=UNLOAD Feb 9 18:54:51.124000 audit: BPF prog-id=61 op=UNLOAD Feb 9 18:54:51.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.127000 audit: BPF prog-id=104 op=LOAD Feb 9 18:54:51.127000 audit: BPF prog-id=89 op=UNLOAD Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit: BPF prog-id=105 op=LOAD Feb 9 18:54:51.128000 audit: BPF prog-id=62 op=UNLOAD Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit: BPF prog-id=106 op=LOAD Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.128000 audit: BPF prog-id=107 op=LOAD Feb 9 18:54:51.128000 audit: BPF prog-id=63 op=UNLOAD Feb 9 18:54:51.128000 audit: BPF prog-id=64 op=UNLOAD Feb 9 18:54:51.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.130000 audit: BPF prog-id=108 op=LOAD Feb 9 18:54:51.130000 audit: BPF prog-id=65 op=UNLOAD Feb 9 18:54:51.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.133000 audit: BPF prog-id=109 op=LOAD Feb 9 18:54:51.134000 audit: BPF prog-id=93 op=UNLOAD Feb 9 18:54:51.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.136000 audit: BPF prog-id=110 op=LOAD Feb 9 18:54:51.136000 audit: BPF prog-id=73 op=UNLOAD Feb 9 18:54:51.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.139000 audit: BPF prog-id=111 op=LOAD Feb 9 18:54:51.139000 audit: BPF prog-id=66 op=UNLOAD Feb 9 18:54:51.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.139000 audit: BPF prog-id=112 op=LOAD Feb 9 18:54:51.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.139000 audit: BPF prog-id=113 op=LOAD Feb 9 18:54:51.139000 audit: BPF prog-id=67 op=UNLOAD Feb 9 18:54:51.139000 audit: BPF prog-id=68 op=UNLOAD Feb 9 18:54:51.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.141000 audit: BPF prog-id=114 op=LOAD Feb 9 18:54:51.141000 audit: BPF prog-id=69 op=UNLOAD Feb 9 18:54:51.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.142000 audit: BPF prog-id=115 op=LOAD Feb 9 18:54:51.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.142000 audit: BPF prog-id=116 op=LOAD Feb 9 18:54:51.142000 audit: BPF prog-id=70 op=UNLOAD Feb 9 18:54:51.142000 audit: BPF prog-id=71 op=UNLOAD Feb 9 18:54:51.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.143000 audit: BPF prog-id=117 op=LOAD Feb 9 18:54:51.143000 audit: BPF prog-id=72 op=UNLOAD Feb 9 18:54:51.170237 kubelet[2314]: I0209 18:54:51.167790 2314 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 18:54:51.166930 systemd[1]: Stopping kubelet.service... Feb 9 18:54:51.188801 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 18:54:51.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:51.189340 systemd[1]: Stopped kubelet.service. Feb 9 18:54:51.192322 systemd[1]: Started kubelet.service. Feb 9 18:54:51.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:51.308485 kubelet[2665]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 18:54:51.308485 kubelet[2665]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 18:54:51.308485 kubelet[2665]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 18:54:51.308928 kubelet[2665]: I0209 18:54:51.308575 2665 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 18:54:51.317031 kubelet[2665]: I0209 18:54:51.316936 2665 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 9 18:54:51.317031 kubelet[2665]: I0209 18:54:51.317033 2665 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 18:54:51.317405 kubelet[2665]: I0209 18:54:51.317384 2665 server.go:837] "Client rotation is on, will bootstrap in background" Feb 9 18:54:51.319627 kubelet[2665]: I0209 18:54:51.319596 2665 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 18:54:51.320859 kubelet[2665]: I0209 18:54:51.320830 2665 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 18:54:51.324913 kubelet[2665]: I0209 18:54:51.324881 2665 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 18:54:51.325169 kubelet[2665]: I0209 18:54:51.325152 2665 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 18:54:51.325266 kubelet[2665]: I0209 18:54:51.325247 2665 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 18:54:51.325403 kubelet[2665]: I0209 18:54:51.325299 2665 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 18:54:51.325403 kubelet[2665]: I0209 18:54:51.325316 2665 container_manager_linux.go:302] "Creating device plugin manager" Feb 9 18:54:51.325403 kubelet[2665]: I0209 18:54:51.325369 2665 state_mem.go:36] "Initialized new in-memory state store" Feb 9 18:54:51.337773 kubelet[2665]: I0209 18:54:51.337751 2665 kubelet.go:405] "Attempting to sync node with API server" Feb 9 18:54:51.337957 kubelet[2665]: I0209 18:54:51.337946 2665 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 18:54:51.338221 kubelet[2665]: I0209 18:54:51.338208 2665 kubelet.go:309] "Adding apiserver pod source" Feb 9 18:54:51.338341 kubelet[2665]: I0209 18:54:51.338330 2665 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 18:54:51.339472 kubelet[2665]: I0209 18:54:51.339446 2665 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 18:54:51.341065 kubelet[2665]: I0209 18:54:51.341031 2665 server.go:1168] "Started kubelet" Feb 9 18:54:51.342000 audit[2665]: AVC avc: denied { mac_admin } for pid=2665 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.342000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:54:51.342000 audit[2665]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004b7110 a1=c000655b30 a2=c0004b70b0 a3=25 items=0 ppid=1 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:51.342000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:54:51.343000 audit[2665]: AVC avc: denied { mac_admin } for pid=2665 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.343000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:54:51.343000 audit[2665]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00090c860 a1=c000655b78 a2=c0004b7230 a3=25 items=0 ppid=1 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:51.343000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:54:51.345055 kubelet[2665]: I0209 18:54:51.344389 2665 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 18:54:51.345055 kubelet[2665]: I0209 18:54:51.344464 2665 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 18:54:51.345055 kubelet[2665]: I0209 18:54:51.344505 2665 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 18:54:51.345421 kubelet[2665]: I0209 18:54:51.345041 2665 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 18:54:51.346350 kubelet[2665]: I0209 18:54:51.346332 2665 server.go:461] "Adding debug handlers to kubelet server" Feb 9 18:54:51.352430 kubelet[2665]: E0209 18:54:51.349868 2665 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 18:54:51.352430 kubelet[2665]: E0209 18:54:51.349894 2665 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 18:54:51.352430 kubelet[2665]: I0209 18:54:51.352044 2665 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 18:54:51.356388 kubelet[2665]: I0209 18:54:51.356367 2665 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 9 18:54:51.357105 kubelet[2665]: I0209 18:54:51.357088 2665 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 9 18:54:51.393321 kubelet[2665]: I0209 18:54:51.393253 2665 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 18:54:51.394762 kubelet[2665]: I0209 18:54:51.394735 2665 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 18:54:51.394878 kubelet[2665]: I0209 18:54:51.394772 2665 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 9 18:54:51.394878 kubelet[2665]: I0209 18:54:51.394794 2665 kubelet.go:2257] "Starting kubelet main sync loop" Feb 9 18:54:51.394977 kubelet[2665]: E0209 18:54:51.394962 2665 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 18:54:51.462602 kubelet[2665]: I0209 18:54:51.462576 2665 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-122" Feb 9 18:54:51.474604 kubelet[2665]: I0209 18:54:51.474564 2665 kubelet_node_status.go:108] "Node was previously registered" node="ip-172-31-21-122" Feb 9 18:54:51.477092 kubelet[2665]: I0209 18:54:51.477070 2665 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-21-122" Feb 9 18:54:51.495366 kubelet[2665]: E0209 18:54:51.495339 2665 kubelet.go:2281] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 9 18:54:51.503169 kubelet[2665]: I0209 18:54:51.503137 2665 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 18:54:51.503169 kubelet[2665]: I0209 18:54:51.503160 2665 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 18:54:51.503169 kubelet[2665]: I0209 18:54:51.503178 2665 state_mem.go:36] "Initialized new in-memory state store" Feb 9 18:54:51.503819 kubelet[2665]: I0209 18:54:51.503796 2665 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 18:54:51.503819 kubelet[2665]: I0209 18:54:51.503818 2665 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 9 18:54:51.503937 kubelet[2665]: I0209 18:54:51.503827 2665 policy_none.go:49] "None policy: Start" Feb 9 18:54:51.504771 kubelet[2665]: I0209 18:54:51.504709 2665 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 18:54:51.504771 kubelet[2665]: I0209 18:54:51.504745 2665 state_mem.go:35] "Initializing new in-memory state store" Feb 9 18:54:51.505388 kubelet[2665]: I0209 18:54:51.505366 2665 state_mem.go:75] "Updated machine memory state" Feb 9 18:54:51.509759 kubelet[2665]: I0209 18:54:51.509744 2665 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 18:54:51.508000 audit[2665]: AVC avc: denied { mac_admin } for pid=2665 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:54:51.508000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:54:51.508000 audit[2665]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dddf50 a1=c000deba88 a2=c000dddf20 a3=25 items=0 ppid=1 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:54:51.508000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:54:51.510208 kubelet[2665]: I0209 18:54:51.510194 2665 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 18:54:51.512481 kubelet[2665]: I0209 18:54:51.512467 2665 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 18:54:51.633100 update_engine[1634]: I0209 18:54:51.632967 1634 update_attempter.cc:509] Updating boot flags... Feb 9 18:54:51.696926 kubelet[2665]: I0209 18:54:51.696601 2665 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:54:51.696926 kubelet[2665]: I0209 18:54:51.696706 2665 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:54:51.696926 kubelet[2665]: I0209 18:54:51.696744 2665 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:54:51.761768 kubelet[2665]: I0209 18:54:51.761694 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6f54d988863da50445106db14bbf476e-ca-certs\") pod \"kube-controller-manager-ip-172-31-21-122\" (UID: \"6f54d988863da50445106db14bbf476e\") " pod="kube-system/kube-controller-manager-ip-172-31-21-122" Feb 9 18:54:51.768569 kubelet[2665]: E0209 18:54:51.768482 2665 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ip-172-31-21-122\" already exists" pod="kube-system/kube-scheduler-ip-172-31-21-122" Feb 9 18:54:51.862019 kubelet[2665]: I0209 18:54:51.861983 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6f54d988863da50445106db14bbf476e-k8s-certs\") pod \"kube-controller-manager-ip-172-31-21-122\" (UID: \"6f54d988863da50445106db14bbf476e\") " pod="kube-system/kube-controller-manager-ip-172-31-21-122" Feb 9 18:54:51.862266 kubelet[2665]: I0209 18:54:51.862055 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4be57714e5b909b6594466af2fde44fb-ca-certs\") pod \"kube-apiserver-ip-172-31-21-122\" (UID: \"4be57714e5b909b6594466af2fde44fb\") " pod="kube-system/kube-apiserver-ip-172-31-21-122" Feb 9 18:54:51.862266 kubelet[2665]: I0209 18:54:51.862085 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4be57714e5b909b6594466af2fde44fb-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-21-122\" (UID: \"4be57714e5b909b6594466af2fde44fb\") " pod="kube-system/kube-apiserver-ip-172-31-21-122" Feb 9 18:54:51.862266 kubelet[2665]: I0209 18:54:51.862142 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6f54d988863da50445106db14bbf476e-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-21-122\" (UID: \"6f54d988863da50445106db14bbf476e\") " pod="kube-system/kube-controller-manager-ip-172-31-21-122" Feb 9 18:54:51.862266 kubelet[2665]: I0209 18:54:51.862190 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0c1c8a58dec3b6e0763bbeb61681e634-kubeconfig\") pod \"kube-scheduler-ip-172-31-21-122\" (UID: \"0c1c8a58dec3b6e0763bbeb61681e634\") " pod="kube-system/kube-scheduler-ip-172-31-21-122" Feb 9 18:54:51.862266 kubelet[2665]: I0209 18:54:51.862230 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4be57714e5b909b6594466af2fde44fb-k8s-certs\") pod \"kube-apiserver-ip-172-31-21-122\" (UID: \"4be57714e5b909b6594466af2fde44fb\") " pod="kube-system/kube-apiserver-ip-172-31-21-122" Feb 9 18:54:51.862521 kubelet[2665]: I0209 18:54:51.862324 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/6f54d988863da50445106db14bbf476e-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-21-122\" (UID: \"6f54d988863da50445106db14bbf476e\") " pod="kube-system/kube-controller-manager-ip-172-31-21-122" Feb 9 18:54:51.862521 kubelet[2665]: I0209 18:54:51.862358 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6f54d988863da50445106db14bbf476e-kubeconfig\") pod \"kube-controller-manager-ip-172-31-21-122\" (UID: \"6f54d988863da50445106db14bbf476e\") " pod="kube-system/kube-controller-manager-ip-172-31-21-122" Feb 9 18:54:52.348426 kubelet[2665]: I0209 18:54:52.348360 2665 apiserver.go:52] "Watching apiserver" Feb 9 18:54:52.358162 kubelet[2665]: I0209 18:54:52.358126 2665 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 9 18:54:52.371535 kubelet[2665]: I0209 18:54:52.371482 2665 reconciler.go:41] "Reconciler: start to sync state" Feb 9 18:54:52.469998 kubelet[2665]: E0209 18:54:52.469966 2665 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-21-122\" already exists" pod="kube-system/kube-apiserver-ip-172-31-21-122" Feb 9 18:54:52.504357 kubelet[2665]: I0209 18:54:52.504322 2665 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-21-122" podStartSLOduration=1.503149782 podCreationTimestamp="2024-02-09 18:54:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:54:52.492329009 +0000 UTC m=+1.293318921" watchObservedRunningTime="2024-02-09 18:54:52.503149782 +0000 UTC m=+1.304139695" Feb 9 18:54:52.504631 kubelet[2665]: I0209 18:54:52.504607 2665 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-21-122" podStartSLOduration=1.50457256 podCreationTimestamp="2024-02-09 18:54:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:54:52.50442925 +0000 UTC m=+1.305419158" watchObservedRunningTime="2024-02-09 18:54:52.50457256 +0000 UTC m=+1.305562477" Feb 9 18:54:52.531459 kubelet[2665]: I0209 18:54:52.531417 2665 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-21-122" podStartSLOduration=1.53134243 podCreationTimestamp="2024-02-09 18:54:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:54:52.530197688 +0000 UTC m=+1.331187601" watchObservedRunningTime="2024-02-09 18:54:52.53134243 +0000 UTC m=+1.332332344" Feb 9 18:54:56.704413 sudo[1909]: pam_unix(sudo:session): session closed for user root Feb 9 18:54:56.703000 audit[1909]: USER_END pid=1909 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:54:56.705675 kernel: kauditd_printk_skb: 278 callbacks suppressed Feb 9 18:54:56.705757 kernel: audit: type=1106 audit(1707504896.703:993): pid=1909 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:54:56.704000 audit[1909]: CRED_DISP pid=1909 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:54:56.717090 kernel: audit: type=1104 audit(1707504896.704:994): pid=1909 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:54:56.742173 sshd[1906]: pam_unix(sshd:session): session closed for user core Feb 9 18:54:56.745000 audit[1906]: USER_END pid=1906 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:54:56.745000 audit[1906]: CRED_DISP pid=1906 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:54:56.759353 kernel: audit: type=1106 audit(1707504896.745:995): pid=1906 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:54:56.759457 kernel: audit: type=1104 audit(1707504896.745:996): pid=1906 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:54:56.759506 kernel: audit: type=1131 audit(1707504896.756:997): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.21.122:22-139.178.68.195:45736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:56.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.21.122:22-139.178.68.195:45736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:54:56.757826 systemd[1]: sshd@6-172.31.21.122:22-139.178.68.195:45736.service: Deactivated successfully. Feb 9 18:54:56.758776 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 18:54:56.759093 systemd[1]: session-7.scope: Consumed 4.991s CPU time. Feb 9 18:54:56.761660 systemd-logind[1633]: Session 7 logged out. Waiting for processes to exit. Feb 9 18:54:56.763507 systemd-logind[1633]: Removed session 7. Feb 9 18:55:02.124000 audit[2518]: AVC avc: denied { watch } for pid=2518 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521043 scontext=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 18:55:02.150506 kernel: audit: type=1400 audit(1707504902.124:998): avc: denied { watch } for pid=2518 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521043 scontext=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 18:55:02.150662 kernel: audit: type=1300 audit(1707504902.124:998): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011b0680 a2=fc6 a3=0 items=0 ppid=2354 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 key=(null) Feb 9 18:55:02.124000 audit[2518]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011b0680 a2=fc6 a3=0 items=0 ppid=2354 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 key=(null) Feb 9 18:55:02.124000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:55:02.153398 kernel: audit: type=1327 audit(1707504902.124:998): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:55:02.830134 kubelet[2665]: I0209 18:55:02.830107 2665 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 9 18:55:02.831696 env[1643]: time="2024-02-09T18:55:02.831622029Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 18:55:02.832114 kubelet[2665]: I0209 18:55:02.831958 2665 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 9 18:55:03.569191 kubelet[2665]: I0209 18:55:03.569155 2665 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:55:03.578938 systemd[1]: Created slice kubepods-besteffort-podcc568cb8_23e2_406e_a558_5f7eabcf5000.slice. Feb 9 18:55:03.652261 kubelet[2665]: I0209 18:55:03.652225 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/cc568cb8-23e2-406e-a558-5f7eabcf5000-kube-proxy\") pod \"kube-proxy-rxt6p\" (UID: \"cc568cb8-23e2-406e-a558-5f7eabcf5000\") " pod="kube-system/kube-proxy-rxt6p" Feb 9 18:55:03.652672 kubelet[2665]: I0209 18:55:03.652639 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sk57n\" (UniqueName: \"kubernetes.io/projected/cc568cb8-23e2-406e-a558-5f7eabcf5000-kube-api-access-sk57n\") pod \"kube-proxy-rxt6p\" (UID: \"cc568cb8-23e2-406e-a558-5f7eabcf5000\") " pod="kube-system/kube-proxy-rxt6p" Feb 9 18:55:03.653003 kubelet[2665]: I0209 18:55:03.652986 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/cc568cb8-23e2-406e-a558-5f7eabcf5000-xtables-lock\") pod \"kube-proxy-rxt6p\" (UID: \"cc568cb8-23e2-406e-a558-5f7eabcf5000\") " pod="kube-system/kube-proxy-rxt6p" Feb 9 18:55:03.653146 kubelet[2665]: I0209 18:55:03.653136 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/cc568cb8-23e2-406e-a558-5f7eabcf5000-lib-modules\") pod \"kube-proxy-rxt6p\" (UID: \"cc568cb8-23e2-406e-a558-5f7eabcf5000\") " pod="kube-system/kube-proxy-rxt6p" Feb 9 18:55:03.862174 kubelet[2665]: I0209 18:55:03.861815 2665 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:55:03.873908 systemd[1]: Created slice kubepods-besteffort-pod707f69f3_e52a_4657_8072_69249bb10cba.slice. Feb 9 18:55:03.888535 env[1643]: time="2024-02-09T18:55:03.888487296Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-rxt6p,Uid:cc568cb8-23e2-406e-a558-5f7eabcf5000,Namespace:kube-system,Attempt:0,}" Feb 9 18:55:03.927251 env[1643]: time="2024-02-09T18:55:03.927178615Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:55:03.927497 env[1643]: time="2024-02-09T18:55:03.927268452Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:55:03.927497 env[1643]: time="2024-02-09T18:55:03.927328295Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:55:03.927624 env[1643]: time="2024-02-09T18:55:03.927532872Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6efcd36d53828f931150167c117be503ae9287a5cc017e7eecaf3cce57e6a396 pid=2932 runtime=io.containerd.runc.v2 Feb 9 18:55:03.955592 kubelet[2665]: I0209 18:55:03.955444 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5kr24\" (UniqueName: \"kubernetes.io/projected/707f69f3-e52a-4657-8072-69249bb10cba-kube-api-access-5kr24\") pod \"tigera-operator-7ff8dc855-xwbh7\" (UID: \"707f69f3-e52a-4657-8072-69249bb10cba\") " pod="tigera-operator/tigera-operator-7ff8dc855-xwbh7" Feb 9 18:55:03.955592 kubelet[2665]: I0209 18:55:03.955510 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/707f69f3-e52a-4657-8072-69249bb10cba-var-lib-calico\") pod \"tigera-operator-7ff8dc855-xwbh7\" (UID: \"707f69f3-e52a-4657-8072-69249bb10cba\") " pod="tigera-operator/tigera-operator-7ff8dc855-xwbh7" Feb 9 18:55:03.959594 systemd[1]: Started cri-containerd-6efcd36d53828f931150167c117be503ae9287a5cc017e7eecaf3cce57e6a396.scope. Feb 9 18:55:03.991686 kernel: audit: type=1400 audit(1707504903.980:999): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:03.991838 kernel: audit: type=1400 audit(1707504903.980:1000): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:03.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:03.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:03.997414 kernel: audit: type=1400 audit(1707504903.980:1001): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:03.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.009087 kernel: audit: type=1400 audit(1707504903.980:1002): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:03.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:03.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:03.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.022168 kernel: audit: type=1400 audit(1707504903.980:1003): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.022342 kernel: audit: type=1400 audit(1707504903.980:1004): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.022422 kernel: audit: type=1400 audit(1707504903.980:1005): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:03.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:03.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:03.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:03.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:03.990000 audit: BPF prog-id=118 op=LOAD Feb 9 18:55:03.990000 audit[2941]: AVC avc: denied { bpf } for pid=2941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:03.990000 audit[2941]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=2932 pid=2941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:03.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665666364333664353338323866393331313530313637633131376265 Feb 9 18:55:03.990000 audit[2941]: AVC avc: denied { perfmon } for pid=2941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:03.990000 audit[2941]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=c items=0 ppid=2932 pid=2941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:03.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665666364333664353338323866393331313530313637633131376265 Feb 9 18:55:03.990000 audit[2941]: AVC avc: denied { bpf } for pid=2941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:03.990000 audit[2941]: AVC avc: denied { bpf } for pid=2941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:03.990000 audit[2941]: AVC avc: denied { bpf } for pid=2941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:03.990000 audit[2941]: AVC avc: denied { perfmon } for pid=2941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:03.990000 audit[2941]: AVC avc: denied { perfmon } for pid=2941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:03.990000 audit[2941]: AVC avc: denied { perfmon } for pid=2941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:03.990000 audit[2941]: AVC avc: denied { perfmon } for pid=2941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:03.990000 audit[2941]: AVC avc: denied { perfmon } for pid=2941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:03.990000 audit[2941]: AVC avc: denied { bpf } for pid=2941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:03.990000 audit[2941]: AVC avc: denied { bpf } for pid=2941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:03.990000 audit: BPF prog-id=119 op=LOAD Feb 9 18:55:03.990000 audit[2941]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c0001d75e0 items=0 ppid=2932 pid=2941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:03.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665666364333664353338323866393331313530313637633131376265 Feb 9 18:55:04.008000 audit[2941]: AVC avc: denied { bpf } for pid=2941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.008000 audit[2941]: AVC avc: denied { bpf } for pid=2941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.008000 audit[2941]: AVC avc: denied { perfmon } for pid=2941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.008000 audit[2941]: AVC avc: denied { perfmon } for pid=2941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.008000 audit[2941]: AVC avc: denied { perfmon } for pid=2941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.008000 audit[2941]: AVC avc: denied { perfmon } for pid=2941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.008000 audit[2941]: AVC avc: denied { perfmon } for pid=2941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.008000 audit[2941]: AVC avc: denied { bpf } for pid=2941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.008000 audit[2941]: AVC avc: denied { bpf } for pid=2941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.008000 audit: BPF prog-id=120 op=LOAD Feb 9 18:55:04.008000 audit[2941]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c0000246e8 items=0 ppid=2932 pid=2941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665666364333664353338323866393331313530313637633131376265 Feb 9 18:55:04.008000 audit: BPF prog-id=120 op=UNLOAD Feb 9 18:55:04.008000 audit: BPF prog-id=119 op=UNLOAD Feb 9 18:55:04.008000 audit[2941]: AVC avc: denied { bpf } for pid=2941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.008000 audit[2941]: AVC avc: denied { bpf } for pid=2941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.008000 audit[2941]: AVC avc: denied { bpf } for pid=2941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.008000 audit[2941]: AVC avc: denied { perfmon } for pid=2941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.008000 audit[2941]: AVC avc: denied { perfmon } for pid=2941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.008000 audit[2941]: AVC avc: denied { perfmon } for pid=2941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.008000 audit[2941]: AVC avc: denied { perfmon } for pid=2941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.008000 audit[2941]: AVC avc: denied { perfmon } for pid=2941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.008000 audit[2941]: AVC avc: denied { bpf } for pid=2941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.008000 audit[2941]: AVC avc: denied { bpf } for pid=2941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.008000 audit: BPF prog-id=121 op=LOAD Feb 9 18:55:04.008000 audit[2941]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c000024af8 items=0 ppid=2932 pid=2941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665666364333664353338323866393331313530313637633131376265 Feb 9 18:55:04.055446 env[1643]: time="2024-02-09T18:55:04.055399591Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-rxt6p,Uid:cc568cb8-23e2-406e-a558-5f7eabcf5000,Namespace:kube-system,Attempt:0,} returns sandbox id \"6efcd36d53828f931150167c117be503ae9287a5cc017e7eecaf3cce57e6a396\"" Feb 9 18:55:04.062532 env[1643]: time="2024-02-09T18:55:04.061115774Z" level=info msg="CreateContainer within sandbox \"6efcd36d53828f931150167c117be503ae9287a5cc017e7eecaf3cce57e6a396\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 18:55:04.120356 env[1643]: time="2024-02-09T18:55:04.119828661Z" level=info msg="CreateContainer within sandbox \"6efcd36d53828f931150167c117be503ae9287a5cc017e7eecaf3cce57e6a396\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"6c319b3f774b7b8c32556af94f3f00d579d33fc529f1e165396f8a526e673db8\"" Feb 9 18:55:04.123754 env[1643]: time="2024-02-09T18:55:04.123712134Z" level=info msg="StartContainer for \"6c319b3f774b7b8c32556af94f3f00d579d33fc529f1e165396f8a526e673db8\"" Feb 9 18:55:04.153642 systemd[1]: Started cri-containerd-6c319b3f774b7b8c32556af94f3f00d579d33fc529f1e165396f8a526e673db8.scope. Feb 9 18:55:04.186000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.186000 audit[2977]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2932 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663333139623366373734623762386333323535366166393466336630 Feb 9 18:55:04.186000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.186000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.186000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.186000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.186000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.186000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.186000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.186000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.186000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.186000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.186000 audit: BPF prog-id=122 op=LOAD Feb 9 18:55:04.186000 audit[2977]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000a1080 items=0 ppid=2932 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663333139623366373734623762386333323535366166393466336630 Feb 9 18:55:04.186000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.186000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.186000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.186000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.186000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.186000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.186000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.186000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.186000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.186000 audit: BPF prog-id=123 op=LOAD Feb 9 18:55:04.186000 audit[2977]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000a10c8 items=0 ppid=2932 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663333139623366373734623762386333323535366166393466336630 Feb 9 18:55:04.186000 audit: BPF prog-id=123 op=UNLOAD Feb 9 18:55:04.187000 audit: BPF prog-id=122 op=UNLOAD Feb 9 18:55:04.187000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.187000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.187000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.187000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.187000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.187000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.187000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.187000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.187000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.187000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.187000 audit: BPF prog-id=124 op=LOAD Feb 9 18:55:04.187000 audit[2977]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000a1158 items=0 ppid=2932 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663333139623366373734623762386333323535366166393466336630 Feb 9 18:55:04.191149 env[1643]: time="2024-02-09T18:55:04.191082716Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-xwbh7,Uid:707f69f3-e52a-4657-8072-69249bb10cba,Namespace:tigera-operator,Attempt:0,}" Feb 9 18:55:04.234491 env[1643]: time="2024-02-09T18:55:04.234434790Z" level=info msg="StartContainer for \"6c319b3f774b7b8c32556af94f3f00d579d33fc529f1e165396f8a526e673db8\" returns successfully" Feb 9 18:55:04.242131 env[1643]: time="2024-02-09T18:55:04.241825602Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:55:04.242131 env[1643]: time="2024-02-09T18:55:04.241937651Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:55:04.242131 env[1643]: time="2024-02-09T18:55:04.241948683Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:55:04.242482 env[1643]: time="2024-02-09T18:55:04.242256042Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ed803d11fcfe31c1b334997303b93079dc412675fc1252aaa9565dc5fe69c2e9 pid=3008 runtime=io.containerd.runc.v2 Feb 9 18:55:04.261819 systemd[1]: Started cri-containerd-ed803d11fcfe31c1b334997303b93079dc412675fc1252aaa9565dc5fe69c2e9.scope. Feb 9 18:55:04.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.286000 audit: BPF prog-id=125 op=LOAD Feb 9 18:55:04.286000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.286000 audit[3019]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3008 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564383033643131666366653331633162333334393937333033623933 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit[3019]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3008 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564383033643131666366653331633162333334393937333033623933 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit: BPF prog-id=126 op=LOAD Feb 9 18:55:04.287000 audit[3019]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001d6140 items=0 ppid=3008 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564383033643131666366653331633162333334393937333033623933 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit: BPF prog-id=127 op=LOAD Feb 9 18:55:04.287000 audit[3019]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001d6188 items=0 ppid=3008 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564383033643131666366653331633162333334393937333033623933 Feb 9 18:55:04.287000 audit: BPF prog-id=127 op=UNLOAD Feb 9 18:55:04.287000 audit: BPF prog-id=126 op=UNLOAD Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { perfmon } for pid=3019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit[3019]: AVC avc: denied { bpf } for pid=3019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:04.287000 audit: BPF prog-id=128 op=LOAD Feb 9 18:55:04.287000 audit[3019]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001d6598 items=0 ppid=3008 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564383033643131666366653331633162333334393937333033623933 Feb 9 18:55:04.349576 env[1643]: time="2024-02-09T18:55:04.349532880Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-xwbh7,Uid:707f69f3-e52a-4657-8072-69249bb10cba,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"ed803d11fcfe31c1b334997303b93079dc412675fc1252aaa9565dc5fe69c2e9\"" Feb 9 18:55:04.358953 env[1643]: time="2024-02-09T18:55:04.358835213Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 9 18:55:04.844000 audit[3067]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=3067 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:04.844000 audit[3067]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd40cb2730 a2=0 a3=7ffd40cb271c items=0 ppid=2987 pid=3067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.844000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 18:55:04.846000 audit[3068]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=3068 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:04.846000 audit[3068]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc58590dc0 a2=0 a3=7ffc58590dac items=0 ppid=2987 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.846000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 18:55:04.847000 audit[3069]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=3069 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:04.847000 audit[3069]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffdf02be90 a2=0 a3=7fffdf02be7c items=0 ppid=2987 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.847000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 18:55:04.850000 audit[3070]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=3070 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:04.850000 audit[3070]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcf66cb190 a2=0 a3=7ffcf66cb17c items=0 ppid=2987 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.850000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 18:55:04.851000 audit[3071]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=3071 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:04.851000 audit[3071]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1cbca7e0 a2=0 a3=7fff1cbca7cc items=0 ppid=2987 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.851000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 18:55:04.855000 audit[3072]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=3072 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:04.855000 audit[3072]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff9c16fc80 a2=0 a3=7fff9c16fc6c items=0 ppid=2987 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.855000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 18:55:04.956000 audit[3073]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=3073 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:04.956000 audit[3073]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc8c013de0 a2=0 a3=7ffc8c013dcc items=0 ppid=2987 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.956000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 18:55:04.962000 audit[3075]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=3075 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:04.962000 audit[3075]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc25a7b660 a2=0 a3=7ffc25a7b64c items=0 ppid=2987 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.962000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 18:55:04.967000 audit[3078]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=3078 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:04.967000 audit[3078]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffea054d5b0 a2=0 a3=7ffea054d59c items=0 ppid=2987 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.967000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 18:55:04.969000 audit[3079]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=3079 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:04.969000 audit[3079]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb584fba0 a2=0 a3=7ffdb584fb8c items=0 ppid=2987 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.969000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 18:55:04.971000 audit[3081]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=3081 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:04.971000 audit[3081]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdc4575ce0 a2=0 a3=7ffdc4575ccc items=0 ppid=2987 pid=3081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.971000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 18:55:04.973000 audit[3082]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=3082 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:04.973000 audit[3082]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc3932a310 a2=0 a3=7ffc3932a2fc items=0 ppid=2987 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.973000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 18:55:04.976000 audit[3084]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=3084 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:04.976000 audit[3084]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffd5d4a820 a2=0 a3=7fffd5d4a80c items=0 ppid=2987 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.976000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 18:55:04.981000 audit[3087]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=3087 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:04.981000 audit[3087]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeb6a76550 a2=0 a3=7ffeb6a7653c items=0 ppid=2987 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.981000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 18:55:04.982000 audit[3088]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=3088 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:04.982000 audit[3088]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffae389020 a2=0 a3=7fffae38900c items=0 ppid=2987 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.982000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 18:55:04.986000 audit[3090]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=3090 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:04.986000 audit[3090]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdafdfc200 a2=0 a3=7ffdafdfc1ec items=0 ppid=2987 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.986000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 18:55:04.988000 audit[3091]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=3091 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:04.988000 audit[3091]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd1a5a7d20 a2=0 a3=7ffd1a5a7d0c items=0 ppid=2987 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.988000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 18:55:04.991000 audit[3093]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=3093 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:04.991000 audit[3093]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff355fed30 a2=0 a3=7fff355fed1c items=0 ppid=2987 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.991000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 18:55:04.995000 audit[3096]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3096 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:04.995000 audit[3096]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe1c4a73b0 a2=0 a3=7ffe1c4a739c items=0 ppid=2987 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:04.995000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 18:55:05.000000 audit[3099]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3099 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:05.000000 audit[3099]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdad5badf0 a2=0 a3=7ffdad5baddc items=0 ppid=2987 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.000000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 18:55:05.002000 audit[3100]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3100 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:05.002000 audit[3100]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff519db5b0 a2=0 a3=7fff519db59c items=0 ppid=2987 pid=3100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.002000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 18:55:05.005000 audit[3102]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3102 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:05.005000 audit[3102]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd283fac20 a2=0 a3=7ffd283fac0c items=0 ppid=2987 pid=3102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.005000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:55:05.009000 audit[3105]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3105 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:05.009000 audit[3105]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe8346a850 a2=0 a3=7ffe8346a83c items=0 ppid=2987 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.009000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:55:05.016000 audit[3110]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3110 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:05.016000 audit[3110]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe23fbddb0 a2=0 a3=7ffe23fbdd9c items=0 ppid=2987 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.016000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 18:55:05.019000 audit[3112]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3112 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:05.019000 audit[3112]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffddf854cf0 a2=0 a3=7ffddf854cdc items=0 ppid=2987 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.019000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 18:55:05.040000 audit[3114]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:05.040000 audit[3114]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffc6d1a7d40 a2=0 a3=7ffc6d1a7d2c items=0 ppid=2987 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.040000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:05.049000 audit[3114]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:05.049000 audit[3114]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffc6d1a7d40 a2=0 a3=7ffc6d1a7d2c items=0 ppid=2987 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.049000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:05.051000 audit[3120]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3120 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:05.051000 audit[3120]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffeff039270 a2=0 a3=7ffeff03925c items=0 ppid=2987 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.051000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 18:55:05.054000 audit[3122]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3122 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:05.054000 audit[3122]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc77ee0d00 a2=0 a3=7ffc77ee0cec items=0 ppid=2987 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.054000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 18:55:05.059000 audit[3125]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3125 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:05.059000 audit[3125]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff8489ed30 a2=0 a3=7fff8489ed1c items=0 ppid=2987 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.059000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 18:55:05.060000 audit[3126]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3126 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:05.060000 audit[3126]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef2d036f0 a2=0 a3=7ffef2d036dc items=0 ppid=2987 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.060000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 18:55:05.063000 audit[3128]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3128 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:05.063000 audit[3128]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc55ff40a0 a2=0 a3=7ffc55ff408c items=0 ppid=2987 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.063000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 18:55:05.064000 audit[3129]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3129 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:05.064000 audit[3129]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc3d316240 a2=0 a3=7ffc3d31622c items=0 ppid=2987 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.064000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 18:55:05.067000 audit[3131]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3131 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:05.067000 audit[3131]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff582659f0 a2=0 a3=7fff582659dc items=0 ppid=2987 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.067000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 18:55:05.071000 audit[3134]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3134 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:05.071000 audit[3134]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc6749ad80 a2=0 a3=7ffc6749ad6c items=0 ppid=2987 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.071000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 18:55:05.072000 audit[3135]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3135 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:05.072000 audit[3135]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcdfa64680 a2=0 a3=7ffcdfa6466c items=0 ppid=2987 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.072000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 18:55:05.075000 audit[3137]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3137 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:05.075000 audit[3137]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff6ea86ed0 a2=0 a3=7fff6ea86ebc items=0 ppid=2987 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.075000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 18:55:05.077000 audit[3138]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3138 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:05.077000 audit[3138]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5fa76ff0 a2=0 a3=7ffc5fa76fdc items=0 ppid=2987 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.077000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 18:55:05.080000 audit[3140]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3140 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:05.080000 audit[3140]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd077321e0 a2=0 a3=7ffd077321cc items=0 ppid=2987 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.080000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 18:55:05.084000 audit[3143]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3143 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:05.084000 audit[3143]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff48c97fe0 a2=0 a3=7fff48c97fcc items=0 ppid=2987 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.084000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 18:55:05.089000 audit[3146]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3146 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:05.089000 audit[3146]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd9f058320 a2=0 a3=7ffd9f05830c items=0 ppid=2987 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.089000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 18:55:05.090000 audit[3147]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3147 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:05.090000 audit[3147]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffbf7cddf0 a2=0 a3=7fffbf7cdddc items=0 ppid=2987 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.090000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 18:55:05.093000 audit[3149]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3149 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:05.093000 audit[3149]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdd9f1fe90 a2=0 a3=7ffdd9f1fe7c items=0 ppid=2987 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.093000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:55:05.099000 audit[3152]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3152 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:05.099000 audit[3152]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff1125b630 a2=0 a3=7fff1125b61c items=0 ppid=2987 pid=3152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.099000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:55:05.105000 audit[3154]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_chain pid=3154 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:05.105000 audit[3154]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd98401dd0 a2=0 a3=7ffd98401dbc items=0 ppid=2987 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.105000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 18:55:05.108000 audit[3156]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=3156 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:05.108000 audit[3156]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffecd411a70 a2=0 a3=7ffecd411a5c items=0 ppid=2987 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.108000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:55:05.113000 audit[3159]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=3159 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:05.113000 audit[3159]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdefeec570 a2=0 a3=7ffdefeec55c items=0 ppid=2987 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.113000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:55:05.115000 audit[3160]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=3160 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:05.115000 audit[3160]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8cc0b0e0 a2=0 a3=7ffe8cc0b0cc items=0 ppid=2987 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.115000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 18:55:05.118000 audit[3162]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=3162 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:05.118000 audit[3162]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffa5ab66a0 a2=0 a3=7fffa5ab668c items=0 ppid=2987 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.118000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 18:55:05.122000 audit[3164]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3164 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 18:55:05.122000 audit[3164]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffcffe92ac0 a2=0 a3=7ffcffe92aac items=0 ppid=2987 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.122000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:05.123000 audit[3164]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3164 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 18:55:05.123000 audit[3164]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffcffe92ac0 a2=0 a3=7ffcffe92aac items=0 ppid=2987 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:05.123000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:05.604001 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4187238561.mount: Deactivated successfully. Feb 9 18:55:07.228689 env[1643]: time="2024-02-09T18:55:07.228638749Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:07.233045 env[1643]: time="2024-02-09T18:55:07.232996453Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:07.236864 env[1643]: time="2024-02-09T18:55:07.236817650Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:07.239811 env[1643]: time="2024-02-09T18:55:07.239767313Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:07.240937 env[1643]: time="2024-02-09T18:55:07.240896191Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 9 18:55:07.248072 env[1643]: time="2024-02-09T18:55:07.247957030Z" level=info msg="CreateContainer within sandbox \"ed803d11fcfe31c1b334997303b93079dc412675fc1252aaa9565dc5fe69c2e9\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 9 18:55:07.273479 env[1643]: time="2024-02-09T18:55:07.273382969Z" level=info msg="CreateContainer within sandbox \"ed803d11fcfe31c1b334997303b93079dc412675fc1252aaa9565dc5fe69c2e9\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"d0cd46c89618776c0408183f72ab34bc64896c32b8b2cca7a2e72daed4ac76aa\"" Feb 9 18:55:07.276902 env[1643]: time="2024-02-09T18:55:07.276847635Z" level=info msg="StartContainer for \"d0cd46c89618776c0408183f72ab34bc64896c32b8b2cca7a2e72daed4ac76aa\"" Feb 9 18:55:07.325900 systemd[1]: Started cri-containerd-d0cd46c89618776c0408183f72ab34bc64896c32b8b2cca7a2e72daed4ac76aa.scope. Feb 9 18:55:07.347443 kernel: kauditd_printk_skb: 303 callbacks suppressed Feb 9 18:55:07.347586 kernel: audit: type=1400 audit(1707504907.343:1092): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.356619 kernel: audit: type=1400 audit(1707504907.343:1093): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.361967 kernel: audit: type=1400 audit(1707504907.343:1094): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.371609 kernel: audit: type=1400 audit(1707504907.343:1095): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.386423 kernel: audit: type=1400 audit(1707504907.343:1096): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.386575 kernel: audit: type=1400 audit(1707504907.343:1097): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.394758 kernel: audit: type=1400 audit(1707504907.343:1098): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.408299 kernel: audit: type=1400 audit(1707504907.343:1099): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.408601 env[1643]: time="2024-02-09T18:55:07.408561756Z" level=info msg="StartContainer for \"d0cd46c89618776c0408183f72ab34bc64896c32b8b2cca7a2e72daed4ac76aa\" returns successfully" Feb 9 18:55:07.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.418382 kernel: audit: type=1400 audit(1707504907.343:1100): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.428429 kernel: audit: type=1400 audit(1707504907.345:1101): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.345000 audit: BPF prog-id=129 op=LOAD Feb 9 18:55:07.354000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.354000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3008 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:07.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430636434366338393631383737366330343038313833663732616233 Feb 9 18:55:07.354000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.354000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3008 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:07.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430636434366338393631383737366330343038313833663732616233 Feb 9 18:55:07.354000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.354000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.354000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.354000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.354000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.354000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.354000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.354000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.354000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.354000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.354000 audit: BPF prog-id=130 op=LOAD Feb 9 18:55:07.354000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001b9140 items=0 ppid=3008 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:07.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430636434366338393631383737366330343038313833663732616233 Feb 9 18:55:07.355000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.355000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.355000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.355000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.355000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.355000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.355000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.355000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.355000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.355000 audit: BPF prog-id=131 op=LOAD Feb 9 18:55:07.355000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001b9188 items=0 ppid=3008 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:07.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430636434366338393631383737366330343038313833663732616233 Feb 9 18:55:07.355000 audit: BPF prog-id=131 op=UNLOAD Feb 9 18:55:07.355000 audit: BPF prog-id=130 op=UNLOAD Feb 9 18:55:07.355000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.355000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.355000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.355000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.355000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.355000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.355000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.355000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.355000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.355000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:07.355000 audit: BPF prog-id=132 op=LOAD Feb 9 18:55:07.355000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001b9598 items=0 ppid=3008 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:07.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430636434366338393631383737366330343038313833663732616233 Feb 9 18:55:07.510539 kubelet[2665]: I0209 18:55:07.510424 2665 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-rxt6p" podStartSLOduration=4.510362968 podCreationTimestamp="2024-02-09 18:55:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:55:04.503565778 +0000 UTC m=+13.304555691" watchObservedRunningTime="2024-02-09 18:55:07.510362968 +0000 UTC m=+16.311352887" Feb 9 18:55:09.751000 audit[3208]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3208 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:09.751000 audit[3208]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffcef533550 a2=0 a3=7ffcef53353c items=0 ppid=2987 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:09.751000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:09.752000 audit[3208]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3208 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:09.752000 audit[3208]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffcef533550 a2=0 a3=31030 items=0 ppid=2987 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:09.752000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:09.760000 audit[3210]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3210 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:09.760000 audit[3210]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffc597f9750 a2=0 a3=7ffc597f973c items=0 ppid=2987 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:09.760000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:09.761000 audit[3210]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3210 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:09.761000 audit[3210]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffc597f9750 a2=0 a3=31030 items=0 ppid=2987 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:09.761000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:09.897979 kubelet[2665]: I0209 18:55:09.897939 2665 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7ff8dc855-xwbh7" podStartSLOduration=4.012765494 podCreationTimestamp="2024-02-09 18:55:03 +0000 UTC" firstStartedPulling="2024-02-09 18:55:04.356341487 +0000 UTC m=+13.157331382" lastFinishedPulling="2024-02-09 18:55:07.241465561 +0000 UTC m=+16.042455467" observedRunningTime="2024-02-09 18:55:07.517230323 +0000 UTC m=+16.318220237" watchObservedRunningTime="2024-02-09 18:55:09.897889579 +0000 UTC m=+18.698879492" Feb 9 18:55:09.898575 kubelet[2665]: I0209 18:55:09.898207 2665 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:55:09.904510 systemd[1]: Created slice kubepods-besteffort-pod6e32ce07_6b86_45aa_bf34_31d21927e5f0.slice. Feb 9 18:55:09.912755 kubelet[2665]: I0209 18:55:09.912723 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6e32ce07-6b86-45aa-bf34-31d21927e5f0-tigera-ca-bundle\") pod \"calico-typha-568b786b46-rhns6\" (UID: \"6e32ce07-6b86-45aa-bf34-31d21927e5f0\") " pod="calico-system/calico-typha-568b786b46-rhns6" Feb 9 18:55:09.912906 kubelet[2665]: I0209 18:55:09.912801 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nd2kg\" (UniqueName: \"kubernetes.io/projected/6e32ce07-6b86-45aa-bf34-31d21927e5f0-kube-api-access-nd2kg\") pod \"calico-typha-568b786b46-rhns6\" (UID: \"6e32ce07-6b86-45aa-bf34-31d21927e5f0\") " pod="calico-system/calico-typha-568b786b46-rhns6" Feb 9 18:55:09.912906 kubelet[2665]: I0209 18:55:09.912863 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/6e32ce07-6b86-45aa-bf34-31d21927e5f0-typha-certs\") pod \"calico-typha-568b786b46-rhns6\" (UID: \"6e32ce07-6b86-45aa-bf34-31d21927e5f0\") " pod="calico-system/calico-typha-568b786b46-rhns6" Feb 9 18:55:10.002665 kubelet[2665]: I0209 18:55:10.002629 2665 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:55:10.009781 systemd[1]: Created slice kubepods-besteffort-pod722ab127_3ef8_4c93_b41d_f8f453285271.slice. Feb 9 18:55:10.013416 kubelet[2665]: I0209 18:55:10.013388 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-var-lib-calico\") pod \"calico-node-7gqrg\" (UID: \"722ab127-3ef8-4c93-b41d-f8f453285271\") " pod="calico-system/calico-node-7gqrg" Feb 9 18:55:10.013551 kubelet[2665]: I0209 18:55:10.013449 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-policysync\") pod \"calico-node-7gqrg\" (UID: \"722ab127-3ef8-4c93-b41d-f8f453285271\") " pod="calico-system/calico-node-7gqrg" Feb 9 18:55:10.013551 kubelet[2665]: I0209 18:55:10.013480 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xrb4w\" (UniqueName: \"kubernetes.io/projected/722ab127-3ef8-4c93-b41d-f8f453285271-kube-api-access-xrb4w\") pod \"calico-node-7gqrg\" (UID: \"722ab127-3ef8-4c93-b41d-f8f453285271\") " pod="calico-system/calico-node-7gqrg" Feb 9 18:55:10.013551 kubelet[2665]: I0209 18:55:10.013524 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-lib-modules\") pod \"calico-node-7gqrg\" (UID: \"722ab127-3ef8-4c93-b41d-f8f453285271\") " pod="calico-system/calico-node-7gqrg" Feb 9 18:55:10.013551 kubelet[2665]: I0209 18:55:10.013552 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/722ab127-3ef8-4c93-b41d-f8f453285271-node-certs\") pod \"calico-node-7gqrg\" (UID: \"722ab127-3ef8-4c93-b41d-f8f453285271\") " pod="calico-system/calico-node-7gqrg" Feb 9 18:55:10.013755 kubelet[2665]: I0209 18:55:10.013633 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-cni-bin-dir\") pod \"calico-node-7gqrg\" (UID: \"722ab127-3ef8-4c93-b41d-f8f453285271\") " pod="calico-system/calico-node-7gqrg" Feb 9 18:55:10.013806 kubelet[2665]: I0209 18:55:10.013761 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-flexvol-driver-host\") pod \"calico-node-7gqrg\" (UID: \"722ab127-3ef8-4c93-b41d-f8f453285271\") " pod="calico-system/calico-node-7gqrg" Feb 9 18:55:10.013806 kubelet[2665]: I0209 18:55:10.013801 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/722ab127-3ef8-4c93-b41d-f8f453285271-tigera-ca-bundle\") pod \"calico-node-7gqrg\" (UID: \"722ab127-3ef8-4c93-b41d-f8f453285271\") " pod="calico-system/calico-node-7gqrg" Feb 9 18:55:10.013947 kubelet[2665]: I0209 18:55:10.013930 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-var-run-calico\") pod \"calico-node-7gqrg\" (UID: \"722ab127-3ef8-4c93-b41d-f8f453285271\") " pod="calico-system/calico-node-7gqrg" Feb 9 18:55:10.014138 kubelet[2665]: I0209 18:55:10.014122 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-cni-net-dir\") pod \"calico-node-7gqrg\" (UID: \"722ab127-3ef8-4c93-b41d-f8f453285271\") " pod="calico-system/calico-node-7gqrg" Feb 9 18:55:10.014616 kubelet[2665]: I0209 18:55:10.014594 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-xtables-lock\") pod \"calico-node-7gqrg\" (UID: \"722ab127-3ef8-4c93-b41d-f8f453285271\") " pod="calico-system/calico-node-7gqrg" Feb 9 18:55:10.014695 kubelet[2665]: I0209 18:55:10.014646 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-cni-log-dir\") pod \"calico-node-7gqrg\" (UID: \"722ab127-3ef8-4c93-b41d-f8f453285271\") " pod="calico-system/calico-node-7gqrg" Feb 9 18:55:10.124163 kubelet[2665]: E0209 18:55:10.124130 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.124313 kubelet[2665]: W0209 18:55:10.124193 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.124313 kubelet[2665]: E0209 18:55:10.124235 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.124632 kubelet[2665]: E0209 18:55:10.124596 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.124712 kubelet[2665]: W0209 18:55:10.124634 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.124763 kubelet[2665]: E0209 18:55:10.124745 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.124984 kubelet[2665]: E0209 18:55:10.124915 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.125059 kubelet[2665]: W0209 18:55:10.124986 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.125106 kubelet[2665]: E0209 18:55:10.125093 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.125398 kubelet[2665]: E0209 18:55:10.125252 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.125398 kubelet[2665]: W0209 18:55:10.125263 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.125398 kubelet[2665]: E0209 18:55:10.125384 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.125591 kubelet[2665]: E0209 18:55:10.125551 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.125591 kubelet[2665]: W0209 18:55:10.125560 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.125591 kubelet[2665]: E0209 18:55:10.125580 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.125894 kubelet[2665]: E0209 18:55:10.125880 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.125967 kubelet[2665]: W0209 18:55:10.125938 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.125967 kubelet[2665]: E0209 18:55:10.125964 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.126335 kubelet[2665]: E0209 18:55:10.126307 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.126335 kubelet[2665]: W0209 18:55:10.126321 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.126472 kubelet[2665]: E0209 18:55:10.126341 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.126706 kubelet[2665]: E0209 18:55:10.126693 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.126778 kubelet[2665]: W0209 18:55:10.126708 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.126825 kubelet[2665]: E0209 18:55:10.126811 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.126989 kubelet[2665]: E0209 18:55:10.126978 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.127050 kubelet[2665]: W0209 18:55:10.126991 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.127050 kubelet[2665]: E0209 18:55:10.127010 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.127269 kubelet[2665]: E0209 18:55:10.127233 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.127269 kubelet[2665]: W0209 18:55:10.127253 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.128472 kubelet[2665]: E0209 18:55:10.127280 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.128472 kubelet[2665]: E0209 18:55:10.127635 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.128472 kubelet[2665]: W0209 18:55:10.127645 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.128472 kubelet[2665]: E0209 18:55:10.127665 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.128472 kubelet[2665]: E0209 18:55:10.127893 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.128472 kubelet[2665]: W0209 18:55:10.127900 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.128472 kubelet[2665]: E0209 18:55:10.127913 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.133049 kubelet[2665]: E0209 18:55:10.133020 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.133049 kubelet[2665]: W0209 18:55:10.133044 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.133235 kubelet[2665]: E0209 18:55:10.133068 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.163932 kubelet[2665]: E0209 18:55:10.163909 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.164124 kubelet[2665]: W0209 18:55:10.164106 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.164214 kubelet[2665]: E0209 18:55:10.164204 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.213953 env[1643]: time="2024-02-09T18:55:10.213418840Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-568b786b46-rhns6,Uid:6e32ce07-6b86-45aa-bf34-31d21927e5f0,Namespace:calico-system,Attempt:0,}" Feb 9 18:55:10.214418 kubelet[2665]: I0209 18:55:10.213804 2665 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:55:10.214418 kubelet[2665]: E0209 18:55:10.214120 2665 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jkc2m" podUID=ee2f0cc0-a899-413e-bc32-44614edc0669 Feb 9 18:55:10.249640 env[1643]: time="2024-02-09T18:55:10.249529262Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:55:10.249913 env[1643]: time="2024-02-09T18:55:10.249882723Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:55:10.250038 env[1643]: time="2024-02-09T18:55:10.250014129Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:55:10.250346 env[1643]: time="2024-02-09T18:55:10.250279637Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/996e19df37dbfab24e139dff1b50e9c529df12a5238d3ad2c304ad495acd5f8c pid=3235 runtime=io.containerd.runc.v2 Feb 9 18:55:10.276882 systemd[1]: Started cri-containerd-996e19df37dbfab24e139dff1b50e9c529df12a5238d3ad2c304ad495acd5f8c.scope. Feb 9 18:55:10.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.308000 audit: BPF prog-id=133 op=LOAD Feb 9 18:55:10.310000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.310000 audit[3247]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3235 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:10.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939366531396466333764626661623234653133396466663162353065 Feb 9 18:55:10.310000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.310000 audit[3247]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3235 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:10.312532 kubelet[2665]: E0209 18:55:10.312401 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.312532 kubelet[2665]: W0209 18:55:10.312423 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.312532 kubelet[2665]: E0209 18:55:10.312453 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939366531396466333764626661623234653133396466663162353065 Feb 9 18:55:10.312897 kubelet[2665]: E0209 18:55:10.312857 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.312897 kubelet[2665]: W0209 18:55:10.312880 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.313000 kubelet[2665]: E0209 18:55:10.312907 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.313193 kubelet[2665]: E0209 18:55:10.313181 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.313251 kubelet[2665]: W0209 18:55:10.313196 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.313251 kubelet[2665]: E0209 18:55:10.313223 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.312000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.312000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.312000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.312000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.312000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.312000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.312000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.312000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.312000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.312000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.312000 audit: BPF prog-id=134 op=LOAD Feb 9 18:55:10.312000 audit[3247]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028a340 items=0 ppid=3235 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:10.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939366531396466333764626661623234653133396466663162353065 Feb 9 18:55:10.313000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.313000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.313000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.313000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.313000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.313000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.313000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.313000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.314824 kubelet[2665]: E0209 18:55:10.314522 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.314824 kubelet[2665]: W0209 18:55:10.314535 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.314824 kubelet[2665]: E0209 18:55:10.314554 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.313000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.313000 audit: BPF prog-id=135 op=LOAD Feb 9 18:55:10.315276 kubelet[2665]: E0209 18:55:10.315143 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.315276 kubelet[2665]: W0209 18:55:10.315155 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.315276 kubelet[2665]: E0209 18:55:10.315175 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.313000 audit[3247]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028a388 items=0 ppid=3235 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:10.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939366531396466333764626661623234653133396466663162353065 Feb 9 18:55:10.314000 audit: BPF prog-id=135 op=UNLOAD Feb 9 18:55:10.314000 audit: BPF prog-id=134 op=UNLOAD Feb 9 18:55:10.314000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.314000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.314000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.314000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.314000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.314000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.314000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.314000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.314000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.316550 kubelet[2665]: E0209 18:55:10.316489 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.316550 kubelet[2665]: W0209 18:55:10.316500 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.316550 kubelet[2665]: E0209 18:55:10.316519 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.316929 kubelet[2665]: E0209 18:55:10.316851 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.316929 kubelet[2665]: W0209 18:55:10.316861 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.316929 kubelet[2665]: E0209 18:55:10.316900 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.317248 kubelet[2665]: E0209 18:55:10.317127 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.317248 kubelet[2665]: W0209 18:55:10.317138 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.317248 kubelet[2665]: E0209 18:55:10.317174 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.314000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.314000 audit: BPF prog-id=136 op=LOAD Feb 9 18:55:10.314000 audit[3247]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028a798 items=0 ppid=3235 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:10.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939366531396466333764626661623234653133396466663162353065 Feb 9 18:55:10.318515 kubelet[2665]: E0209 18:55:10.318496 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.318606 kubelet[2665]: W0209 18:55:10.318514 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.318606 kubelet[2665]: E0209 18:55:10.318557 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.319012 kubelet[2665]: E0209 18:55:10.318834 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.319012 kubelet[2665]: W0209 18:55:10.318844 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.319012 kubelet[2665]: E0209 18:55:10.318862 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.319012 kubelet[2665]: I0209 18:55:10.318893 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/ee2f0cc0-a899-413e-bc32-44614edc0669-varrun\") pod \"csi-node-driver-jkc2m\" (UID: \"ee2f0cc0-a899-413e-bc32-44614edc0669\") " pod="calico-system/csi-node-driver-jkc2m" Feb 9 18:55:10.321729 kubelet[2665]: E0209 18:55:10.319448 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.321729 kubelet[2665]: W0209 18:55:10.319462 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.321729 kubelet[2665]: E0209 18:55:10.319493 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.321729 kubelet[2665]: I0209 18:55:10.319524 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/ee2f0cc0-a899-413e-bc32-44614edc0669-kubelet-dir\") pod \"csi-node-driver-jkc2m\" (UID: \"ee2f0cc0-a899-413e-bc32-44614edc0669\") " pod="calico-system/csi-node-driver-jkc2m" Feb 9 18:55:10.321729 kubelet[2665]: E0209 18:55:10.319724 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.321729 kubelet[2665]: W0209 18:55:10.319733 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.321729 kubelet[2665]: E0209 18:55:10.319752 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.321729 kubelet[2665]: E0209 18:55:10.319945 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.321729 kubelet[2665]: W0209 18:55:10.319953 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.322143 kubelet[2665]: E0209 18:55:10.319970 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.322143 kubelet[2665]: E0209 18:55:10.320154 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.322143 kubelet[2665]: W0209 18:55:10.320162 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.322143 kubelet[2665]: E0209 18:55:10.320180 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.322143 kubelet[2665]: E0209 18:55:10.320417 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.322143 kubelet[2665]: W0209 18:55:10.320427 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.322143 kubelet[2665]: E0209 18:55:10.320443 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.322143 kubelet[2665]: E0209 18:55:10.320607 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.322143 kubelet[2665]: W0209 18:55:10.320614 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.322143 kubelet[2665]: E0209 18:55:10.320630 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.322624 kubelet[2665]: E0209 18:55:10.320940 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.322624 kubelet[2665]: W0209 18:55:10.320950 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.322624 kubelet[2665]: E0209 18:55:10.320970 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.322624 kubelet[2665]: E0209 18:55:10.321168 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.322624 kubelet[2665]: W0209 18:55:10.321177 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.322624 kubelet[2665]: E0209 18:55:10.321194 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.322624 kubelet[2665]: E0209 18:55:10.321427 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.322624 kubelet[2665]: W0209 18:55:10.321436 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.322624 kubelet[2665]: E0209 18:55:10.321454 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.322624 kubelet[2665]: E0209 18:55:10.321642 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.323002 kubelet[2665]: W0209 18:55:10.321650 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.323002 kubelet[2665]: E0209 18:55:10.321662 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.323740 env[1643]: time="2024-02-09T18:55:10.323391235Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-7gqrg,Uid:722ab127-3ef8-4c93-b41d-f8f453285271,Namespace:calico-system,Attempt:0,}" Feb 9 18:55:10.323838 kubelet[2665]: E0209 18:55:10.323660 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.323838 kubelet[2665]: W0209 18:55:10.323672 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.323838 kubelet[2665]: E0209 18:55:10.323690 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.355811 env[1643]: time="2024-02-09T18:55:10.355502750Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:55:10.355811 env[1643]: time="2024-02-09T18:55:10.355615168Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:55:10.355811 env[1643]: time="2024-02-09T18:55:10.355631685Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:55:10.363354 env[1643]: time="2024-02-09T18:55:10.355789361Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/18282b8003a4ead6f2fc0b1429b70804d656178fe1cc510bbe30e81842a13a79 pid=3293 runtime=io.containerd.runc.v2 Feb 9 18:55:10.375958 systemd[1]: Started cri-containerd-18282b8003a4ead6f2fc0b1429b70804d656178fe1cc510bbe30e81842a13a79.scope. Feb 9 18:55:10.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.403000 audit: BPF prog-id=137 op=LOAD Feb 9 18:55:10.405000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.405000 audit[3302]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3293 pid=3302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:10.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138323832623830303361346561643666326663306231343239623730 Feb 9 18:55:10.405000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.405000 audit[3302]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3293 pid=3302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:10.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138323832623830303361346561643666326663306231343239623730 Feb 9 18:55:10.406000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.406000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.406000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.406000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.406000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.406000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.406000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.406000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.406000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.406000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.406000 audit: BPF prog-id=138 op=LOAD Feb 9 18:55:10.406000 audit[3302]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001851c0 items=0 ppid=3293 pid=3302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:10.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138323832623830303361346561643666326663306231343239623730 Feb 9 18:55:10.406000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.406000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.406000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.406000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.406000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.406000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.406000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.406000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.406000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.406000 audit: BPF prog-id=139 op=LOAD Feb 9 18:55:10.406000 audit[3302]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000185208 items=0 ppid=3293 pid=3302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:10.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138323832623830303361346561643666326663306231343239623730 Feb 9 18:55:10.406000 audit: BPF prog-id=139 op=UNLOAD Feb 9 18:55:10.406000 audit: BPF prog-id=138 op=UNLOAD Feb 9 18:55:10.407000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.407000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.407000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.407000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.407000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.407000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.407000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.407000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.407000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.407000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:10.407000 audit: BPF prog-id=140 op=LOAD Feb 9 18:55:10.407000 audit[3302]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000185618 items=0 ppid=3293 pid=3302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:10.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138323832623830303361346561643666326663306231343239623730 Feb 9 18:55:10.422309 kubelet[2665]: E0209 18:55:10.422183 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.422309 kubelet[2665]: W0209 18:55:10.422204 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.422309 kubelet[2665]: E0209 18:55:10.422231 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.424193 kubelet[2665]: E0209 18:55:10.423018 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.424193 kubelet[2665]: W0209 18:55:10.423031 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.424193 kubelet[2665]: E0209 18:55:10.423073 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.424193 kubelet[2665]: E0209 18:55:10.423385 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.424193 kubelet[2665]: W0209 18:55:10.423395 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.424193 kubelet[2665]: E0209 18:55:10.423413 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.424193 kubelet[2665]: I0209 18:55:10.423451 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ggmxw\" (UniqueName: \"kubernetes.io/projected/ee2f0cc0-a899-413e-bc32-44614edc0669-kube-api-access-ggmxw\") pod \"csi-node-driver-jkc2m\" (UID: \"ee2f0cc0-a899-413e-bc32-44614edc0669\") " pod="calico-system/csi-node-driver-jkc2m" Feb 9 18:55:10.424920 kubelet[2665]: E0209 18:55:10.424669 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.424920 kubelet[2665]: W0209 18:55:10.424709 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.424920 kubelet[2665]: E0209 18:55:10.424734 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.425642 kubelet[2665]: I0209 18:55:10.425175 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/ee2f0cc0-a899-413e-bc32-44614edc0669-registration-dir\") pod \"csi-node-driver-jkc2m\" (UID: \"ee2f0cc0-a899-413e-bc32-44614edc0669\") " pod="calico-system/csi-node-driver-jkc2m" Feb 9 18:55:10.425642 kubelet[2665]: E0209 18:55:10.425390 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.425642 kubelet[2665]: W0209 18:55:10.425399 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.425642 kubelet[2665]: E0209 18:55:10.425419 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.427276 kubelet[2665]: E0209 18:55:10.425943 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.427276 kubelet[2665]: W0209 18:55:10.425954 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.427276 kubelet[2665]: E0209 18:55:10.425976 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.428677 kubelet[2665]: E0209 18:55:10.428214 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.428677 kubelet[2665]: W0209 18:55:10.428227 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.428677 kubelet[2665]: E0209 18:55:10.428664 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.429164 kubelet[2665]: E0209 18:55:10.428892 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.429164 kubelet[2665]: W0209 18:55:10.428903 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.429164 kubelet[2665]: E0209 18:55:10.428919 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.431068 kubelet[2665]: E0209 18:55:10.431041 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.431068 kubelet[2665]: W0209 18:55:10.431067 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.431376 kubelet[2665]: E0209 18:55:10.431092 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.431376 kubelet[2665]: E0209 18:55:10.431328 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.431376 kubelet[2665]: W0209 18:55:10.431339 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.431376 kubelet[2665]: E0209 18:55:10.431358 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.432947 kubelet[2665]: E0209 18:55:10.431698 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.432947 kubelet[2665]: W0209 18:55:10.431709 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.432947 kubelet[2665]: E0209 18:55:10.431805 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.432947 kubelet[2665]: E0209 18:55:10.431945 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.432947 kubelet[2665]: W0209 18:55:10.431956 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.432947 kubelet[2665]: E0209 18:55:10.431988 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.432947 kubelet[2665]: I0209 18:55:10.432070 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/ee2f0cc0-a899-413e-bc32-44614edc0669-socket-dir\") pod \"csi-node-driver-jkc2m\" (UID: \"ee2f0cc0-a899-413e-bc32-44614edc0669\") " pod="calico-system/csi-node-driver-jkc2m" Feb 9 18:55:10.432947 kubelet[2665]: E0209 18:55:10.432153 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.432947 kubelet[2665]: W0209 18:55:10.432162 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.434650 kubelet[2665]: E0209 18:55:10.432256 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.434650 kubelet[2665]: E0209 18:55:10.432404 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.434650 kubelet[2665]: W0209 18:55:10.432412 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.434650 kubelet[2665]: E0209 18:55:10.432434 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.434650 kubelet[2665]: E0209 18:55:10.432625 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.434650 kubelet[2665]: W0209 18:55:10.432635 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.434650 kubelet[2665]: E0209 18:55:10.432657 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.434650 kubelet[2665]: E0209 18:55:10.432910 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.434650 kubelet[2665]: W0209 18:55:10.432920 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.434650 kubelet[2665]: E0209 18:55:10.432939 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.435864 kubelet[2665]: E0209 18:55:10.433174 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.435864 kubelet[2665]: W0209 18:55:10.433183 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.435864 kubelet[2665]: E0209 18:55:10.433205 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.435864 kubelet[2665]: E0209 18:55:10.433422 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.435864 kubelet[2665]: W0209 18:55:10.433432 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.435864 kubelet[2665]: E0209 18:55:10.433447 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.439199 kubelet[2665]: E0209 18:55:10.439117 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.439199 kubelet[2665]: W0209 18:55:10.439135 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.439199 kubelet[2665]: E0209 18:55:10.439159 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.455312 env[1643]: time="2024-02-09T18:55:10.455226374Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-7gqrg,Uid:722ab127-3ef8-4c93-b41d-f8f453285271,Namespace:calico-system,Attempt:0,} returns sandbox id \"18282b8003a4ead6f2fc0b1429b70804d656178fe1cc510bbe30e81842a13a79\"" Feb 9 18:55:10.460846 env[1643]: time="2024-02-09T18:55:10.460794344Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 18:55:10.481929 env[1643]: time="2024-02-09T18:55:10.481712778Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-568b786b46-rhns6,Uid:6e32ce07-6b86-45aa-bf34-31d21927e5f0,Namespace:calico-system,Attempt:0,} returns sandbox id \"996e19df37dbfab24e139dff1b50e9c529df12a5238d3ad2c304ad495acd5f8c\"" Feb 9 18:55:10.535625 kubelet[2665]: E0209 18:55:10.535522 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.535625 kubelet[2665]: W0209 18:55:10.535549 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.535625 kubelet[2665]: E0209 18:55:10.535578 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.536220 kubelet[2665]: E0209 18:55:10.536167 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.536220 kubelet[2665]: W0209 18:55:10.536182 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.536220 kubelet[2665]: E0209 18:55:10.536210 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.543322 kubelet[2665]: E0209 18:55:10.536496 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.543322 kubelet[2665]: W0209 18:55:10.536508 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.543322 kubelet[2665]: E0209 18:55:10.536531 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.543322 kubelet[2665]: E0209 18:55:10.539864 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.543322 kubelet[2665]: W0209 18:55:10.540002 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.543322 kubelet[2665]: E0209 18:55:10.540233 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.543322 kubelet[2665]: E0209 18:55:10.540656 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.543322 kubelet[2665]: W0209 18:55:10.540668 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.543322 kubelet[2665]: E0209 18:55:10.541089 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.543322 kubelet[2665]: E0209 18:55:10.541440 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.544163 kubelet[2665]: W0209 18:55:10.541451 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.544163 kubelet[2665]: E0209 18:55:10.541545 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.544163 kubelet[2665]: E0209 18:55:10.541834 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.544163 kubelet[2665]: W0209 18:55:10.541844 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.544163 kubelet[2665]: E0209 18:55:10.542105 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.544163 kubelet[2665]: E0209 18:55:10.542440 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.544163 kubelet[2665]: W0209 18:55:10.542450 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.544163 kubelet[2665]: E0209 18:55:10.542473 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.544163 kubelet[2665]: E0209 18:55:10.542835 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.544163 kubelet[2665]: W0209 18:55:10.542845 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.544614 kubelet[2665]: E0209 18:55:10.542864 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.544614 kubelet[2665]: E0209 18:55:10.543216 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.544614 kubelet[2665]: W0209 18:55:10.543226 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.544614 kubelet[2665]: E0209 18:55:10.543246 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.544614 kubelet[2665]: E0209 18:55:10.543515 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.544614 kubelet[2665]: W0209 18:55:10.543525 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.544614 kubelet[2665]: E0209 18:55:10.543541 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.544614 kubelet[2665]: E0209 18:55:10.544135 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.544614 kubelet[2665]: W0209 18:55:10.544145 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.544614 kubelet[2665]: E0209 18:55:10.544165 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.545413 kubelet[2665]: E0209 18:55:10.544648 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.545413 kubelet[2665]: W0209 18:55:10.544658 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.545413 kubelet[2665]: E0209 18:55:10.544680 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.545413 kubelet[2665]: E0209 18:55:10.544884 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.545413 kubelet[2665]: W0209 18:55:10.544892 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.545413 kubelet[2665]: E0209 18:55:10.544907 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.545413 kubelet[2665]: E0209 18:55:10.545278 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.545413 kubelet[2665]: W0209 18:55:10.545307 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.545413 kubelet[2665]: E0209 18:55:10.545324 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.567374 kubelet[2665]: E0209 18:55:10.567340 2665 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:55:10.567374 kubelet[2665]: W0209 18:55:10.567362 2665 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:55:10.567553 kubelet[2665]: E0209 18:55:10.567386 2665 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:55:10.798000 audit[3370]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=3370 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:10.798000 audit[3370]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd72cb5470 a2=0 a3=7ffd72cb545c items=0 ppid=2987 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:10.798000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:10.816000 audit[3370]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3370 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:10.816000 audit[3370]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffd72cb5470 a2=0 a3=31030 items=0 ppid=2987 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:10.816000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:11.864000 audit[3373]: NETFILTER_CFG table=filter:95 family=2 entries=16 op=nft_register_rule pid=3373 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:11.864000 audit[3373]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe8fdda400 a2=0 a3=7ffe8fdda3ec items=0 ppid=2987 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:11.864000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:11.869000 audit[3373]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=3373 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:11.869000 audit[3373]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffe8fdda400 a2=0 a3=31030 items=0 ppid=2987 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:11.869000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:12.395465 kubelet[2665]: E0209 18:55:12.395427 2665 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jkc2m" podUID=ee2f0cc0-a899-413e-bc32-44614edc0669 Feb 9 18:55:13.342695 env[1643]: time="2024-02-09T18:55:13.342648909Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:13.347642 env[1643]: time="2024-02-09T18:55:13.347594723Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:13.350471 env[1643]: time="2024-02-09T18:55:13.350428068Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:13.353159 env[1643]: time="2024-02-09T18:55:13.353102684Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:13.354415 env[1643]: time="2024-02-09T18:55:13.354376103Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 18:55:13.357497 env[1643]: time="2024-02-09T18:55:13.356619310Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 9 18:55:13.359847 env[1643]: time="2024-02-09T18:55:13.359797821Z" level=info msg="CreateContainer within sandbox \"18282b8003a4ead6f2fc0b1429b70804d656178fe1cc510bbe30e81842a13a79\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 18:55:13.382602 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1247938274.mount: Deactivated successfully. Feb 9 18:55:13.396862 env[1643]: time="2024-02-09T18:55:13.395237894Z" level=info msg="CreateContainer within sandbox \"18282b8003a4ead6f2fc0b1429b70804d656178fe1cc510bbe30e81842a13a79\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"09885961d4fea0e8ede31953232bec41ccee68455fc09e1fefd98704a7b52d29\"" Feb 9 18:55:13.397707 env[1643]: time="2024-02-09T18:55:13.397676646Z" level=info msg="StartContainer for \"09885961d4fea0e8ede31953232bec41ccee68455fc09e1fefd98704a7b52d29\"" Feb 9 18:55:13.437723 systemd[1]: run-containerd-runc-k8s.io-09885961d4fea0e8ede31953232bec41ccee68455fc09e1fefd98704a7b52d29-runc.PkpKB0.mount: Deactivated successfully. Feb 9 18:55:13.446722 systemd[1]: Started cri-containerd-09885961d4fea0e8ede31953232bec41ccee68455fc09e1fefd98704a7b52d29.scope. Feb 9 18:55:13.486409 kernel: kauditd_printk_skb: 185 callbacks suppressed Feb 9 18:55:13.486544 kernel: audit: type=1400 audit(1707504913.482:1154): avc: denied { perfmon } for pid=3382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit[3382]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3293 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:13.496047 kernel: audit: type=1300 audit(1707504913.482:1154): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3293 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:13.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039383835393631643466656130653865646533313935333233326265 Feb 9 18:55:13.502246 kernel: audit: type=1327 audit(1707504913.482:1154): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039383835393631643466656130653865646533313935333233326265 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.515473 kernel: audit: type=1400 audit(1707504913.482:1155): avc: denied { bpf } for pid=3382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.515600 kernel: audit: type=1400 audit(1707504913.482:1155): avc: denied { bpf } for pid=3382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.522566 env[1643]: time="2024-02-09T18:55:13.521094069Z" level=info msg="StartContainer for \"09885961d4fea0e8ede31953232bec41ccee68455fc09e1fefd98704a7b52d29\" returns successfully" Feb 9 18:55:13.526301 kernel: audit: type=1400 audit(1707504913.482:1155): avc: denied { bpf } for pid=3382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.533316 kernel: audit: type=1400 audit(1707504913.482:1155): avc: denied { perfmon } for pid=3382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.538069 env[1643]: time="2024-02-09T18:55:13.538025125Z" level=info msg="StopContainer for \"09885961d4fea0e8ede31953232bec41ccee68455fc09e1fefd98704a7b52d29\" with timeout 5 (s)" Feb 9 18:55:13.538620 env[1643]: time="2024-02-09T18:55:13.538589062Z" level=info msg="Stop container \"09885961d4fea0e8ede31953232bec41ccee68455fc09e1fefd98704a7b52d29\" with signal terminated" Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.547308 kernel: audit: type=1400 audit(1707504913.482:1155): avc: denied { perfmon } for pid=3382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.554307 kernel: audit: type=1400 audit(1707504913.482:1155): avc: denied { perfmon } for pid=3382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.563336 kernel: audit: type=1400 audit(1707504913.482:1155): avc: denied { perfmon } for pid=3382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit: BPF prog-id=141 op=LOAD Feb 9 18:55:13.482000 audit[3382]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0003881f0 items=0 ppid=3293 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:13.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039383835393631643466656130653865646533313935333233326265 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit: BPF prog-id=142 op=LOAD Feb 9 18:55:13.482000 audit[3382]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000388238 items=0 ppid=3293 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:13.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039383835393631643466656130653865646533313935333233326265 Feb 9 18:55:13.482000 audit: BPF prog-id=142 op=UNLOAD Feb 9 18:55:13.482000 audit: BPF prog-id=141 op=UNLOAD Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { perfmon } for pid=3382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit[3382]: AVC avc: denied { bpf } for pid=3382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:13.482000 audit: BPF prog-id=143 op=LOAD Feb 9 18:55:13.482000 audit[3382]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0003882c8 items=0 ppid=3293 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:13.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039383835393631643466656130653865646533313935333233326265 Feb 9 18:55:13.570607 systemd[1]: cri-containerd-09885961d4fea0e8ede31953232bec41ccee68455fc09e1fefd98704a7b52d29.scope: Deactivated successfully. Feb 9 18:55:13.572000 audit: BPF prog-id=143 op=UNLOAD Feb 9 18:55:13.657215 env[1643]: time="2024-02-09T18:55:13.657082769Z" level=info msg="shim disconnected" id=09885961d4fea0e8ede31953232bec41ccee68455fc09e1fefd98704a7b52d29 Feb 9 18:55:13.657215 env[1643]: time="2024-02-09T18:55:13.657134200Z" level=warning msg="cleaning up after shim disconnected" id=09885961d4fea0e8ede31953232bec41ccee68455fc09e1fefd98704a7b52d29 namespace=k8s.io Feb 9 18:55:13.657215 env[1643]: time="2024-02-09T18:55:13.657147463Z" level=info msg="cleaning up dead shim" Feb 9 18:55:13.672499 env[1643]: time="2024-02-09T18:55:13.672450376Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:55:13Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3430 runtime=io.containerd.runc.v2\n" Feb 9 18:55:13.678316 env[1643]: time="2024-02-09T18:55:13.677525337Z" level=info msg="StopContainer for \"09885961d4fea0e8ede31953232bec41ccee68455fc09e1fefd98704a7b52d29\" returns successfully" Feb 9 18:55:13.678890 env[1643]: time="2024-02-09T18:55:13.678839414Z" level=info msg="StopPodSandbox for \"18282b8003a4ead6f2fc0b1429b70804d656178fe1cc510bbe30e81842a13a79\"" Feb 9 18:55:13.679184 env[1643]: time="2024-02-09T18:55:13.679154149Z" level=info msg="Container to stop \"09885961d4fea0e8ede31953232bec41ccee68455fc09e1fefd98704a7b52d29\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Feb 9 18:55:13.690704 systemd[1]: cri-containerd-18282b8003a4ead6f2fc0b1429b70804d656178fe1cc510bbe30e81842a13a79.scope: Deactivated successfully. Feb 9 18:55:13.689000 audit: BPF prog-id=137 op=UNLOAD Feb 9 18:55:13.693000 audit: BPF prog-id=140 op=UNLOAD Feb 9 18:55:13.742124 env[1643]: time="2024-02-09T18:55:13.741999463Z" level=info msg="shim disconnected" id=18282b8003a4ead6f2fc0b1429b70804d656178fe1cc510bbe30e81842a13a79 Feb 9 18:55:13.743053 env[1643]: time="2024-02-09T18:55:13.743019661Z" level=warning msg="cleaning up after shim disconnected" id=18282b8003a4ead6f2fc0b1429b70804d656178fe1cc510bbe30e81842a13a79 namespace=k8s.io Feb 9 18:55:13.743227 env[1643]: time="2024-02-09T18:55:13.743208234Z" level=info msg="cleaning up dead shim" Feb 9 18:55:13.752688 env[1643]: time="2024-02-09T18:55:13.752640088Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:55:13Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3458 runtime=io.containerd.runc.v2\n" Feb 9 18:55:13.753008 env[1643]: time="2024-02-09T18:55:13.752973354Z" level=info msg="TearDown network for sandbox \"18282b8003a4ead6f2fc0b1429b70804d656178fe1cc510bbe30e81842a13a79\" successfully" Feb 9 18:55:13.753096 env[1643]: time="2024-02-09T18:55:13.753003252Z" level=info msg="StopPodSandbox for \"18282b8003a4ead6f2fc0b1429b70804d656178fe1cc510bbe30e81842a13a79\" returns successfully" Feb 9 18:55:13.879616 kubelet[2665]: I0209 18:55:13.879534 2665 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-var-lib-calico\") pod \"722ab127-3ef8-4c93-b41d-f8f453285271\" (UID: \"722ab127-3ef8-4c93-b41d-f8f453285271\") " Feb 9 18:55:13.880089 kubelet[2665]: I0209 18:55:13.879628 2665 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-cni-log-dir\") pod \"722ab127-3ef8-4c93-b41d-f8f453285271\" (UID: \"722ab127-3ef8-4c93-b41d-f8f453285271\") " Feb 9 18:55:13.880089 kubelet[2665]: I0209 18:55:13.879661 2665 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-flexvol-driver-host\") pod \"722ab127-3ef8-4c93-b41d-f8f453285271\" (UID: \"722ab127-3ef8-4c93-b41d-f8f453285271\") " Feb 9 18:55:13.880089 kubelet[2665]: I0209 18:55:13.879686 2665 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-cni-net-dir\") pod \"722ab127-3ef8-4c93-b41d-f8f453285271\" (UID: \"722ab127-3ef8-4c93-b41d-f8f453285271\") " Feb 9 18:55:13.880089 kubelet[2665]: I0209 18:55:13.879711 2665 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-policysync\") pod \"722ab127-3ef8-4c93-b41d-f8f453285271\" (UID: \"722ab127-3ef8-4c93-b41d-f8f453285271\") " Feb 9 18:55:13.880089 kubelet[2665]: I0209 18:55:13.879744 2665 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-var-run-calico\") pod \"722ab127-3ef8-4c93-b41d-f8f453285271\" (UID: \"722ab127-3ef8-4c93-b41d-f8f453285271\") " Feb 9 18:55:13.880089 kubelet[2665]: I0209 18:55:13.879789 2665 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-lib-modules\") pod \"722ab127-3ef8-4c93-b41d-f8f453285271\" (UID: \"722ab127-3ef8-4c93-b41d-f8f453285271\") " Feb 9 18:55:13.880403 kubelet[2665]: I0209 18:55:13.879823 2665 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/722ab127-3ef8-4c93-b41d-f8f453285271-node-certs\") pod \"722ab127-3ef8-4c93-b41d-f8f453285271\" (UID: \"722ab127-3ef8-4c93-b41d-f8f453285271\") " Feb 9 18:55:13.880403 kubelet[2665]: I0209 18:55:13.879851 2665 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-cni-bin-dir\") pod \"722ab127-3ef8-4c93-b41d-f8f453285271\" (UID: \"722ab127-3ef8-4c93-b41d-f8f453285271\") " Feb 9 18:55:13.880403 kubelet[2665]: I0209 18:55:13.879886 2665 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-xtables-lock\") pod \"722ab127-3ef8-4c93-b41d-f8f453285271\" (UID: \"722ab127-3ef8-4c93-b41d-f8f453285271\") " Feb 9 18:55:13.880403 kubelet[2665]: I0209 18:55:13.879919 2665 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-xrb4w\" (UniqueName: \"kubernetes.io/projected/722ab127-3ef8-4c93-b41d-f8f453285271-kube-api-access-xrb4w\") pod \"722ab127-3ef8-4c93-b41d-f8f453285271\" (UID: \"722ab127-3ef8-4c93-b41d-f8f453285271\") " Feb 9 18:55:13.880403 kubelet[2665]: I0209 18:55:13.879948 2665 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/722ab127-3ef8-4c93-b41d-f8f453285271-tigera-ca-bundle\") pod \"722ab127-3ef8-4c93-b41d-f8f453285271\" (UID: \"722ab127-3ef8-4c93-b41d-f8f453285271\") " Feb 9 18:55:13.880403 kubelet[2665]: W0209 18:55:13.880187 2665 empty_dir.go:525] Warning: Failed to clear quota on /var/lib/kubelet/pods/722ab127-3ef8-4c93-b41d-f8f453285271/volumes/kubernetes.io~configmap/tigera-ca-bundle: clearQuota called, but quotas disabled Feb 9 18:55:13.880724 kubelet[2665]: I0209 18:55:13.880480 2665 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/722ab127-3ef8-4c93-b41d-f8f453285271-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "722ab127-3ef8-4c93-b41d-f8f453285271" (UID: "722ab127-3ef8-4c93-b41d-f8f453285271"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Feb 9 18:55:13.880724 kubelet[2665]: I0209 18:55:13.880536 2665 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "722ab127-3ef8-4c93-b41d-f8f453285271" (UID: "722ab127-3ef8-4c93-b41d-f8f453285271"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 18:55:13.880724 kubelet[2665]: I0209 18:55:13.880566 2665 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "722ab127-3ef8-4c93-b41d-f8f453285271" (UID: "722ab127-3ef8-4c93-b41d-f8f453285271"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 18:55:13.880724 kubelet[2665]: I0209 18:55:13.880648 2665 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "722ab127-3ef8-4c93-b41d-f8f453285271" (UID: "722ab127-3ef8-4c93-b41d-f8f453285271"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 18:55:13.880724 kubelet[2665]: I0209 18:55:13.880672 2665 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "722ab127-3ef8-4c93-b41d-f8f453285271" (UID: "722ab127-3ef8-4c93-b41d-f8f453285271"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 18:55:13.880965 kubelet[2665]: I0209 18:55:13.880700 2665 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-policysync" (OuterVolumeSpecName: "policysync") pod "722ab127-3ef8-4c93-b41d-f8f453285271" (UID: "722ab127-3ef8-4c93-b41d-f8f453285271"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 18:55:13.880965 kubelet[2665]: I0209 18:55:13.880725 2665 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "722ab127-3ef8-4c93-b41d-f8f453285271" (UID: "722ab127-3ef8-4c93-b41d-f8f453285271"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 18:55:13.880965 kubelet[2665]: I0209 18:55:13.880762 2665 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "722ab127-3ef8-4c93-b41d-f8f453285271" (UID: "722ab127-3ef8-4c93-b41d-f8f453285271"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 18:55:13.881395 kubelet[2665]: I0209 18:55:13.881146 2665 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "722ab127-3ef8-4c93-b41d-f8f453285271" (UID: "722ab127-3ef8-4c93-b41d-f8f453285271"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 18:55:13.881395 kubelet[2665]: I0209 18:55:13.881188 2665 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "722ab127-3ef8-4c93-b41d-f8f453285271" (UID: "722ab127-3ef8-4c93-b41d-f8f453285271"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 18:55:13.886312 kubelet[2665]: I0209 18:55:13.886259 2665 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/722ab127-3ef8-4c93-b41d-f8f453285271-node-certs" (OuterVolumeSpecName: "node-certs") pod "722ab127-3ef8-4c93-b41d-f8f453285271" (UID: "722ab127-3ef8-4c93-b41d-f8f453285271"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Feb 9 18:55:13.886477 kubelet[2665]: I0209 18:55:13.886259 2665 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/722ab127-3ef8-4c93-b41d-f8f453285271-kube-api-access-xrb4w" (OuterVolumeSpecName: "kube-api-access-xrb4w") pod "722ab127-3ef8-4c93-b41d-f8f453285271" (UID: "722ab127-3ef8-4c93-b41d-f8f453285271"). InnerVolumeSpecName "kube-api-access-xrb4w". PluginName "kubernetes.io/projected", VolumeGidValue "" Feb 9 18:55:13.981024 kubelet[2665]: I0209 18:55:13.980908 2665 reconciler_common.go:300] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-lib-modules\") on node \"ip-172-31-21-122\" DevicePath \"\"" Feb 9 18:55:13.981024 kubelet[2665]: I0209 18:55:13.980944 2665 reconciler_common.go:300] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/722ab127-3ef8-4c93-b41d-f8f453285271-node-certs\") on node \"ip-172-31-21-122\" DevicePath \"\"" Feb 9 18:55:13.981024 kubelet[2665]: I0209 18:55:13.980958 2665 reconciler_common.go:300] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-cni-bin-dir\") on node \"ip-172-31-21-122\" DevicePath \"\"" Feb 9 18:55:13.981024 kubelet[2665]: I0209 18:55:13.980972 2665 reconciler_common.go:300] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-xtables-lock\") on node \"ip-172-31-21-122\" DevicePath \"\"" Feb 9 18:55:13.981024 kubelet[2665]: I0209 18:55:13.980986 2665 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-xrb4w\" (UniqueName: \"kubernetes.io/projected/722ab127-3ef8-4c93-b41d-f8f453285271-kube-api-access-xrb4w\") on node \"ip-172-31-21-122\" DevicePath \"\"" Feb 9 18:55:13.981024 kubelet[2665]: I0209 18:55:13.981006 2665 reconciler_common.go:300] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/722ab127-3ef8-4c93-b41d-f8f453285271-tigera-ca-bundle\") on node \"ip-172-31-21-122\" DevicePath \"\"" Feb 9 18:55:13.981024 kubelet[2665]: I0209 18:55:13.981019 2665 reconciler_common.go:300] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-var-lib-calico\") on node \"ip-172-31-21-122\" DevicePath \"\"" Feb 9 18:55:13.981024 kubelet[2665]: I0209 18:55:13.981033 2665 reconciler_common.go:300] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-cni-log-dir\") on node \"ip-172-31-21-122\" DevicePath \"\"" Feb 9 18:55:13.981537 kubelet[2665]: I0209 18:55:13.981047 2665 reconciler_common.go:300] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-flexvol-driver-host\") on node \"ip-172-31-21-122\" DevicePath \"\"" Feb 9 18:55:13.981537 kubelet[2665]: I0209 18:55:13.981058 2665 reconciler_common.go:300] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-cni-net-dir\") on node \"ip-172-31-21-122\" DevicePath \"\"" Feb 9 18:55:13.981537 kubelet[2665]: I0209 18:55:13.981072 2665 reconciler_common.go:300] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-var-run-calico\") on node \"ip-172-31-21-122\" DevicePath \"\"" Feb 9 18:55:13.981537 kubelet[2665]: I0209 18:55:13.981083 2665 reconciler_common.go:300] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/722ab127-3ef8-4c93-b41d-f8f453285271-policysync\") on node \"ip-172-31-21-122\" DevicePath \"\"" Feb 9 18:55:14.381775 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-09885961d4fea0e8ede31953232bec41ccee68455fc09e1fefd98704a7b52d29-rootfs.mount: Deactivated successfully. Feb 9 18:55:14.381905 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-18282b8003a4ead6f2fc0b1429b70804d656178fe1cc510bbe30e81842a13a79-rootfs.mount: Deactivated successfully. Feb 9 18:55:14.383146 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-18282b8003a4ead6f2fc0b1429b70804d656178fe1cc510bbe30e81842a13a79-shm.mount: Deactivated successfully. Feb 9 18:55:14.383321 systemd[1]: var-lib-kubelet-pods-722ab127\x2d3ef8\x2d4c93\x2db41d\x2df8f453285271-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dxrb4w.mount: Deactivated successfully. Feb 9 18:55:14.383412 systemd[1]: var-lib-kubelet-pods-722ab127\x2d3ef8\x2d4c93\x2db41d\x2df8f453285271-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Feb 9 18:55:14.395677 kubelet[2665]: E0209 18:55:14.395646 2665 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jkc2m" podUID=ee2f0cc0-a899-413e-bc32-44614edc0669 Feb 9 18:55:14.540904 kubelet[2665]: I0209 18:55:14.540862 2665 scope.go:115] "RemoveContainer" containerID="09885961d4fea0e8ede31953232bec41ccee68455fc09e1fefd98704a7b52d29" Feb 9 18:55:14.546756 systemd[1]: Removed slice kubepods-besteffort-pod722ab127_3ef8_4c93_b41d_f8f453285271.slice. Feb 9 18:55:14.549672 env[1643]: time="2024-02-09T18:55:14.549634297Z" level=info msg="RemoveContainer for \"09885961d4fea0e8ede31953232bec41ccee68455fc09e1fefd98704a7b52d29\"" Feb 9 18:55:14.559536 env[1643]: time="2024-02-09T18:55:14.559487861Z" level=info msg="RemoveContainer for \"09885961d4fea0e8ede31953232bec41ccee68455fc09e1fefd98704a7b52d29\" returns successfully" Feb 9 18:55:14.562747 kubelet[2665]: I0209 18:55:14.562712 2665 scope.go:115] "RemoveContainer" containerID="09885961d4fea0e8ede31953232bec41ccee68455fc09e1fefd98704a7b52d29" Feb 9 18:55:14.563143 env[1643]: time="2024-02-09T18:55:14.563026831Z" level=error msg="ContainerStatus for \"09885961d4fea0e8ede31953232bec41ccee68455fc09e1fefd98704a7b52d29\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"09885961d4fea0e8ede31953232bec41ccee68455fc09e1fefd98704a7b52d29\": not found" Feb 9 18:55:14.563402 kubelet[2665]: E0209 18:55:14.563373 2665 remote_runtime.go:415] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"09885961d4fea0e8ede31953232bec41ccee68455fc09e1fefd98704a7b52d29\": not found" containerID="09885961d4fea0e8ede31953232bec41ccee68455fc09e1fefd98704a7b52d29" Feb 9 18:55:14.563501 kubelet[2665]: I0209 18:55:14.563432 2665 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={Type:containerd ID:09885961d4fea0e8ede31953232bec41ccee68455fc09e1fefd98704a7b52d29} err="failed to get container status \"09885961d4fea0e8ede31953232bec41ccee68455fc09e1fefd98704a7b52d29\": rpc error: code = NotFound desc = an error occurred when try to find container \"09885961d4fea0e8ede31953232bec41ccee68455fc09e1fefd98704a7b52d29\": not found" Feb 9 18:55:14.621430 kubelet[2665]: I0209 18:55:14.621392 2665 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:55:14.621753 kubelet[2665]: E0209 18:55:14.621489 2665 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="722ab127-3ef8-4c93-b41d-f8f453285271" containerName="flexvol-driver" Feb 9 18:55:14.621753 kubelet[2665]: I0209 18:55:14.621527 2665 memory_manager.go:346] "RemoveStaleState removing state" podUID="722ab127-3ef8-4c93-b41d-f8f453285271" containerName="flexvol-driver" Feb 9 18:55:14.631930 systemd[1]: Created slice kubepods-besteffort-pod3e869538_df6e_4628_ac2d_0c22281c4a3b.slice. Feb 9 18:55:14.690646 kubelet[2665]: I0209 18:55:14.690531 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3e869538-df6e-4628-ac2d-0c22281c4a3b-lib-modules\") pod \"calico-node-4nbcl\" (UID: \"3e869538-df6e-4628-ac2d-0c22281c4a3b\") " pod="calico-system/calico-node-4nbcl" Feb 9 18:55:14.690646 kubelet[2665]: I0209 18:55:14.690581 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/3e869538-df6e-4628-ac2d-0c22281c4a3b-policysync\") pod \"calico-node-4nbcl\" (UID: \"3e869538-df6e-4628-ac2d-0c22281c4a3b\") " pod="calico-system/calico-node-4nbcl" Feb 9 18:55:14.690646 kubelet[2665]: I0209 18:55:14.690612 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/3e869538-df6e-4628-ac2d-0c22281c4a3b-cni-net-dir\") pod \"calico-node-4nbcl\" (UID: \"3e869538-df6e-4628-ac2d-0c22281c4a3b\") " pod="calico-system/calico-node-4nbcl" Feb 9 18:55:14.690646 kubelet[2665]: I0209 18:55:14.690641 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dqxck\" (UniqueName: \"kubernetes.io/projected/3e869538-df6e-4628-ac2d-0c22281c4a3b-kube-api-access-dqxck\") pod \"calico-node-4nbcl\" (UID: \"3e869538-df6e-4628-ac2d-0c22281c4a3b\") " pod="calico-system/calico-node-4nbcl" Feb 9 18:55:14.690935 kubelet[2665]: I0209 18:55:14.690670 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/3e869538-df6e-4628-ac2d-0c22281c4a3b-flexvol-driver-host\") pod \"calico-node-4nbcl\" (UID: \"3e869538-df6e-4628-ac2d-0c22281c4a3b\") " pod="calico-system/calico-node-4nbcl" Feb 9 18:55:14.690935 kubelet[2665]: I0209 18:55:14.690695 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3e869538-df6e-4628-ac2d-0c22281c4a3b-xtables-lock\") pod \"calico-node-4nbcl\" (UID: \"3e869538-df6e-4628-ac2d-0c22281c4a3b\") " pod="calico-system/calico-node-4nbcl" Feb 9 18:55:14.690935 kubelet[2665]: I0209 18:55:14.690719 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/3e869538-df6e-4628-ac2d-0c22281c4a3b-var-run-calico\") pod \"calico-node-4nbcl\" (UID: \"3e869538-df6e-4628-ac2d-0c22281c4a3b\") " pod="calico-system/calico-node-4nbcl" Feb 9 18:55:14.690935 kubelet[2665]: I0209 18:55:14.690748 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3e869538-df6e-4628-ac2d-0c22281c4a3b-tigera-ca-bundle\") pod \"calico-node-4nbcl\" (UID: \"3e869538-df6e-4628-ac2d-0c22281c4a3b\") " pod="calico-system/calico-node-4nbcl" Feb 9 18:55:14.690935 kubelet[2665]: I0209 18:55:14.690775 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3e869538-df6e-4628-ac2d-0c22281c4a3b-var-lib-calico\") pod \"calico-node-4nbcl\" (UID: \"3e869538-df6e-4628-ac2d-0c22281c4a3b\") " pod="calico-system/calico-node-4nbcl" Feb 9 18:55:14.691173 kubelet[2665]: I0209 18:55:14.690813 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/3e869538-df6e-4628-ac2d-0c22281c4a3b-cni-log-dir\") pod \"calico-node-4nbcl\" (UID: \"3e869538-df6e-4628-ac2d-0c22281c4a3b\") " pod="calico-system/calico-node-4nbcl" Feb 9 18:55:14.691173 kubelet[2665]: I0209 18:55:14.690844 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/3e869538-df6e-4628-ac2d-0c22281c4a3b-node-certs\") pod \"calico-node-4nbcl\" (UID: \"3e869538-df6e-4628-ac2d-0c22281c4a3b\") " pod="calico-system/calico-node-4nbcl" Feb 9 18:55:14.691173 kubelet[2665]: I0209 18:55:14.690873 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/3e869538-df6e-4628-ac2d-0c22281c4a3b-cni-bin-dir\") pod \"calico-node-4nbcl\" (UID: \"3e869538-df6e-4628-ac2d-0c22281c4a3b\") " pod="calico-system/calico-node-4nbcl" Feb 9 18:55:14.748549 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3207704821.mount: Deactivated successfully. Feb 9 18:55:14.939847 env[1643]: time="2024-02-09T18:55:14.939781358Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4nbcl,Uid:3e869538-df6e-4628-ac2d-0c22281c4a3b,Namespace:calico-system,Attempt:0,}" Feb 9 18:55:14.962238 env[1643]: time="2024-02-09T18:55:14.962102126Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:55:14.962238 env[1643]: time="2024-02-09T18:55:14.962145723Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:55:14.962658 env[1643]: time="2024-02-09T18:55:14.962162249Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:55:14.964430 env[1643]: time="2024-02-09T18:55:14.962920678Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cda71b9d7dd341545224200b895b0cc875ebfa3b8f5b0a68bc10ae8ef47a330d pid=3488 runtime=io.containerd.runc.v2 Feb 9 18:55:14.985724 systemd[1]: Started cri-containerd-cda71b9d7dd341545224200b895b0cc875ebfa3b8f5b0a68bc10ae8ef47a330d.scope. Feb 9 18:55:15.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.020000 audit: BPF prog-id=144 op=LOAD Feb 9 18:55:15.022000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.022000 audit[3496]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3488 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:15.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364613731623964376464333431353435323234323030623839356230 Feb 9 18:55:15.023000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.023000 audit[3496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3488 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:15.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364613731623964376464333431353435323234323030623839356230 Feb 9 18:55:15.023000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.023000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.023000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.023000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.023000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.023000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.023000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.023000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.023000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.023000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.023000 audit: BPF prog-id=145 op=LOAD Feb 9 18:55:15.023000 audit[3496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000200350 items=0 ppid=3488 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:15.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364613731623964376464333431353435323234323030623839356230 Feb 9 18:55:15.025000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.025000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.025000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.025000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.025000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.025000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.025000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.025000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.025000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.025000 audit: BPF prog-id=146 op=LOAD Feb 9 18:55:15.025000 audit[3496]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000200398 items=0 ppid=3488 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:15.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364613731623964376464333431353435323234323030623839356230 Feb 9 18:55:15.026000 audit: BPF prog-id=146 op=UNLOAD Feb 9 18:55:15.026000 audit: BPF prog-id=145 op=UNLOAD Feb 9 18:55:15.026000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.026000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.026000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.026000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.026000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.026000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.026000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.026000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.026000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.026000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.026000 audit: BPF prog-id=147 op=LOAD Feb 9 18:55:15.026000 audit[3496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002007a8 items=0 ppid=3488 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:15.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364613731623964376464333431353435323234323030623839356230 Feb 9 18:55:15.066763 env[1643]: time="2024-02-09T18:55:15.066716287Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4nbcl,Uid:3e869538-df6e-4628-ac2d-0c22281c4a3b,Namespace:calico-system,Attempt:0,} returns sandbox id \"cda71b9d7dd341545224200b895b0cc875ebfa3b8f5b0a68bc10ae8ef47a330d\"" Feb 9 18:55:15.076321 env[1643]: time="2024-02-09T18:55:15.076257952Z" level=info msg="CreateContainer within sandbox \"cda71b9d7dd341545224200b895b0cc875ebfa3b8f5b0a68bc10ae8ef47a330d\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 18:55:15.125642 env[1643]: time="2024-02-09T18:55:15.125590631Z" level=info msg="CreateContainer within sandbox \"cda71b9d7dd341545224200b895b0cc875ebfa3b8f5b0a68bc10ae8ef47a330d\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"e98a102340bdfde7b2c98bcb6e7f8c1dd887bfeee1376640cd0acc0777ae4cbe\"" Feb 9 18:55:15.126842 env[1643]: time="2024-02-09T18:55:15.126808589Z" level=info msg="StartContainer for \"e98a102340bdfde7b2c98bcb6e7f8c1dd887bfeee1376640cd0acc0777ae4cbe\"" Feb 9 18:55:15.198433 systemd[1]: Started cri-containerd-e98a102340bdfde7b2c98bcb6e7f8c1dd887bfeee1376640cd0acc0777ae4cbe.scope. Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit[3528]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3488 pid=3528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:15.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539386131303233343062646664653762326339386263623665376638 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit: BPF prog-id=148 op=LOAD Feb 9 18:55:15.287000 audit[3528]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b71f0 items=0 ppid=3488 pid=3528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:15.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539386131303233343062646664653762326339386263623665376638 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit: BPF prog-id=149 op=LOAD Feb 9 18:55:15.287000 audit[3528]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b7238 items=0 ppid=3488 pid=3528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:15.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539386131303233343062646664653762326339386263623665376638 Feb 9 18:55:15.287000 audit: BPF prog-id=149 op=UNLOAD Feb 9 18:55:15.287000 audit: BPF prog-id=148 op=UNLOAD Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { perfmon } for pid=3528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit[3528]: AVC avc: denied { bpf } for pid=3528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:15.287000 audit: BPF prog-id=150 op=LOAD Feb 9 18:55:15.287000 audit[3528]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b72c8 items=0 ppid=3488 pid=3528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:15.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539386131303233343062646664653762326339386263623665376638 Feb 9 18:55:15.332807 env[1643]: time="2024-02-09T18:55:15.332755933Z" level=info msg="StartContainer for \"e98a102340bdfde7b2c98bcb6e7f8c1dd887bfeee1376640cd0acc0777ae4cbe\" returns successfully" Feb 9 18:55:15.404507 kubelet[2665]: I0209 18:55:15.404477 2665 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID=722ab127-3ef8-4c93-b41d-f8f453285271 path="/var/lib/kubelet/pods/722ab127-3ef8-4c93-b41d-f8f453285271/volumes" Feb 9 18:55:15.534056 systemd[1]: cri-containerd-e98a102340bdfde7b2c98bcb6e7f8c1dd887bfeee1376640cd0acc0777ae4cbe.scope: Deactivated successfully. Feb 9 18:55:15.538000 audit: BPF prog-id=150 op=UNLOAD Feb 9 18:55:15.594518 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e98a102340bdfde7b2c98bcb6e7f8c1dd887bfeee1376640cd0acc0777ae4cbe-rootfs.mount: Deactivated successfully. Feb 9 18:55:15.625695 env[1643]: time="2024-02-09T18:55:15.625576939Z" level=info msg="shim disconnected" id=e98a102340bdfde7b2c98bcb6e7f8c1dd887bfeee1376640cd0acc0777ae4cbe Feb 9 18:55:15.625695 env[1643]: time="2024-02-09T18:55:15.625633763Z" level=warning msg="cleaning up after shim disconnected" id=e98a102340bdfde7b2c98bcb6e7f8c1dd887bfeee1376640cd0acc0777ae4cbe namespace=k8s.io Feb 9 18:55:15.625695 env[1643]: time="2024-02-09T18:55:15.625647120Z" level=info msg="cleaning up dead shim" Feb 9 18:55:15.658935 env[1643]: time="2024-02-09T18:55:15.658874108Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:55:15Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3570 runtime=io.containerd.runc.v2\n" Feb 9 18:55:16.400708 kubelet[2665]: E0209 18:55:16.400672 2665 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jkc2m" podUID=ee2f0cc0-a899-413e-bc32-44614edc0669 Feb 9 18:55:16.985239 env[1643]: time="2024-02-09T18:55:16.985189773Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:16.991424 env[1643]: time="2024-02-09T18:55:16.991377583Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:16.994792 env[1643]: time="2024-02-09T18:55:16.994733756Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:16.997789 env[1643]: time="2024-02-09T18:55:16.997741910Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:16.998859 env[1643]: time="2024-02-09T18:55:16.998824600Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 9 18:55:17.023783 env[1643]: time="2024-02-09T18:55:17.009804927Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 18:55:17.023783 env[1643]: time="2024-02-09T18:55:17.017952894Z" level=info msg="CreateContainer within sandbox \"996e19df37dbfab24e139dff1b50e9c529df12a5238d3ad2c304ad495acd5f8c\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 18:55:17.040584 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount83565706.mount: Deactivated successfully. Feb 9 18:55:17.048060 env[1643]: time="2024-02-09T18:55:17.048006472Z" level=info msg="CreateContainer within sandbox \"996e19df37dbfab24e139dff1b50e9c529df12a5238d3ad2c304ad495acd5f8c\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"0e7cfa8546b6de5a00b7955ee037dee5e10ad5a2c5cd62df0340482fa6447568\"" Feb 9 18:55:17.050695 env[1643]: time="2024-02-09T18:55:17.050659128Z" level=info msg="StartContainer for \"0e7cfa8546b6de5a00b7955ee037dee5e10ad5a2c5cd62df0340482fa6447568\"" Feb 9 18:55:17.085095 systemd[1]: Started cri-containerd-0e7cfa8546b6de5a00b7955ee037dee5e10ad5a2c5cd62df0340482fa6447568.scope. Feb 9 18:55:17.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.105000 audit: BPF prog-id=151 op=LOAD Feb 9 18:55:17.105000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.105000 audit[3592]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3235 pid=3592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:17.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065376366613835343662366465356130306237393535656530333764 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit[3592]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3235 pid=3592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:17.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065376366613835343662366465356130306237393535656530333764 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit: BPF prog-id=152 op=LOAD Feb 9 18:55:17.106000 audit[3592]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024820 items=0 ppid=3235 pid=3592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:17.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065376366613835343662366465356130306237393535656530333764 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit: BPF prog-id=153 op=LOAD Feb 9 18:55:17.106000 audit[3592]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024868 items=0 ppid=3235 pid=3592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:17.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065376366613835343662366465356130306237393535656530333764 Feb 9 18:55:17.106000 audit: BPF prog-id=153 op=UNLOAD Feb 9 18:55:17.106000 audit: BPF prog-id=152 op=UNLOAD Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { perfmon } for pid=3592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit[3592]: AVC avc: denied { bpf } for pid=3592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:17.106000 audit: BPF prog-id=154 op=LOAD Feb 9 18:55:17.106000 audit[3592]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024c78 items=0 ppid=3235 pid=3592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:17.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065376366613835343662366465356130306237393535656530333764 Feb 9 18:55:17.195663 env[1643]: time="2024-02-09T18:55:17.195576367Z" level=info msg="StartContainer for \"0e7cfa8546b6de5a00b7955ee037dee5e10ad5a2c5cd62df0340482fa6447568\" returns successfully" Feb 9 18:55:17.571620 env[1643]: time="2024-02-09T18:55:17.568782649Z" level=info msg="StopContainer for \"0e7cfa8546b6de5a00b7955ee037dee5e10ad5a2c5cd62df0340482fa6447568\" with timeout 300 (s)" Feb 9 18:55:17.571620 env[1643]: time="2024-02-09T18:55:17.569743292Z" level=info msg="Stop container \"0e7cfa8546b6de5a00b7955ee037dee5e10ad5a2c5cd62df0340482fa6447568\" with signal terminated" Feb 9 18:55:17.587000 audit: BPF prog-id=151 op=UNLOAD Feb 9 18:55:17.588690 systemd[1]: cri-containerd-0e7cfa8546b6de5a00b7955ee037dee5e10ad5a2c5cd62df0340482fa6447568.scope: Deactivated successfully. Feb 9 18:55:17.591000 audit: BPF prog-id=154 op=UNLOAD Feb 9 18:55:17.610194 kubelet[2665]: I0209 18:55:17.610161 2665 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-568b786b46-rhns6" podStartSLOduration=2.100626203 podCreationTimestamp="2024-02-09 18:55:09 +0000 UTC" firstStartedPulling="2024-02-09 18:55:10.490024189 +0000 UTC m=+19.291014083" lastFinishedPulling="2024-02-09 18:55:16.999503507 +0000 UTC m=+25.800493418" observedRunningTime="2024-02-09 18:55:17.587415896 +0000 UTC m=+26.388405810" watchObservedRunningTime="2024-02-09 18:55:17.610105538 +0000 UTC m=+26.411095466" Feb 9 18:55:17.626000 audit[3643]: NETFILTER_CFG table=filter:97 family=2 entries=15 op=nft_register_rule pid=3643 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:17.626000 audit[3643]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffe8ab84470 a2=0 a3=7ffe8ab8445c items=0 ppid=2987 pid=3643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:17.626000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:17.627000 audit[3643]: NETFILTER_CFG table=nat:98 family=2 entries=19 op=nft_register_chain pid=3643 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:17.627000 audit[3643]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffe8ab84470 a2=0 a3=7ffe8ab8445c items=0 ppid=2987 pid=3643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:17.627000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:17.835965 env[1643]: time="2024-02-09T18:55:17.835116651Z" level=info msg="shim disconnected" id=0e7cfa8546b6de5a00b7955ee037dee5e10ad5a2c5cd62df0340482fa6447568 Feb 9 18:55:17.835965 env[1643]: time="2024-02-09T18:55:17.835173915Z" level=warning msg="cleaning up after shim disconnected" id=0e7cfa8546b6de5a00b7955ee037dee5e10ad5a2c5cd62df0340482fa6447568 namespace=k8s.io Feb 9 18:55:17.835965 env[1643]: time="2024-02-09T18:55:17.835200263Z" level=info msg="cleaning up dead shim" Feb 9 18:55:17.845151 env[1643]: time="2024-02-09T18:55:17.845040603Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:55:17Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3644 runtime=io.containerd.runc.v2\n" Feb 9 18:55:17.852782 env[1643]: time="2024-02-09T18:55:17.852733818Z" level=info msg="StopContainer for \"0e7cfa8546b6de5a00b7955ee037dee5e10ad5a2c5cd62df0340482fa6447568\" returns successfully" Feb 9 18:55:17.853386 env[1643]: time="2024-02-09T18:55:17.853354786Z" level=info msg="StopPodSandbox for \"996e19df37dbfab24e139dff1b50e9c529df12a5238d3ad2c304ad495acd5f8c\"" Feb 9 18:55:17.853504 env[1643]: time="2024-02-09T18:55:17.853417863Z" level=info msg="Container to stop \"0e7cfa8546b6de5a00b7955ee037dee5e10ad5a2c5cd62df0340482fa6447568\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Feb 9 18:55:17.862705 systemd[1]: cri-containerd-996e19df37dbfab24e139dff1b50e9c529df12a5238d3ad2c304ad495acd5f8c.scope: Deactivated successfully. Feb 9 18:55:17.861000 audit: BPF prog-id=133 op=UNLOAD Feb 9 18:55:17.865000 audit: BPF prog-id=136 op=UNLOAD Feb 9 18:55:17.904303 env[1643]: time="2024-02-09T18:55:17.904228893Z" level=info msg="shim disconnected" id=996e19df37dbfab24e139dff1b50e9c529df12a5238d3ad2c304ad495acd5f8c Feb 9 18:55:17.904303 env[1643]: time="2024-02-09T18:55:17.904294454Z" level=warning msg="cleaning up after shim disconnected" id=996e19df37dbfab24e139dff1b50e9c529df12a5238d3ad2c304ad495acd5f8c namespace=k8s.io Feb 9 18:55:17.904303 env[1643]: time="2024-02-09T18:55:17.904310234Z" level=info msg="cleaning up dead shim" Feb 9 18:55:17.915549 env[1643]: time="2024-02-09T18:55:17.915501444Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:55:17Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3676 runtime=io.containerd.runc.v2\n" Feb 9 18:55:17.915880 env[1643]: time="2024-02-09T18:55:17.915848099Z" level=info msg="TearDown network for sandbox \"996e19df37dbfab24e139dff1b50e9c529df12a5238d3ad2c304ad495acd5f8c\" successfully" Feb 9 18:55:17.915973 env[1643]: time="2024-02-09T18:55:17.915878301Z" level=info msg="StopPodSandbox for \"996e19df37dbfab24e139dff1b50e9c529df12a5238d3ad2c304ad495acd5f8c\" returns successfully" Feb 9 18:55:17.940354 kubelet[2665]: I0209 18:55:17.940313 2665 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:55:17.940719 kubelet[2665]: E0209 18:55:17.940398 2665 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="6e32ce07-6b86-45aa-bf34-31d21927e5f0" containerName="calico-typha" Feb 9 18:55:17.940719 kubelet[2665]: I0209 18:55:17.940507 2665 memory_manager.go:346] "RemoveStaleState removing state" podUID="6e32ce07-6b86-45aa-bf34-31d21927e5f0" containerName="calico-typha" Feb 9 18:55:17.949055 systemd[1]: Created slice kubepods-besteffort-poddea563d2_5600_4670_b303_e1bf6ae1112c.slice. Feb 9 18:55:17.957000 audit[3689]: NETFILTER_CFG table=filter:99 family=2 entries=15 op=nft_register_rule pid=3689 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:17.957000 audit[3689]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe5e7934c0 a2=0 a3=7ffe5e7934ac items=0 ppid=2987 pid=3689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:17.957000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:17.959000 audit[3689]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_unregister_chain pid=3689 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:17.959000 audit[3689]: SYSCALL arch=c000003e syscall=46 success=yes exit=2828 a0=3 a1=7ffe5e7934c0 a2=0 a3=31030 items=0 ppid=2987 pid=3689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:17.959000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:18.012716 systemd[1]: run-containerd-runc-k8s.io-0e7cfa8546b6de5a00b7955ee037dee5e10ad5a2c5cd62df0340482fa6447568-runc.d1suLI.mount: Deactivated successfully. Feb 9 18:55:18.012849 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0e7cfa8546b6de5a00b7955ee037dee5e10ad5a2c5cd62df0340482fa6447568-rootfs.mount: Deactivated successfully. Feb 9 18:55:18.012932 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-996e19df37dbfab24e139dff1b50e9c529df12a5238d3ad2c304ad495acd5f8c-rootfs.mount: Deactivated successfully. Feb 9 18:55:18.013010 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-996e19df37dbfab24e139dff1b50e9c529df12a5238d3ad2c304ad495acd5f8c-shm.mount: Deactivated successfully. Feb 9 18:55:18.027378 kubelet[2665]: I0209 18:55:18.027327 2665 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/6e32ce07-6b86-45aa-bf34-31d21927e5f0-typha-certs\") pod \"6e32ce07-6b86-45aa-bf34-31d21927e5f0\" (UID: \"6e32ce07-6b86-45aa-bf34-31d21927e5f0\") " Feb 9 18:55:18.027378 kubelet[2665]: I0209 18:55:18.027387 2665 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6e32ce07-6b86-45aa-bf34-31d21927e5f0-tigera-ca-bundle\") pod \"6e32ce07-6b86-45aa-bf34-31d21927e5f0\" (UID: \"6e32ce07-6b86-45aa-bf34-31d21927e5f0\") " Feb 9 18:55:18.027630 kubelet[2665]: I0209 18:55:18.027421 2665 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-nd2kg\" (UniqueName: \"kubernetes.io/projected/6e32ce07-6b86-45aa-bf34-31d21927e5f0-kube-api-access-nd2kg\") pod \"6e32ce07-6b86-45aa-bf34-31d21927e5f0\" (UID: \"6e32ce07-6b86-45aa-bf34-31d21927e5f0\") " Feb 9 18:55:18.027630 kubelet[2665]: I0209 18:55:18.027525 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2ngrk\" (UniqueName: \"kubernetes.io/projected/dea563d2-5600-4670-b303-e1bf6ae1112c-kube-api-access-2ngrk\") pod \"calico-typha-5688bf6479-7pvf2\" (UID: \"dea563d2-5600-4670-b303-e1bf6ae1112c\") " pod="calico-system/calico-typha-5688bf6479-7pvf2" Feb 9 18:55:18.027630 kubelet[2665]: I0209 18:55:18.027559 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/dea563d2-5600-4670-b303-e1bf6ae1112c-tigera-ca-bundle\") pod \"calico-typha-5688bf6479-7pvf2\" (UID: \"dea563d2-5600-4670-b303-e1bf6ae1112c\") " pod="calico-system/calico-typha-5688bf6479-7pvf2" Feb 9 18:55:18.027630 kubelet[2665]: I0209 18:55:18.027593 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/dea563d2-5600-4670-b303-e1bf6ae1112c-typha-certs\") pod \"calico-typha-5688bf6479-7pvf2\" (UID: \"dea563d2-5600-4670-b303-e1bf6ae1112c\") " pod="calico-system/calico-typha-5688bf6479-7pvf2" Feb 9 18:55:18.036070 systemd[1]: var-lib-kubelet-pods-6e32ce07\x2d6b86\x2d45aa\x2dbf34\x2d31d21927e5f0-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully. Feb 9 18:55:18.038685 kubelet[2665]: I0209 18:55:18.038612 2665 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/6e32ce07-6b86-45aa-bf34-31d21927e5f0-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "6e32ce07-6b86-45aa-bf34-31d21927e5f0" (UID: "6e32ce07-6b86-45aa-bf34-31d21927e5f0"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Feb 9 18:55:18.041505 systemd[1]: var-lib-kubelet-pods-6e32ce07\x2d6b86\x2d45aa\x2dbf34\x2d31d21927e5f0-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. Feb 9 18:55:18.043795 kubelet[2665]: W0209 18:55:18.043769 2665 empty_dir.go:525] Warning: Failed to clear quota on /var/lib/kubelet/pods/6e32ce07-6b86-45aa-bf34-31d21927e5f0/volumes/kubernetes.io~configmap/tigera-ca-bundle: clearQuota called, but quotas disabled Feb 9 18:55:18.046521 systemd[1]: var-lib-kubelet-pods-6e32ce07\x2d6b86\x2d45aa\x2dbf34\x2d31d21927e5f0-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dnd2kg.mount: Deactivated successfully. Feb 9 18:55:18.048474 kubelet[2665]: I0209 18:55:18.048433 2665 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/6e32ce07-6b86-45aa-bf34-31d21927e5f0-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "6e32ce07-6b86-45aa-bf34-31d21927e5f0" (UID: "6e32ce07-6b86-45aa-bf34-31d21927e5f0"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Feb 9 18:55:18.049354 kubelet[2665]: I0209 18:55:18.049326 2665 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/6e32ce07-6b86-45aa-bf34-31d21927e5f0-kube-api-access-nd2kg" (OuterVolumeSpecName: "kube-api-access-nd2kg") pod "6e32ce07-6b86-45aa-bf34-31d21927e5f0" (UID: "6e32ce07-6b86-45aa-bf34-31d21927e5f0"). InnerVolumeSpecName "kube-api-access-nd2kg". PluginName "kubernetes.io/projected", VolumeGidValue "" Feb 9 18:55:18.132581 kubelet[2665]: I0209 18:55:18.127958 2665 reconciler_common.go:300] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6e32ce07-6b86-45aa-bf34-31d21927e5f0-tigera-ca-bundle\") on node \"ip-172-31-21-122\" DevicePath \"\"" Feb 9 18:55:18.133098 kubelet[2665]: I0209 18:55:18.133070 2665 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-nd2kg\" (UniqueName: \"kubernetes.io/projected/6e32ce07-6b86-45aa-bf34-31d21927e5f0-kube-api-access-nd2kg\") on node \"ip-172-31-21-122\" DevicePath \"\"" Feb 9 18:55:18.137571 kubelet[2665]: I0209 18:55:18.137545 2665 reconciler_common.go:300] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/6e32ce07-6b86-45aa-bf34-31d21927e5f0-typha-certs\") on node \"ip-172-31-21-122\" DevicePath \"\"" Feb 9 18:55:18.252657 env[1643]: time="2024-02-09T18:55:18.252563838Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5688bf6479-7pvf2,Uid:dea563d2-5600-4670-b303-e1bf6ae1112c,Namespace:calico-system,Attempt:0,}" Feb 9 18:55:18.278862 env[1643]: time="2024-02-09T18:55:18.278639332Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:55:18.278862 env[1643]: time="2024-02-09T18:55:18.278837257Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:55:18.279102 env[1643]: time="2024-02-09T18:55:18.279045796Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:55:18.279364 env[1643]: time="2024-02-09T18:55:18.279271902Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6437b2796b0e38b240066dedb112417cc6c6741f3f03e7d060a0a708696d92bd pid=3702 runtime=io.containerd.runc.v2 Feb 9 18:55:18.300786 systemd[1]: Started cri-containerd-6437b2796b0e38b240066dedb112417cc6c6741f3f03e7d060a0a708696d92bd.scope. Feb 9 18:55:18.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.320000 audit: BPF prog-id=155 op=LOAD Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3702 pid=3711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:18.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634333762323739366230653338623234303036366465646231313234 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3702 pid=3711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:18.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634333762323739366230653338623234303036366465646231313234 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit: BPF prog-id=156 op=LOAD Feb 9 18:55:18.321000 audit[3711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000360da0 items=0 ppid=3702 pid=3711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:18.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634333762323739366230653338623234303036366465646231313234 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit: BPF prog-id=157 op=LOAD Feb 9 18:55:18.321000 audit[3711]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000360de8 items=0 ppid=3702 pid=3711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:18.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634333762323739366230653338623234303036366465646231313234 Feb 9 18:55:18.321000 audit: BPF prog-id=157 op=UNLOAD Feb 9 18:55:18.321000 audit: BPF prog-id=156 op=UNLOAD Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.321000 audit: BPF prog-id=158 op=LOAD Feb 9 18:55:18.321000 audit[3711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003611f8 items=0 ppid=3702 pid=3711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:18.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634333762323739366230653338623234303036366465646231313234 Feb 9 18:55:18.364549 env[1643]: time="2024-02-09T18:55:18.364514177Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5688bf6479-7pvf2,Uid:dea563d2-5600-4670-b303-e1bf6ae1112c,Namespace:calico-system,Attempt:0,} returns sandbox id \"6437b2796b0e38b240066dedb112417cc6c6741f3f03e7d060a0a708696d92bd\"" Feb 9 18:55:18.379251 env[1643]: time="2024-02-09T18:55:18.379196058Z" level=info msg="CreateContainer within sandbox \"6437b2796b0e38b240066dedb112417cc6c6741f3f03e7d060a0a708696d92bd\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 18:55:18.395264 kubelet[2665]: E0209 18:55:18.395179 2665 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jkc2m" podUID=ee2f0cc0-a899-413e-bc32-44614edc0669 Feb 9 18:55:18.404154 env[1643]: time="2024-02-09T18:55:18.404114048Z" level=info msg="CreateContainer within sandbox \"6437b2796b0e38b240066dedb112417cc6c6741f3f03e7d060a0a708696d92bd\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"f185451e54f81235b7ee43c12ce90f76ef33e71315cf6586189ea83a24b7cb26\"" Feb 9 18:55:18.407344 env[1643]: time="2024-02-09T18:55:18.407301285Z" level=info msg="StartContainer for \"f185451e54f81235b7ee43c12ce90f76ef33e71315cf6586189ea83a24b7cb26\"" Feb 9 18:55:18.428794 systemd[1]: Started cri-containerd-f185451e54f81235b7ee43c12ce90f76ef33e71315cf6586189ea83a24b7cb26.scope. Feb 9 18:55:18.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.455000 audit: BPF prog-id=159 op=LOAD Feb 9 18:55:18.457000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.457000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3702 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:18.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631383534353165353466383132333562376565343363313263653930 Feb 9 18:55:18.457000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.457000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3702 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:18.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631383534353165353466383132333562376565343363313263653930 Feb 9 18:55:18.458000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.458000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.458000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.458000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.458000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.458000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.458000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.458000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.458000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.458000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.458000 audit: BPF prog-id=160 op=LOAD Feb 9 18:55:18.458000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000024cb0 items=0 ppid=3702 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:18.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631383534353165353466383132333562376565343363313263653930 Feb 9 18:55:18.459000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.459000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.459000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.459000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.459000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.459000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.459000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.459000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.459000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.459000 audit: BPF prog-id=161 op=LOAD Feb 9 18:55:18.459000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000024cf8 items=0 ppid=3702 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:18.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631383534353165353466383132333562376565343363313263653930 Feb 9 18:55:18.459000 audit: BPF prog-id=161 op=UNLOAD Feb 9 18:55:18.459000 audit: BPF prog-id=160 op=UNLOAD Feb 9 18:55:18.459000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.459000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.459000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.459000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.459000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.459000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.459000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.459000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.459000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.459000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:18.459000 audit: BPF prog-id=162 op=LOAD Feb 9 18:55:18.459000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000025108 items=0 ppid=3702 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:18.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631383534353165353466383132333562376565343363313263653930 Feb 9 18:55:18.505304 env[1643]: time="2024-02-09T18:55:18.505053115Z" level=info msg="StartContainer for \"f185451e54f81235b7ee43c12ce90f76ef33e71315cf6586189ea83a24b7cb26\" returns successfully" Feb 9 18:55:18.582708 kubelet[2665]: I0209 18:55:18.581387 2665 scope.go:115] "RemoveContainer" containerID="0e7cfa8546b6de5a00b7955ee037dee5e10ad5a2c5cd62df0340482fa6447568" Feb 9 18:55:18.589473 systemd[1]: Removed slice kubepods-besteffort-pod6e32ce07_6b86_45aa_bf34_31d21927e5f0.slice. Feb 9 18:55:18.598257 env[1643]: time="2024-02-09T18:55:18.598214491Z" level=info msg="RemoveContainer for \"0e7cfa8546b6de5a00b7955ee037dee5e10ad5a2c5cd62df0340482fa6447568\"" Feb 9 18:55:18.619916 kubelet[2665]: I0209 18:55:18.619645 2665 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-5688bf6479-7pvf2" podStartSLOduration=8.61959308 podCreationTimestamp="2024-02-09 18:55:10 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:55:18.604664676 +0000 UTC m=+27.405654591" watchObservedRunningTime="2024-02-09 18:55:18.61959308 +0000 UTC m=+27.420582992" Feb 9 18:55:18.625583 env[1643]: time="2024-02-09T18:55:18.624898666Z" level=info msg="RemoveContainer for \"0e7cfa8546b6de5a00b7955ee037dee5e10ad5a2c5cd62df0340482fa6447568\" returns successfully" Feb 9 18:55:18.625736 kubelet[2665]: I0209 18:55:18.625460 2665 scope.go:115] "RemoveContainer" containerID="0e7cfa8546b6de5a00b7955ee037dee5e10ad5a2c5cd62df0340482fa6447568" Feb 9 18:55:18.626306 env[1643]: time="2024-02-09T18:55:18.625966387Z" level=error msg="ContainerStatus for \"0e7cfa8546b6de5a00b7955ee037dee5e10ad5a2c5cd62df0340482fa6447568\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"0e7cfa8546b6de5a00b7955ee037dee5e10ad5a2c5cd62df0340482fa6447568\": not found" Feb 9 18:55:18.627573 kubelet[2665]: E0209 18:55:18.627548 2665 remote_runtime.go:415] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"0e7cfa8546b6de5a00b7955ee037dee5e10ad5a2c5cd62df0340482fa6447568\": not found" containerID="0e7cfa8546b6de5a00b7955ee037dee5e10ad5a2c5cd62df0340482fa6447568" Feb 9 18:55:18.627672 kubelet[2665]: I0209 18:55:18.627611 2665 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={Type:containerd ID:0e7cfa8546b6de5a00b7955ee037dee5e10ad5a2c5cd62df0340482fa6447568} err="failed to get container status \"0e7cfa8546b6de5a00b7955ee037dee5e10ad5a2c5cd62df0340482fa6447568\": rpc error: code = NotFound desc = an error occurred when try to find container \"0e7cfa8546b6de5a00b7955ee037dee5e10ad5a2c5cd62df0340482fa6447568\": not found" Feb 9 18:55:18.979000 audit[3782]: NETFILTER_CFG table=filter:101 family=2 entries=16 op=nft_register_rule pid=3782 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:18.985884 kernel: kauditd_printk_skb: 324 callbacks suppressed Feb 9 18:55:18.986018 kernel: audit: type=1325 audit(1707504918.979:1250): table=filter:101 family=2 entries=16 op=nft_register_rule pid=3782 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:18.993135 kernel: audit: type=1300 audit(1707504918.979:1250): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe6598e1d0 a2=0 a3=7ffe6598e1bc items=0 ppid=2987 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:18.979000 audit[3782]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe6598e1d0 a2=0 a3=7ffe6598e1bc items=0 ppid=2987 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:18.979000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:19.003321 kernel: audit: type=1327 audit(1707504918.979:1250): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:18.980000 audit[3782]: NETFILTER_CFG table=nat:102 family=2 entries=12 op=nft_register_rule pid=3782 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:19.007370 kernel: audit: type=1325 audit(1707504918.980:1251): table=nat:102 family=2 entries=12 op=nft_register_rule pid=3782 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:19.015401 kernel: audit: type=1300 audit(1707504918.980:1251): arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffe6598e1d0 a2=0 a3=31030 items=0 ppid=2987 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:18.980000 audit[3782]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffe6598e1d0 a2=0 a3=31030 items=0 ppid=2987 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:18.980000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:19.020334 kernel: audit: type=1327 audit(1707504918.980:1251): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:19.400244 kubelet[2665]: I0209 18:55:19.399863 2665 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID=6e32ce07-6b86-45aa-bf34-31d21927e5f0 path="/var/lib/kubelet/pods/6e32ce07-6b86-45aa-bf34-31d21927e5f0/volumes" Feb 9 18:55:20.398381 kubelet[2665]: E0209 18:55:20.395936 2665 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jkc2m" podUID=ee2f0cc0-a899-413e-bc32-44614edc0669 Feb 9 18:55:22.395525 kubelet[2665]: E0209 18:55:22.395485 2665 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jkc2m" podUID=ee2f0cc0-a899-413e-bc32-44614edc0669 Feb 9 18:55:23.489809 env[1643]: time="2024-02-09T18:55:23.489758992Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:23.496701 env[1643]: time="2024-02-09T18:55:23.493295218Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:23.499610 env[1643]: time="2024-02-09T18:55:23.499559864Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:23.506918 env[1643]: time="2024-02-09T18:55:23.506873476Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:23.509336 env[1643]: time="2024-02-09T18:55:23.508113602Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 18:55:23.512958 env[1643]: time="2024-02-09T18:55:23.512897512Z" level=info msg="CreateContainer within sandbox \"cda71b9d7dd341545224200b895b0cc875ebfa3b8f5b0a68bc10ae8ef47a330d\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 18:55:23.580874 env[1643]: time="2024-02-09T18:55:23.580816556Z" level=info msg="CreateContainer within sandbox \"cda71b9d7dd341545224200b895b0cc875ebfa3b8f5b0a68bc10ae8ef47a330d\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"b37b94670b728584e9fedc00a13706bbc930942ecf2bac71d7d608189098f83a\"" Feb 9 18:55:23.582164 env[1643]: time="2024-02-09T18:55:23.581991851Z" level=info msg="StartContainer for \"b37b94670b728584e9fedc00a13706bbc930942ecf2bac71d7d608189098f83a\"" Feb 9 18:55:23.631230 systemd[1]: run-containerd-runc-k8s.io-b37b94670b728584e9fedc00a13706bbc930942ecf2bac71d7d608189098f83a-runc.JU2sRb.mount: Deactivated successfully. Feb 9 18:55:23.648804 systemd[1]: Started cri-containerd-b37b94670b728584e9fedc00a13706bbc930942ecf2bac71d7d608189098f83a.scope. Feb 9 18:55:23.679000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.697779 kernel: audit: type=1400 audit(1707504923.679:1252): avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.698208 kernel: audit: type=1300 audit(1707504923.679:1252): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3488 pid=3790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:23.679000 audit[3790]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3488 pid=3790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:23.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233376239343637306237323835383465396665646330306131333730 Feb 9 18:55:23.707423 kernel: audit: type=1327 audit(1707504923.679:1252): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233376239343637306237323835383465396665646330306131333730 Feb 9 18:55:23.679000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.712507 kernel: audit: type=1400 audit(1707504923.679:1253): avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.679000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.679000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.679000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.679000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.679000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.679000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.679000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.679000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.679000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.679000 audit: BPF prog-id=163 op=LOAD Feb 9 18:55:23.679000 audit[3790]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002a0230 items=0 ppid=3488 pid=3790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:23.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233376239343637306237323835383465396665646330306131333730 Feb 9 18:55:23.706000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.706000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.706000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.706000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.706000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.706000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.706000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.706000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.706000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.706000 audit: BPF prog-id=164 op=LOAD Feb 9 18:55:23.706000 audit[3790]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002a0278 items=0 ppid=3488 pid=3790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:23.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233376239343637306237323835383465396665646330306131333730 Feb 9 18:55:23.711000 audit: BPF prog-id=164 op=UNLOAD Feb 9 18:55:23.711000 audit: BPF prog-id=163 op=UNLOAD Feb 9 18:55:23.711000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.711000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.711000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.711000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.711000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.711000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.711000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.711000 audit[3790]: AVC avc: denied { perfmon } for pid=3790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.711000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.711000 audit[3790]: AVC avc: denied { bpf } for pid=3790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:23.711000 audit: BPF prog-id=165 op=LOAD Feb 9 18:55:23.711000 audit[3790]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002a0308 items=0 ppid=3488 pid=3790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:23.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233376239343637306237323835383465396665646330306131333730 Feb 9 18:55:23.743312 env[1643]: time="2024-02-09T18:55:23.743077869Z" level=info msg="StartContainer for \"b37b94670b728584e9fedc00a13706bbc930942ecf2bac71d7d608189098f83a\" returns successfully" Feb 9 18:55:24.395237 kubelet[2665]: E0209 18:55:24.395194 2665 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jkc2m" podUID=ee2f0cc0-a899-413e-bc32-44614edc0669 Feb 9 18:55:24.872355 env[1643]: time="2024-02-09T18:55:24.872272286Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 18:55:24.878900 systemd[1]: cri-containerd-b37b94670b728584e9fedc00a13706bbc930942ecf2bac71d7d608189098f83a.scope: Deactivated successfully. Feb 9 18:55:24.884728 kernel: kauditd_printk_skb: 39 callbacks suppressed Feb 9 18:55:24.884828 kernel: audit: type=1334 audit(1707504924.880:1258): prog-id=165 op=UNLOAD Feb 9 18:55:24.880000 audit: BPF prog-id=165 op=UNLOAD Feb 9 18:55:24.891896 kubelet[2665]: I0209 18:55:24.891866 2665 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 18:55:24.929206 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b37b94670b728584e9fedc00a13706bbc930942ecf2bac71d7d608189098f83a-rootfs.mount: Deactivated successfully. Feb 9 18:55:24.949447 env[1643]: time="2024-02-09T18:55:24.949395067Z" level=info msg="shim disconnected" id=b37b94670b728584e9fedc00a13706bbc930942ecf2bac71d7d608189098f83a Feb 9 18:55:24.949913 env[1643]: time="2024-02-09T18:55:24.949887171Z" level=warning msg="cleaning up after shim disconnected" id=b37b94670b728584e9fedc00a13706bbc930942ecf2bac71d7d608189098f83a namespace=k8s.io Feb 9 18:55:24.950047 env[1643]: time="2024-02-09T18:55:24.950030111Z" level=info msg="cleaning up dead shim" Feb 9 18:55:24.953366 kubelet[2665]: I0209 18:55:24.952337 2665 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:55:24.969546 systemd[1]: Created slice kubepods-burstable-podf00550ab_7b86_4c71_87d5_934dcf889278.slice. Feb 9 18:55:25.002364 kubelet[2665]: I0209 18:55:25.002321 2665 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:55:25.003463 env[1643]: time="2024-02-09T18:55:25.003410064Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:55:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3839 runtime=io.containerd.runc.v2\n" Feb 9 18:55:25.011543 kubelet[2665]: I0209 18:55:25.008008 2665 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:55:25.015544 kubelet[2665]: I0209 18:55:25.014943 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/f00550ab-7b86-4c71-87d5-934dcf889278-config-volume\") pod \"coredns-5d78c9869d-dlpjk\" (UID: \"f00550ab-7b86-4c71-87d5-934dcf889278\") " pod="kube-system/coredns-5d78c9869d-dlpjk" Feb 9 18:55:25.015544 kubelet[2665]: I0209 18:55:25.015010 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k62jh\" (UniqueName: \"kubernetes.io/projected/f00550ab-7b86-4c71-87d5-934dcf889278-kube-api-access-k62jh\") pod \"coredns-5d78c9869d-dlpjk\" (UID: \"f00550ab-7b86-4c71-87d5-934dcf889278\") " pod="kube-system/coredns-5d78c9869d-dlpjk" Feb 9 18:55:25.024966 systemd[1]: Created slice kubepods-burstable-pod654f00aa_4484_41f3_9f60_f8ee2d4c8c15.slice. Feb 9 18:55:25.037877 systemd[1]: Created slice kubepods-besteffort-podd41fed55_9537_4c19_aa2d_21bc829cf483.slice. Feb 9 18:55:25.115598 kubelet[2665]: I0209 18:55:25.115561 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gngq5\" (UniqueName: \"kubernetes.io/projected/d41fed55-9537-4c19-aa2d-21bc829cf483-kube-api-access-gngq5\") pod \"calico-kube-controllers-7776c55fc5-xj6tw\" (UID: \"d41fed55-9537-4c19-aa2d-21bc829cf483\") " pod="calico-system/calico-kube-controllers-7776c55fc5-xj6tw" Feb 9 18:55:25.115853 kubelet[2665]: I0209 18:55:25.115637 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/654f00aa-4484-41f3-9f60-f8ee2d4c8c15-config-volume\") pod \"coredns-5d78c9869d-kjkvv\" (UID: \"654f00aa-4484-41f3-9f60-f8ee2d4c8c15\") " pod="kube-system/coredns-5d78c9869d-kjkvv" Feb 9 18:55:25.115853 kubelet[2665]: I0209 18:55:25.115668 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f42xx\" (UniqueName: \"kubernetes.io/projected/654f00aa-4484-41f3-9f60-f8ee2d4c8c15-kube-api-access-f42xx\") pod \"coredns-5d78c9869d-kjkvv\" (UID: \"654f00aa-4484-41f3-9f60-f8ee2d4c8c15\") " pod="kube-system/coredns-5d78c9869d-kjkvv" Feb 9 18:55:25.115853 kubelet[2665]: I0209 18:55:25.115701 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d41fed55-9537-4c19-aa2d-21bc829cf483-tigera-ca-bundle\") pod \"calico-kube-controllers-7776c55fc5-xj6tw\" (UID: \"d41fed55-9537-4c19-aa2d-21bc829cf483\") " pod="calico-system/calico-kube-controllers-7776c55fc5-xj6tw" Feb 9 18:55:25.314343 env[1643]: time="2024-02-09T18:55:25.314297020Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-dlpjk,Uid:f00550ab-7b86-4c71-87d5-934dcf889278,Namespace:kube-system,Attempt:0,}" Feb 9 18:55:25.332991 env[1643]: time="2024-02-09T18:55:25.332945253Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-kjkvv,Uid:654f00aa-4484-41f3-9f60-f8ee2d4c8c15,Namespace:kube-system,Attempt:0,}" Feb 9 18:55:25.348555 env[1643]: time="2024-02-09T18:55:25.348512930Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7776c55fc5-xj6tw,Uid:d41fed55-9537-4c19-aa2d-21bc829cf483,Namespace:calico-system,Attempt:0,}" Feb 9 18:55:25.552277 env[1643]: time="2024-02-09T18:55:25.552191600Z" level=error msg="Failed to destroy network for sandbox \"d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:55:25.552953 env[1643]: time="2024-02-09T18:55:25.552905498Z" level=error msg="encountered an error cleaning up failed sandbox \"d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:55:25.553147 env[1643]: time="2024-02-09T18:55:25.553105138Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-kjkvv,Uid:654f00aa-4484-41f3-9f60-f8ee2d4c8c15,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:55:25.554004 kubelet[2665]: E0209 18:55:25.553509 2665 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:55:25.554004 kubelet[2665]: E0209 18:55:25.553616 2665 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-kjkvv" Feb 9 18:55:25.554004 kubelet[2665]: E0209 18:55:25.553650 2665 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-kjkvv" Feb 9 18:55:25.554499 kubelet[2665]: E0209 18:55:25.553719 2665 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-kjkvv_kube-system(654f00aa-4484-41f3-9f60-f8ee2d4c8c15)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-kjkvv_kube-system(654f00aa-4484-41f3-9f60-f8ee2d4c8c15)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-kjkvv" podUID=654f00aa-4484-41f3-9f60-f8ee2d4c8c15 Feb 9 18:55:25.571827 env[1643]: time="2024-02-09T18:55:25.571687414Z" level=error msg="Failed to destroy network for sandbox \"60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:55:25.572779 env[1643]: time="2024-02-09T18:55:25.572726873Z" level=error msg="encountered an error cleaning up failed sandbox \"60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:55:25.572988 env[1643]: time="2024-02-09T18:55:25.572948175Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-dlpjk,Uid:f00550ab-7b86-4c71-87d5-934dcf889278,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:55:25.573921 kubelet[2665]: E0209 18:55:25.573454 2665 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:55:25.573921 kubelet[2665]: E0209 18:55:25.573522 2665 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-dlpjk" Feb 9 18:55:25.573921 kubelet[2665]: E0209 18:55:25.573554 2665 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-dlpjk" Feb 9 18:55:25.574120 kubelet[2665]: E0209 18:55:25.573895 2665 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-dlpjk_kube-system(f00550ab-7b86-4c71-87d5-934dcf889278)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-dlpjk_kube-system(f00550ab-7b86-4c71-87d5-934dcf889278)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-dlpjk" podUID=f00550ab-7b86-4c71-87d5-934dcf889278 Feb 9 18:55:25.582623 env[1643]: time="2024-02-09T18:55:25.582564417Z" level=error msg="Failed to destroy network for sandbox \"d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:55:25.582994 env[1643]: time="2024-02-09T18:55:25.582955799Z" level=error msg="encountered an error cleaning up failed sandbox \"d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:55:25.583084 env[1643]: time="2024-02-09T18:55:25.583024642Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7776c55fc5-xj6tw,Uid:d41fed55-9537-4c19-aa2d-21bc829cf483,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:55:25.583361 kubelet[2665]: E0209 18:55:25.583337 2665 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:55:25.583474 kubelet[2665]: E0209 18:55:25.583396 2665 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7776c55fc5-xj6tw" Feb 9 18:55:25.583474 kubelet[2665]: E0209 18:55:25.583433 2665 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7776c55fc5-xj6tw" Feb 9 18:55:25.583569 kubelet[2665]: E0209 18:55:25.583501 2665 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7776c55fc5-xj6tw_calico-system(d41fed55-9537-4c19-aa2d-21bc829cf483)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7776c55fc5-xj6tw_calico-system(d41fed55-9537-4c19-aa2d-21bc829cf483)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7776c55fc5-xj6tw" podUID=d41fed55-9537-4c19-aa2d-21bc829cf483 Feb 9 18:55:25.614917 kubelet[2665]: I0209 18:55:25.614887 2665 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" Feb 9 18:55:25.622537 env[1643]: time="2024-02-09T18:55:25.618679564Z" level=info msg="StopPodSandbox for \"d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d\"" Feb 9 18:55:25.636134 env[1643]: time="2024-02-09T18:55:25.635699071Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 18:55:25.638933 kubelet[2665]: I0209 18:55:25.638440 2665 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" Feb 9 18:55:25.640310 env[1643]: time="2024-02-09T18:55:25.640248146Z" level=info msg="StopPodSandbox for \"d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329\"" Feb 9 18:55:25.645102 kubelet[2665]: I0209 18:55:25.644249 2665 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" Feb 9 18:55:25.647404 env[1643]: time="2024-02-09T18:55:25.647365281Z" level=info msg="StopPodSandbox for \"60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde\"" Feb 9 18:55:25.733667 env[1643]: time="2024-02-09T18:55:25.733599978Z" level=error msg="StopPodSandbox for \"d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d\" failed" error="failed to destroy network for sandbox \"d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:55:25.734460 kubelet[2665]: E0209 18:55:25.734258 2665 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" Feb 9 18:55:25.734460 kubelet[2665]: E0209 18:55:25.734333 2665 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d} Feb 9 18:55:25.734460 kubelet[2665]: E0209 18:55:25.734384 2665 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"654f00aa-4484-41f3-9f60-f8ee2d4c8c15\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 18:55:25.734460 kubelet[2665]: E0209 18:55:25.734424 2665 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"654f00aa-4484-41f3-9f60-f8ee2d4c8c15\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-kjkvv" podUID=654f00aa-4484-41f3-9f60-f8ee2d4c8c15 Feb 9 18:55:25.755834 env[1643]: time="2024-02-09T18:55:25.755759404Z" level=error msg="StopPodSandbox for \"d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329\" failed" error="failed to destroy network for sandbox \"d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:55:25.756129 kubelet[2665]: E0209 18:55:25.756102 2665 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" Feb 9 18:55:25.756229 kubelet[2665]: E0209 18:55:25.756170 2665 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329} Feb 9 18:55:25.756301 kubelet[2665]: E0209 18:55:25.756220 2665 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d41fed55-9537-4c19-aa2d-21bc829cf483\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 18:55:25.756301 kubelet[2665]: E0209 18:55:25.756276 2665 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d41fed55-9537-4c19-aa2d-21bc829cf483\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7776c55fc5-xj6tw" podUID=d41fed55-9537-4c19-aa2d-21bc829cf483 Feb 9 18:55:25.764403 env[1643]: time="2024-02-09T18:55:25.764346088Z" level=error msg="StopPodSandbox for \"60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde\" failed" error="failed to destroy network for sandbox \"60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:55:25.769710 kubelet[2665]: E0209 18:55:25.769558 2665 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" Feb 9 18:55:25.769710 kubelet[2665]: E0209 18:55:25.769613 2665 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde} Feb 9 18:55:25.769710 kubelet[2665]: E0209 18:55:25.769665 2665 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f00550ab-7b86-4c71-87d5-934dcf889278\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 18:55:25.769710 kubelet[2665]: E0209 18:55:25.769703 2665 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f00550ab-7b86-4c71-87d5-934dcf889278\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-dlpjk" podUID=f00550ab-7b86-4c71-87d5-934dcf889278 Feb 9 18:55:25.929690 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde-shm.mount: Deactivated successfully. Feb 9 18:55:26.400335 systemd[1]: Created slice kubepods-besteffort-podee2f0cc0_a899_413e_bc32_44614edc0669.slice. Feb 9 18:55:26.403615 env[1643]: time="2024-02-09T18:55:26.403567517Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jkc2m,Uid:ee2f0cc0-a899-413e-bc32-44614edc0669,Namespace:calico-system,Attempt:0,}" Feb 9 18:55:26.497791 env[1643]: time="2024-02-09T18:55:26.497728371Z" level=error msg="Failed to destroy network for sandbox \"3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:55:26.503474 env[1643]: time="2024-02-09T18:55:26.501812540Z" level=error msg="encountered an error cleaning up failed sandbox \"3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:55:26.503474 env[1643]: time="2024-02-09T18:55:26.501893881Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jkc2m,Uid:ee2f0cc0-a899-413e-bc32-44614edc0669,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:55:26.503608 kubelet[2665]: E0209 18:55:26.502351 2665 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:55:26.503608 kubelet[2665]: E0209 18:55:26.502403 2665 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-jkc2m" Feb 9 18:55:26.503608 kubelet[2665]: E0209 18:55:26.502427 2665 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-jkc2m" Feb 9 18:55:26.501247 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82-shm.mount: Deactivated successfully. Feb 9 18:55:26.503938 kubelet[2665]: E0209 18:55:26.502490 2665 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-jkc2m_calico-system(ee2f0cc0-a899-413e-bc32-44614edc0669)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-jkc2m_calico-system(ee2f0cc0-a899-413e-bc32-44614edc0669)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-jkc2m" podUID=ee2f0cc0-a899-413e-bc32-44614edc0669 Feb 9 18:55:26.649537 kubelet[2665]: I0209 18:55:26.649505 2665 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" Feb 9 18:55:26.653440 env[1643]: time="2024-02-09T18:55:26.651234382Z" level=info msg="StopPodSandbox for \"3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82\"" Feb 9 18:55:26.699982 env[1643]: time="2024-02-09T18:55:26.699923621Z" level=error msg="StopPodSandbox for \"3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82\" failed" error="failed to destroy network for sandbox \"3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:55:26.700264 kubelet[2665]: E0209 18:55:26.700238 2665 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" Feb 9 18:55:26.700503 kubelet[2665]: E0209 18:55:26.700359 2665 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82} Feb 9 18:55:26.700503 kubelet[2665]: E0209 18:55:26.700434 2665 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ee2f0cc0-a899-413e-bc32-44614edc0669\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 18:55:26.700503 kubelet[2665]: E0209 18:55:26.700479 2665 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ee2f0cc0-a899-413e-bc32-44614edc0669\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-jkc2m" podUID=ee2f0cc0-a899-413e-bc32-44614edc0669 Feb 9 18:55:28.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.21.122:22-134.209.145.223:60342 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:28.142927 systemd[1]: Started sshd@7-172.31.21.122:22-134.209.145.223:60342.service. Feb 9 18:55:28.150311 kernel: audit: type=1130 audit(1707504928.142:1259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.21.122:22-134.209.145.223:60342 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:29.466396 sshd[4058]: Invalid user danialw from 134.209.145.223 port 60342 Feb 9 18:55:29.488054 sshd[4058]: pam_faillock(sshd:auth): User unknown Feb 9 18:55:29.489701 sshd[4058]: pam_unix(sshd:auth): check pass; user unknown Feb 9 18:55:29.489955 sshd[4058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.145.223 Feb 9 18:55:29.490563 sshd[4058]: pam_faillock(sshd:auth): User unknown Feb 9 18:55:29.489000 audit[4058]: USER_AUTH pid=4058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="danialw" exe="/usr/sbin/sshd" hostname=134.209.145.223 addr=134.209.145.223 terminal=ssh res=failed' Feb 9 18:55:29.498313 kernel: audit: type=1100 audit(1707504929.489:1260): pid=4058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="danialw" exe="/usr/sbin/sshd" hostname=134.209.145.223 addr=134.209.145.223 terminal=ssh res=failed' Feb 9 18:55:31.188612 sshd[4058]: Failed password for invalid user danialw from 134.209.145.223 port 60342 ssh2 Feb 9 18:55:32.511909 sshd[4058]: Received disconnect from 134.209.145.223 port 60342:11: Bye Bye [preauth] Feb 9 18:55:32.511909 sshd[4058]: Disconnected from invalid user danialw 134.209.145.223 port 60342 [preauth] Feb 9 18:55:32.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.21.122:22-134.209.145.223:60342 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:32.512939 systemd[1]: sshd@7-172.31.21.122:22-134.209.145.223:60342.service: Deactivated successfully. Feb 9 18:55:32.522433 kernel: audit: type=1131 audit(1707504932.512:1261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.21.122:22-134.209.145.223:60342 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.097737 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1180005789.mount: Deactivated successfully. Feb 9 18:55:34.186318 env[1643]: time="2024-02-09T18:55:34.186256917Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:34.195375 env[1643]: time="2024-02-09T18:55:34.195326372Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:34.201815 env[1643]: time="2024-02-09T18:55:34.201757787Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:34.204304 env[1643]: time="2024-02-09T18:55:34.204190225Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:34.204903 env[1643]: time="2024-02-09T18:55:34.204858378Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 18:55:34.229399 env[1643]: time="2024-02-09T18:55:34.229344130Z" level=info msg="CreateContainer within sandbox \"cda71b9d7dd341545224200b895b0cc875ebfa3b8f5b0a68bc10ae8ef47a330d\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 18:55:34.253224 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1260322163.mount: Deactivated successfully. Feb 9 18:55:34.258506 env[1643]: time="2024-02-09T18:55:34.258415613Z" level=info msg="CreateContainer within sandbox \"cda71b9d7dd341545224200b895b0cc875ebfa3b8f5b0a68bc10ae8ef47a330d\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"3b43bd4f9b8320ba673e92820ebc9041a620aef509c264cae3ad0ef56c0502bd\"" Feb 9 18:55:34.261353 env[1643]: time="2024-02-09T18:55:34.259881046Z" level=info msg="StartContainer for \"3b43bd4f9b8320ba673e92820ebc9041a620aef509c264cae3ad0ef56c0502bd\"" Feb 9 18:55:34.305067 systemd[1]: Started cri-containerd-3b43bd4f9b8320ba673e92820ebc9041a620aef509c264cae3ad0ef56c0502bd.scope. Feb 9 18:55:34.344258 kernel: audit: type=1400 audit(1707504934.331:1262): avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.344821 kernel: audit: type=1300 audit(1707504934.331:1262): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3488 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:34.331000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.331000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3488 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:34.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362343362643466396238333230626136373365393238323065626339 Feb 9 18:55:34.353930 kernel: audit: type=1327 audit(1707504934.331:1262): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362343362643466396238333230626136373365393238323065626339 Feb 9 18:55:34.331000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.366315 kernel: audit: type=1400 audit(1707504934.331:1263): avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.366432 kernel: audit: type=1400 audit(1707504934.331:1263): avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.331000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.331000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.373199 kernel: audit: type=1400 audit(1707504934.331:1263): avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.373311 kernel: audit: type=1400 audit(1707504934.331:1263): avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.331000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.331000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.383508 kernel: audit: type=1400 audit(1707504934.331:1263): avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.388846 kernel: audit: type=1400 audit(1707504934.331:1263): avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.331000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.331000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.331000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.331000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.331000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.331000 audit: BPF prog-id=166 op=LOAD Feb 9 18:55:34.331000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a0370 items=0 ppid=3488 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:34.390045 env[1643]: time="2024-02-09T18:55:34.389992923Z" level=info msg="StartContainer for \"3b43bd4f9b8320ba673e92820ebc9041a620aef509c264cae3ad0ef56c0502bd\" returns successfully" Feb 9 18:55:34.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362343362643466396238333230626136373365393238323065626339 Feb 9 18:55:34.336000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.336000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.336000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.336000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.336000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.336000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.336000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.336000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.336000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.336000 audit: BPF prog-id=167 op=LOAD Feb 9 18:55:34.336000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000a03b8 items=0 ppid=3488 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:34.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362343362643466396238333230626136373365393238323065626339 Feb 9 18:55:34.343000 audit: BPF prog-id=167 op=UNLOAD Feb 9 18:55:34.343000 audit: BPF prog-id=166 op=UNLOAD Feb 9 18:55:34.343000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.343000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.343000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.343000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.343000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.343000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.343000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.343000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.343000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.343000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:34.343000 audit: BPF prog-id=168 op=LOAD Feb 9 18:55:34.343000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000a0448 items=0 ppid=3488 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:34.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362343362643466396238333230626136373365393238323065626339 Feb 9 18:55:34.503922 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 18:55:34.504615 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 18:55:34.736232 kubelet[2665]: I0209 18:55:34.736112 2665 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-4nbcl" podStartSLOduration=3.101471212 podCreationTimestamp="2024-02-09 18:55:14 +0000 UTC" firstStartedPulling="2024-02-09 18:55:16.58068991 +0000 UTC m=+25.381679807" lastFinishedPulling="2024-02-09 18:55:34.20524593 +0000 UTC m=+43.006235837" observedRunningTime="2024-02-09 18:55:34.721434445 +0000 UTC m=+43.522424358" watchObservedRunningTime="2024-02-09 18:55:34.726027242 +0000 UTC m=+43.527017247" Feb 9 18:55:36.187000 audit[4165]: AVC avc: denied { write } for pid=4165 comm="tee" name="fd" dev="proc" ino=26068 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:55:36.187000 audit[4165]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffedeb7c972 a2=241 a3=1b6 items=1 ppid=4140 pid=4165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:36.187000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 18:55:36.187000 audit: PATH item=0 name="/dev/fd/63" inode=26053 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:36.187000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:55:36.212000 audit[4181]: AVC avc: denied { write } for pid=4181 comm="tee" name="fd" dev="proc" ino=26094 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:55:36.212000 audit[4181]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe570db981 a2=241 a3=1b6 items=1 ppid=4145 pid=4181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:36.212000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 18:55:36.212000 audit: PATH item=0 name="/dev/fd/63" inode=26071 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:36.212000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:55:36.226000 audit[4190]: AVC avc: denied { write } for pid=4190 comm="tee" name="fd" dev="proc" ino=25471 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:55:36.226000 audit[4190]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff94a44971 a2=241 a3=1b6 items=1 ppid=4142 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:36.226000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 18:55:36.226000 audit: PATH item=0 name="/dev/fd/63" inode=26074 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:36.226000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:55:36.228000 audit[4196]: AVC avc: denied { write } for pid=4196 comm="tee" name="fd" dev="proc" ino=25475 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:55:36.228000 audit[4196]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe17b6c983 a2=241 a3=1b6 items=1 ppid=4144 pid=4196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:36.228000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 18:55:36.228000 audit: PATH item=0 name="/dev/fd/63" inode=26084 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:36.228000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:55:36.236000 audit[4209]: AVC avc: denied { write } for pid=4209 comm="tee" name="fd" dev="proc" ino=25482 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:55:36.236000 audit[4209]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd1fd78982 a2=241 a3=1b6 items=1 ppid=4150 pid=4209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:36.236000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 18:55:36.236000 audit: PATH item=0 name="/dev/fd/63" inode=25465 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:36.236000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:55:36.243000 audit[4212]: AVC avc: denied { write } for pid=4212 comm="tee" name="fd" dev="proc" ino=25486 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:55:36.243000 audit[4212]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff8acff981 a2=241 a3=1b6 items=1 ppid=4153 pid=4212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:36.243000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 18:55:36.243000 audit: PATH item=0 name="/dev/fd/63" inode=26098 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:36.243000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:55:36.257000 audit[4216]: AVC avc: denied { write } for pid=4216 comm="tee" name="fd" dev="proc" ino=25490 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:55:36.257000 audit[4216]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe59965981 a2=241 a3=1b6 items=1 ppid=4157 pid=4216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:36.257000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 18:55:36.257000 audit: PATH item=0 name="/dev/fd/63" inode=25479 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:36.257000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:55:36.397227 env[1643]: time="2024-02-09T18:55:36.397179279Z" level=info msg="StopPodSandbox for \"d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329\"" Feb 9 18:55:36.858776 env[1643]: 2024-02-09 18:55:36.559 [INFO][4234] k8s.go 578: Cleaning up netns ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" Feb 9 18:55:36.858776 env[1643]: 2024-02-09 18:55:36.560 [INFO][4234] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" iface="eth0" netns="/var/run/netns/cni-94453fa2-e809-b004-9829-cbd77b5b63b2" Feb 9 18:55:36.858776 env[1643]: 2024-02-09 18:55:36.560 [INFO][4234] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" iface="eth0" netns="/var/run/netns/cni-94453fa2-e809-b004-9829-cbd77b5b63b2" Feb 9 18:55:36.858776 env[1643]: 2024-02-09 18:55:36.561 [INFO][4234] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" iface="eth0" netns="/var/run/netns/cni-94453fa2-e809-b004-9829-cbd77b5b63b2" Feb 9 18:55:36.858776 env[1643]: 2024-02-09 18:55:36.561 [INFO][4234] k8s.go 585: Releasing IP address(es) ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" Feb 9 18:55:36.858776 env[1643]: 2024-02-09 18:55:36.561 [INFO][4234] utils.go 188: Calico CNI releasing IP address ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" Feb 9 18:55:36.858776 env[1643]: 2024-02-09 18:55:36.833 [INFO][4242] ipam_plugin.go 415: Releasing address using handleID ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" HandleID="k8s-pod-network.d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" Workload="ip--172--31--21--122-k8s-calico--kube--controllers--7776c55fc5--xj6tw-eth0" Feb 9 18:55:36.858776 env[1643]: 2024-02-09 18:55:36.836 [INFO][4242] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:55:36.858776 env[1643]: 2024-02-09 18:55:36.836 [INFO][4242] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:55:36.858776 env[1643]: 2024-02-09 18:55:36.852 [WARNING][4242] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" HandleID="k8s-pod-network.d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" Workload="ip--172--31--21--122-k8s-calico--kube--controllers--7776c55fc5--xj6tw-eth0" Feb 9 18:55:36.858776 env[1643]: 2024-02-09 18:55:36.852 [INFO][4242] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" HandleID="k8s-pod-network.d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" Workload="ip--172--31--21--122-k8s-calico--kube--controllers--7776c55fc5--xj6tw-eth0" Feb 9 18:55:36.858776 env[1643]: 2024-02-09 18:55:36.854 [INFO][4242] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:55:36.858776 env[1643]: 2024-02-09 18:55:36.856 [INFO][4234] k8s.go 591: Teardown processing complete. ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" Feb 9 18:55:36.859579 env[1643]: time="2024-02-09T18:55:36.859536313Z" level=info msg="TearDown network for sandbox \"d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329\" successfully" Feb 9 18:55:36.859717 env[1643]: time="2024-02-09T18:55:36.859696046Z" level=info msg="StopPodSandbox for \"d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329\" returns successfully" Feb 9 18:55:36.862219 systemd[1]: run-netns-cni\x2d94453fa2\x2de809\x2db004\x2d9829\x2dcbd77b5b63b2.mount: Deactivated successfully. Feb 9 18:55:36.864815 env[1643]: time="2024-02-09T18:55:36.864027627Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7776c55fc5-xj6tw,Uid:d41fed55-9537-4c19-aa2d-21bc829cf483,Namespace:calico-system,Attempt:1,}" Feb 9 18:55:37.042475 (udev-worker)[4104]: Network interface NamePolicy= disabled on kernel command line. Feb 9 18:55:37.045980 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:55:37.046183 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali98ff04c56de: link becomes ready Feb 9 18:55:37.049597 systemd-networkd[1462]: cali98ff04c56de: Link UP Feb 9 18:55:37.049867 systemd-networkd[1462]: cali98ff04c56de: Gained carrier Feb 9 18:55:37.079482 env[1643]: 2024-02-09 18:55:36.921 [INFO][4249] utils.go 100: File /var/lib/calico/mtu does not exist Feb 9 18:55:37.079482 env[1643]: 2024-02-09 18:55:36.936 [INFO][4249] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--122-k8s-calico--kube--controllers--7776c55fc5--xj6tw-eth0 calico-kube-controllers-7776c55fc5- calico-system d41fed55-9537-4c19-aa2d-21bc829cf483 756 0 2024-02-09 18:55:11 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7776c55fc5 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-21-122 calico-kube-controllers-7776c55fc5-xj6tw eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali98ff04c56de [] []}} ContainerID="d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd" Namespace="calico-system" Pod="calico-kube-controllers-7776c55fc5-xj6tw" WorkloadEndpoint="ip--172--31--21--122-k8s-calico--kube--controllers--7776c55fc5--xj6tw-" Feb 9 18:55:37.079482 env[1643]: 2024-02-09 18:55:36.936 [INFO][4249] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd" Namespace="calico-system" Pod="calico-kube-controllers-7776c55fc5-xj6tw" WorkloadEndpoint="ip--172--31--21--122-k8s-calico--kube--controllers--7776c55fc5--xj6tw-eth0" Feb 9 18:55:37.079482 env[1643]: 2024-02-09 18:55:36.968 [INFO][4261] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd" HandleID="k8s-pod-network.d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd" Workload="ip--172--31--21--122-k8s-calico--kube--controllers--7776c55fc5--xj6tw-eth0" Feb 9 18:55:37.079482 env[1643]: 2024-02-09 18:55:36.979 [INFO][4261] ipam_plugin.go 268: Auto assigning IP ContainerID="d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd" HandleID="k8s-pod-network.d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd" Workload="ip--172--31--21--122-k8s-calico--kube--controllers--7776c55fc5--xj6tw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027d200), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-21-122", "pod":"calico-kube-controllers-7776c55fc5-xj6tw", "timestamp":"2024-02-09 18:55:36.96816099 +0000 UTC"}, Hostname:"ip-172-31-21-122", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:55:37.079482 env[1643]: 2024-02-09 18:55:36.979 [INFO][4261] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:55:37.079482 env[1643]: 2024-02-09 18:55:36.979 [INFO][4261] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:55:37.079482 env[1643]: 2024-02-09 18:55:36.979 [INFO][4261] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-122' Feb 9 18:55:37.079482 env[1643]: 2024-02-09 18:55:36.982 [INFO][4261] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd" host="ip-172-31-21-122" Feb 9 18:55:37.079482 env[1643]: 2024-02-09 18:55:37.000 [INFO][4261] ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-122" Feb 9 18:55:37.079482 env[1643]: 2024-02-09 18:55:37.006 [INFO][4261] ipam.go 489: Trying affinity for 192.168.4.64/26 host="ip-172-31-21-122" Feb 9 18:55:37.079482 env[1643]: 2024-02-09 18:55:37.009 [INFO][4261] ipam.go 155: Attempting to load block cidr=192.168.4.64/26 host="ip-172-31-21-122" Feb 9 18:55:37.079482 env[1643]: 2024-02-09 18:55:37.011 [INFO][4261] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.4.64/26 host="ip-172-31-21-122" Feb 9 18:55:37.079482 env[1643]: 2024-02-09 18:55:37.012 [INFO][4261] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.4.64/26 handle="k8s-pod-network.d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd" host="ip-172-31-21-122" Feb 9 18:55:37.079482 env[1643]: 2024-02-09 18:55:37.017 [INFO][4261] ipam.go 1682: Creating new handle: k8s-pod-network.d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd Feb 9 18:55:37.079482 env[1643]: 2024-02-09 18:55:37.022 [INFO][4261] ipam.go 1203: Writing block in order to claim IPs block=192.168.4.64/26 handle="k8s-pod-network.d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd" host="ip-172-31-21-122" Feb 9 18:55:37.079482 env[1643]: 2024-02-09 18:55:37.027 [INFO][4261] ipam.go 1216: Successfully claimed IPs: [192.168.4.65/26] block=192.168.4.64/26 handle="k8s-pod-network.d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd" host="ip-172-31-21-122" Feb 9 18:55:37.079482 env[1643]: 2024-02-09 18:55:37.027 [INFO][4261] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.4.65/26] handle="k8s-pod-network.d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd" host="ip-172-31-21-122" Feb 9 18:55:37.079482 env[1643]: 2024-02-09 18:55:37.027 [INFO][4261] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:55:37.079482 env[1643]: 2024-02-09 18:55:37.027 [INFO][4261] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.4.65/26] IPv6=[] ContainerID="d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd" HandleID="k8s-pod-network.d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd" Workload="ip--172--31--21--122-k8s-calico--kube--controllers--7776c55fc5--xj6tw-eth0" Feb 9 18:55:37.081634 env[1643]: 2024-02-09 18:55:37.031 [INFO][4249] k8s.go 385: Populated endpoint ContainerID="d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd" Namespace="calico-system" Pod="calico-kube-controllers-7776c55fc5-xj6tw" WorkloadEndpoint="ip--172--31--21--122-k8s-calico--kube--controllers--7776c55fc5--xj6tw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--122-k8s-calico--kube--controllers--7776c55fc5--xj6tw-eth0", GenerateName:"calico-kube-controllers-7776c55fc5-", Namespace:"calico-system", SelfLink:"", UID:"d41fed55-9537-4c19-aa2d-21bc829cf483", ResourceVersion:"756", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 55, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7776c55fc5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-122", ContainerID:"", Pod:"calico-kube-controllers-7776c55fc5-xj6tw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.4.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali98ff04c56de", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:55:37.081634 env[1643]: 2024-02-09 18:55:37.031 [INFO][4249] k8s.go 386: Calico CNI using IPs: [192.168.4.65/32] ContainerID="d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd" Namespace="calico-system" Pod="calico-kube-controllers-7776c55fc5-xj6tw" WorkloadEndpoint="ip--172--31--21--122-k8s-calico--kube--controllers--7776c55fc5--xj6tw-eth0" Feb 9 18:55:37.081634 env[1643]: 2024-02-09 18:55:37.031 [INFO][4249] dataplane_linux.go 68: Setting the host side veth name to cali98ff04c56de ContainerID="d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd" Namespace="calico-system" Pod="calico-kube-controllers-7776c55fc5-xj6tw" WorkloadEndpoint="ip--172--31--21--122-k8s-calico--kube--controllers--7776c55fc5--xj6tw-eth0" Feb 9 18:55:37.081634 env[1643]: 2024-02-09 18:55:37.046 [INFO][4249] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd" Namespace="calico-system" Pod="calico-kube-controllers-7776c55fc5-xj6tw" WorkloadEndpoint="ip--172--31--21--122-k8s-calico--kube--controllers--7776c55fc5--xj6tw-eth0" Feb 9 18:55:37.081634 env[1643]: 2024-02-09 18:55:37.046 [INFO][4249] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd" Namespace="calico-system" Pod="calico-kube-controllers-7776c55fc5-xj6tw" WorkloadEndpoint="ip--172--31--21--122-k8s-calico--kube--controllers--7776c55fc5--xj6tw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--122-k8s-calico--kube--controllers--7776c55fc5--xj6tw-eth0", GenerateName:"calico-kube-controllers-7776c55fc5-", Namespace:"calico-system", SelfLink:"", UID:"d41fed55-9537-4c19-aa2d-21bc829cf483", ResourceVersion:"756", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 55, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7776c55fc5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-122", ContainerID:"d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd", Pod:"calico-kube-controllers-7776c55fc5-xj6tw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.4.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali98ff04c56de", MAC:"b2:ed:ce:4a:46:13", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:55:37.081634 env[1643]: 2024-02-09 18:55:37.070 [INFO][4249] k8s.go 491: Wrote updated endpoint to datastore ContainerID="d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd" Namespace="calico-system" Pod="calico-kube-controllers-7776c55fc5-xj6tw" WorkloadEndpoint="ip--172--31--21--122-k8s-calico--kube--controllers--7776c55fc5--xj6tw-eth0" Feb 9 18:55:37.102680 env[1643]: time="2024-02-09T18:55:37.102472752Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:55:37.102680 env[1643]: time="2024-02-09T18:55:37.102648926Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:55:37.102915 env[1643]: time="2024-02-09T18:55:37.102666982Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:55:37.103216 env[1643]: time="2024-02-09T18:55:37.103148555Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd pid=4286 runtime=io.containerd.runc.v2 Feb 9 18:55:37.131716 systemd[1]: run-containerd-runc-k8s.io-d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd-runc.hG9HmR.mount: Deactivated successfully. Feb 9 18:55:37.139402 systemd[1]: Started cri-containerd-d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd.scope. Feb 9 18:55:37.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.157000 audit: BPF prog-id=169 op=LOAD Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4286 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:37.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436623237616366633635383536373536626663653237363539373830 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=4286 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:37.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436623237616366633635383536373536626663653237363539373830 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit: BPF prog-id=170 op=LOAD Feb 9 18:55:37.158000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00044ec70 items=0 ppid=4286 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:37.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436623237616366633635383536373536626663653237363539373830 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit: BPF prog-id=171 op=LOAD Feb 9 18:55:37.158000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00044ecb8 items=0 ppid=4286 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:37.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436623237616366633635383536373536626663653237363539373830 Feb 9 18:55:37.158000 audit: BPF prog-id=171 op=UNLOAD Feb 9 18:55:37.158000 audit: BPF prog-id=170 op=UNLOAD Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.158000 audit: BPF prog-id=172 op=LOAD Feb 9 18:55:37.158000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00044f0c8 items=0 ppid=4286 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:37.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436623237616366633635383536373536626663653237363539373830 Feb 9 18:55:37.238158 env[1643]: time="2024-02-09T18:55:37.238112512Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7776c55fc5-xj6tw,Uid:d41fed55-9537-4c19-aa2d-21bc829cf483,Namespace:calico-system,Attempt:1,} returns sandbox id \"d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd\"" Feb 9 18:55:37.242574 env[1643]: time="2024-02-09T18:55:37.242537224Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 18:55:37.405309 env[1643]: time="2024-02-09T18:55:37.402979906Z" level=info msg="StopPodSandbox for \"d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d\"" Feb 9 18:55:37.494856 env[1643]: 2024-02-09 18:55:37.456 [INFO][4335] k8s.go 578: Cleaning up netns ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" Feb 9 18:55:37.494856 env[1643]: 2024-02-09 18:55:37.456 [INFO][4335] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" iface="eth0" netns="/var/run/netns/cni-696b026b-e86f-88a8-b8dc-e229aecd91ed" Feb 9 18:55:37.494856 env[1643]: 2024-02-09 18:55:37.456 [INFO][4335] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" iface="eth0" netns="/var/run/netns/cni-696b026b-e86f-88a8-b8dc-e229aecd91ed" Feb 9 18:55:37.494856 env[1643]: 2024-02-09 18:55:37.456 [INFO][4335] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" iface="eth0" netns="/var/run/netns/cni-696b026b-e86f-88a8-b8dc-e229aecd91ed" Feb 9 18:55:37.494856 env[1643]: 2024-02-09 18:55:37.456 [INFO][4335] k8s.go 585: Releasing IP address(es) ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" Feb 9 18:55:37.494856 env[1643]: 2024-02-09 18:55:37.457 [INFO][4335] utils.go 188: Calico CNI releasing IP address ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" Feb 9 18:55:37.494856 env[1643]: 2024-02-09 18:55:37.482 [INFO][4341] ipam_plugin.go 415: Releasing address using handleID ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" HandleID="k8s-pod-network.d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" Workload="ip--172--31--21--122-k8s-coredns--5d78c9869d--kjkvv-eth0" Feb 9 18:55:37.494856 env[1643]: 2024-02-09 18:55:37.482 [INFO][4341] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:55:37.494856 env[1643]: 2024-02-09 18:55:37.482 [INFO][4341] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:55:37.494856 env[1643]: 2024-02-09 18:55:37.489 [WARNING][4341] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" HandleID="k8s-pod-network.d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" Workload="ip--172--31--21--122-k8s-coredns--5d78c9869d--kjkvv-eth0" Feb 9 18:55:37.494856 env[1643]: 2024-02-09 18:55:37.489 [INFO][4341] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" HandleID="k8s-pod-network.d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" Workload="ip--172--31--21--122-k8s-coredns--5d78c9869d--kjkvv-eth0" Feb 9 18:55:37.494856 env[1643]: 2024-02-09 18:55:37.491 [INFO][4341] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:55:37.494856 env[1643]: 2024-02-09 18:55:37.493 [INFO][4335] k8s.go 591: Teardown processing complete. ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" Feb 9 18:55:37.495588 env[1643]: time="2024-02-09T18:55:37.495074121Z" level=info msg="TearDown network for sandbox \"d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d\" successfully" Feb 9 18:55:37.495588 env[1643]: time="2024-02-09T18:55:37.495137180Z" level=info msg="StopPodSandbox for \"d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d\" returns successfully" Feb 9 18:55:37.496792 env[1643]: time="2024-02-09T18:55:37.496726187Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-kjkvv,Uid:654f00aa-4484-41f3-9f60-f8ee2d4c8c15,Namespace:kube-system,Attempt:1,}" Feb 9 18:55:37.723748 systemd-networkd[1462]: cali6d50083869b: Link UP Feb 9 18:55:37.724506 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6d50083869b: link becomes ready Feb 9 18:55:37.723987 systemd-networkd[1462]: cali6d50083869b: Gained carrier Feb 9 18:55:37.763609 env[1643]: 2024-02-09 18:55:37.541 [INFO][4348] utils.go 100: File /var/lib/calico/mtu does not exist Feb 9 18:55:37.763609 env[1643]: 2024-02-09 18:55:37.568 [INFO][4348] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--122-k8s-coredns--5d78c9869d--kjkvv-eth0 coredns-5d78c9869d- kube-system 654f00aa-4484-41f3-9f60-f8ee2d4c8c15 763 0 2024-02-09 18:55:03 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-21-122 coredns-5d78c9869d-kjkvv eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali6d50083869b [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6" Namespace="kube-system" Pod="coredns-5d78c9869d-kjkvv" WorkloadEndpoint="ip--172--31--21--122-k8s-coredns--5d78c9869d--kjkvv-" Feb 9 18:55:37.763609 env[1643]: 2024-02-09 18:55:37.568 [INFO][4348] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6" Namespace="kube-system" Pod="coredns-5d78c9869d-kjkvv" WorkloadEndpoint="ip--172--31--21--122-k8s-coredns--5d78c9869d--kjkvv-eth0" Feb 9 18:55:37.763609 env[1643]: 2024-02-09 18:55:37.649 [INFO][4367] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6" HandleID="k8s-pod-network.afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6" Workload="ip--172--31--21--122-k8s-coredns--5d78c9869d--kjkvv-eth0" Feb 9 18:55:37.763609 env[1643]: 2024-02-09 18:55:37.672 [INFO][4367] ipam_plugin.go 268: Auto assigning IP ContainerID="afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6" HandleID="k8s-pod-network.afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6" Workload="ip--172--31--21--122-k8s-coredns--5d78c9869d--kjkvv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00034a000), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-21-122", "pod":"coredns-5d78c9869d-kjkvv", "timestamp":"2024-02-09 18:55:37.64994209 +0000 UTC"}, Hostname:"ip-172-31-21-122", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:55:37.763609 env[1643]: 2024-02-09 18:55:37.672 [INFO][4367] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:55:37.763609 env[1643]: 2024-02-09 18:55:37.672 [INFO][4367] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:55:37.763609 env[1643]: 2024-02-09 18:55:37.672 [INFO][4367] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-122' Feb 9 18:55:37.763609 env[1643]: 2024-02-09 18:55:37.675 [INFO][4367] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6" host="ip-172-31-21-122" Feb 9 18:55:37.763609 env[1643]: 2024-02-09 18:55:37.683 [INFO][4367] ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-122" Feb 9 18:55:37.763609 env[1643]: 2024-02-09 18:55:37.690 [INFO][4367] ipam.go 489: Trying affinity for 192.168.4.64/26 host="ip-172-31-21-122" Feb 9 18:55:37.763609 env[1643]: 2024-02-09 18:55:37.693 [INFO][4367] ipam.go 155: Attempting to load block cidr=192.168.4.64/26 host="ip-172-31-21-122" Feb 9 18:55:37.763609 env[1643]: 2024-02-09 18:55:37.697 [INFO][4367] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.4.64/26 host="ip-172-31-21-122" Feb 9 18:55:37.763609 env[1643]: 2024-02-09 18:55:37.697 [INFO][4367] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.4.64/26 handle="k8s-pod-network.afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6" host="ip-172-31-21-122" Feb 9 18:55:37.763609 env[1643]: 2024-02-09 18:55:37.699 [INFO][4367] ipam.go 1682: Creating new handle: k8s-pod-network.afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6 Feb 9 18:55:37.763609 env[1643]: 2024-02-09 18:55:37.706 [INFO][4367] ipam.go 1203: Writing block in order to claim IPs block=192.168.4.64/26 handle="k8s-pod-network.afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6" host="ip-172-31-21-122" Feb 9 18:55:37.763609 env[1643]: 2024-02-09 18:55:37.714 [INFO][4367] ipam.go 1216: Successfully claimed IPs: [192.168.4.66/26] block=192.168.4.64/26 handle="k8s-pod-network.afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6" host="ip-172-31-21-122" Feb 9 18:55:37.763609 env[1643]: 2024-02-09 18:55:37.714 [INFO][4367] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.4.66/26] handle="k8s-pod-network.afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6" host="ip-172-31-21-122" Feb 9 18:55:37.763609 env[1643]: 2024-02-09 18:55:37.714 [INFO][4367] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:55:37.763609 env[1643]: 2024-02-09 18:55:37.714 [INFO][4367] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.4.66/26] IPv6=[] ContainerID="afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6" HandleID="k8s-pod-network.afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6" Workload="ip--172--31--21--122-k8s-coredns--5d78c9869d--kjkvv-eth0" Feb 9 18:55:37.765889 env[1643]: 2024-02-09 18:55:37.717 [INFO][4348] k8s.go 385: Populated endpoint ContainerID="afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6" Namespace="kube-system" Pod="coredns-5d78c9869d-kjkvv" WorkloadEndpoint="ip--172--31--21--122-k8s-coredns--5d78c9869d--kjkvv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--122-k8s-coredns--5d78c9869d--kjkvv-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"654f00aa-4484-41f3-9f60-f8ee2d4c8c15", ResourceVersion:"763", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 55, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-122", ContainerID:"", Pod:"coredns-5d78c9869d-kjkvv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.4.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6d50083869b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:55:37.765889 env[1643]: 2024-02-09 18:55:37.717 [INFO][4348] k8s.go 386: Calico CNI using IPs: [192.168.4.66/32] ContainerID="afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6" Namespace="kube-system" Pod="coredns-5d78c9869d-kjkvv" WorkloadEndpoint="ip--172--31--21--122-k8s-coredns--5d78c9869d--kjkvv-eth0" Feb 9 18:55:37.765889 env[1643]: 2024-02-09 18:55:37.718 [INFO][4348] dataplane_linux.go 68: Setting the host side veth name to cali6d50083869b ContainerID="afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6" Namespace="kube-system" Pod="coredns-5d78c9869d-kjkvv" WorkloadEndpoint="ip--172--31--21--122-k8s-coredns--5d78c9869d--kjkvv-eth0" Feb 9 18:55:37.765889 env[1643]: 2024-02-09 18:55:37.731 [INFO][4348] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6" Namespace="kube-system" Pod="coredns-5d78c9869d-kjkvv" WorkloadEndpoint="ip--172--31--21--122-k8s-coredns--5d78c9869d--kjkvv-eth0" Feb 9 18:55:37.765889 env[1643]: 2024-02-09 18:55:37.731 [INFO][4348] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6" Namespace="kube-system" Pod="coredns-5d78c9869d-kjkvv" WorkloadEndpoint="ip--172--31--21--122-k8s-coredns--5d78c9869d--kjkvv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--122-k8s-coredns--5d78c9869d--kjkvv-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"654f00aa-4484-41f3-9f60-f8ee2d4c8c15", ResourceVersion:"763", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 55, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-122", ContainerID:"afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6", Pod:"coredns-5d78c9869d-kjkvv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.4.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6d50083869b", MAC:"f6:67:26:21:46:e7", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:55:37.765889 env[1643]: 2024-02-09 18:55:37.761 [INFO][4348] k8s.go 491: Wrote updated endpoint to datastore ContainerID="afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6" Namespace="kube-system" Pod="coredns-5d78c9869d-kjkvv" WorkloadEndpoint="ip--172--31--21--122-k8s-coredns--5d78c9869d--kjkvv-eth0" Feb 9 18:55:37.787634 env[1643]: time="2024-02-09T18:55:37.787546728Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:55:37.787634 env[1643]: time="2024-02-09T18:55:37.787598370Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:55:37.787890 env[1643]: time="2024-02-09T18:55:37.787614100Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:55:37.788002 env[1643]: time="2024-02-09T18:55:37.787972519Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6 pid=4403 runtime=io.containerd.runc.v2 Feb 9 18:55:37.809441 systemd[1]: Started cri-containerd-afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6.scope. Feb 9 18:55:37.837208 kernel: kauditd_printk_skb: 126 callbacks suppressed Feb 9 18:55:37.837389 kernel: audit: type=1400 audit(1707504937.829:1293): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.848127 kernel: audit: type=1400 audit(1707504937.829:1294): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.848252 kernel: audit: type=1400 audit(1707504937.829:1295): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.857829 kernel: audit: type=1400 audit(1707504937.829:1296): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.857908 kernel: audit: type=1400 audit(1707504937.829:1297): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.868460 kernel: audit: type=1400 audit(1707504937.829:1298): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.874057 systemd[1]: run-netns-cni\x2d696b026b\x2de86f\x2d88a8\x2db8dc\x2de229aecd91ed.mount: Deactivated successfully. Feb 9 18:55:37.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.884383 kernel: audit: type=1400 audit(1707504937.829:1299): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.893800 kernel: audit: type=1400 audit(1707504937.829:1300): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.893920 kernel: audit: type=1400 audit(1707504937.829:1301): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.901325 kernel: audit: type=1400 audit(1707504937.829:1302): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.829000 audit: BPF prog-id=173 op=LOAD Feb 9 18:55:37.836000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.836000 audit[4412]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4403 pid=4412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:37.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166623031393962666264383637643335343036666465393162653461 Feb 9 18:55:37.836000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.836000 audit[4412]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4403 pid=4412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:37.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166623031393962666264383637643335343036666465393162653461 Feb 9 18:55:37.836000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.836000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.836000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.836000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.836000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.836000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.836000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.836000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.836000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.836000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.836000 audit: BPF prog-id=174 op=LOAD Feb 9 18:55:37.836000 audit[4412]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000228c10 items=0 ppid=4403 pid=4412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:37.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166623031393962666264383637643335343036666465393162653461 Feb 9 18:55:37.837000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.837000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.837000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.837000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.837000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.837000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.837000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.837000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.837000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.837000 audit: BPF prog-id=175 op=LOAD Feb 9 18:55:37.837000 audit[4412]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000228c58 items=0 ppid=4403 pid=4412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:37.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166623031393962666264383637643335343036666465393162653461 Feb 9 18:55:37.837000 audit: BPF prog-id=175 op=UNLOAD Feb 9 18:55:37.837000 audit: BPF prog-id=174 op=UNLOAD Feb 9 18:55:37.837000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.837000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.837000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.837000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.837000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.837000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.837000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.837000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.837000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.837000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:37.837000 audit: BPF prog-id=176 op=LOAD Feb 9 18:55:37.837000 audit[4412]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000229068 items=0 ppid=4403 pid=4412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:37.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166623031393962666264383637643335343036666465393162653461 Feb 9 18:55:37.914105 env[1643]: time="2024-02-09T18:55:37.914047209Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-kjkvv,Uid:654f00aa-4484-41f3-9f60-f8ee2d4c8c15,Namespace:kube-system,Attempt:1,} returns sandbox id \"afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6\"" Feb 9 18:55:37.918631 env[1643]: time="2024-02-09T18:55:37.917112562Z" level=info msg="CreateContainer within sandbox \"afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 18:55:37.952561 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2859279262.mount: Deactivated successfully. Feb 9 18:55:37.961943 env[1643]: time="2024-02-09T18:55:37.961871807Z" level=info msg="CreateContainer within sandbox \"afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"f54b74b1149ca67fe875573f7d0e59b54483603daf2595584784578e367cdcf1\"" Feb 9 18:55:37.969454 env[1643]: time="2024-02-09T18:55:37.967934486Z" level=info msg="StartContainer for \"f54b74b1149ca67fe875573f7d0e59b54483603daf2595584784578e367cdcf1\"" Feb 9 18:55:38.034981 systemd[1]: Started cri-containerd-f54b74b1149ca67fe875573f7d0e59b54483603daf2595584784578e367cdcf1.scope. Feb 9 18:55:38.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.060000 audit: BPF prog-id=177 op=LOAD Feb 9 18:55:38.061000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.061000 audit[4448]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4403 pid=4448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:38.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635346237346231313439636136376665383735353733663764306535 Feb 9 18:55:38.062000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.062000 audit[4448]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=4403 pid=4448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:38.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635346237346231313439636136376665383735353733663764306535 Feb 9 18:55:38.062000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.062000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.062000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.062000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.062000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.062000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.062000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.062000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.062000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.062000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.062000 audit: BPF prog-id=178 op=LOAD Feb 9 18:55:38.062000 audit[4448]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001dc2e0 items=0 ppid=4403 pid=4448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:38.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635346237346231313439636136376665383735353733663764306535 Feb 9 18:55:38.063000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.063000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.063000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.063000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.063000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.063000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.063000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.063000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.063000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.063000 audit: BPF prog-id=179 op=LOAD Feb 9 18:55:38.063000 audit[4448]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001dc328 items=0 ppid=4403 pid=4448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:38.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635346237346231313439636136376665383735353733663764306535 Feb 9 18:55:38.064000 audit: BPF prog-id=179 op=UNLOAD Feb 9 18:55:38.064000 audit: BPF prog-id=178 op=UNLOAD Feb 9 18:55:38.064000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.064000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.064000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.064000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.064000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.064000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.064000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.064000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.064000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.064000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:38.064000 audit: BPF prog-id=180 op=LOAD Feb 9 18:55:38.064000 audit[4448]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001dc738 items=0 ppid=4403 pid=4448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:38.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635346237346231313439636136376665383735353733663764306535 Feb 9 18:55:38.092406 env[1643]: time="2024-02-09T18:55:38.092356668Z" level=info msg="StartContainer for \"f54b74b1149ca67fe875573f7d0e59b54483603daf2595584784578e367cdcf1\" returns successfully" Feb 9 18:55:38.396747 env[1643]: time="2024-02-09T18:55:38.396678422Z" level=info msg="StopPodSandbox for \"60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde\"" Feb 9 18:55:38.534766 env[1643]: 2024-02-09 18:55:38.481 [INFO][4492] k8s.go 578: Cleaning up netns ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" Feb 9 18:55:38.534766 env[1643]: 2024-02-09 18:55:38.483 [INFO][4492] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" iface="eth0" netns="/var/run/netns/cni-552da365-8d07-1b74-c408-6015b97e6cb7" Feb 9 18:55:38.534766 env[1643]: 2024-02-09 18:55:38.483 [INFO][4492] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" iface="eth0" netns="/var/run/netns/cni-552da365-8d07-1b74-c408-6015b97e6cb7" Feb 9 18:55:38.534766 env[1643]: 2024-02-09 18:55:38.484 [INFO][4492] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" iface="eth0" netns="/var/run/netns/cni-552da365-8d07-1b74-c408-6015b97e6cb7" Feb 9 18:55:38.534766 env[1643]: 2024-02-09 18:55:38.484 [INFO][4492] k8s.go 585: Releasing IP address(es) ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" Feb 9 18:55:38.534766 env[1643]: 2024-02-09 18:55:38.484 [INFO][4492] utils.go 188: Calico CNI releasing IP address ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" Feb 9 18:55:38.534766 env[1643]: 2024-02-09 18:55:38.516 [INFO][4499] ipam_plugin.go 415: Releasing address using handleID ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" HandleID="k8s-pod-network.60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" Workload="ip--172--31--21--122-k8s-coredns--5d78c9869d--dlpjk-eth0" Feb 9 18:55:38.534766 env[1643]: 2024-02-09 18:55:38.516 [INFO][4499] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:55:38.534766 env[1643]: 2024-02-09 18:55:38.516 [INFO][4499] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:55:38.534766 env[1643]: 2024-02-09 18:55:38.527 [WARNING][4499] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" HandleID="k8s-pod-network.60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" Workload="ip--172--31--21--122-k8s-coredns--5d78c9869d--dlpjk-eth0" Feb 9 18:55:38.534766 env[1643]: 2024-02-09 18:55:38.527 [INFO][4499] ipam_plugin.go 443: Releasing address using workloadID ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" HandleID="k8s-pod-network.60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" Workload="ip--172--31--21--122-k8s-coredns--5d78c9869d--dlpjk-eth0" Feb 9 18:55:38.534766 env[1643]: 2024-02-09 18:55:38.530 [INFO][4499] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:55:38.534766 env[1643]: 2024-02-09 18:55:38.533 [INFO][4492] k8s.go 591: Teardown processing complete. ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" Feb 9 18:55:38.536227 env[1643]: time="2024-02-09T18:55:38.534920679Z" level=info msg="TearDown network for sandbox \"60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde\" successfully" Feb 9 18:55:38.536227 env[1643]: time="2024-02-09T18:55:38.534961110Z" level=info msg="StopPodSandbox for \"60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde\" returns successfully" Feb 9 18:55:38.536227 env[1643]: time="2024-02-09T18:55:38.536064122Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-dlpjk,Uid:f00550ab-7b86-4c71-87d5-934dcf889278,Namespace:kube-system,Attempt:1,}" Feb 9 18:55:38.768422 systemd-networkd[1462]: cali98ff04c56de: Gained IPv6LL Feb 9 18:55:38.867960 systemd[1]: run-netns-cni\x2d552da365\x2d8d07\x2d1b74\x2dc408\x2d6015b97e6cb7.mount: Deactivated successfully. Feb 9 18:55:38.948000 audit[4543]: NETFILTER_CFG table=filter:103 family=2 entries=16 op=nft_register_rule pid=4543 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:38.948000 audit[4543]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffdfe6a9df0 a2=0 a3=7ffdfe6a9ddc items=0 ppid=2987 pid=4543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:38.948000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:38.950000 audit[4543]: NETFILTER_CFG table=nat:104 family=2 entries=12 op=nft_register_rule pid=4543 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:38.950000 audit[4543]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffdfe6a9df0 a2=0 a3=31030 items=0 ppid=2987 pid=4543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:38.950000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:39.029651 systemd-networkd[1462]: caliae75473e4f2: Link UP Feb 9 18:55:39.034450 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:55:39.034858 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliae75473e4f2: link becomes ready Feb 9 18:55:39.035067 systemd-networkd[1462]: caliae75473e4f2: Gained carrier Feb 9 18:55:39.076672 kubelet[2665]: I0209 18:55:39.074275 2665 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-kjkvv" podStartSLOduration=36.074203443 podCreationTimestamp="2024-02-09 18:55:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:55:38.744534655 +0000 UTC m=+47.545524571" watchObservedRunningTime="2024-02-09 18:55:39.074203443 +0000 UTC m=+47.875193355" Feb 9 18:55:39.078206 env[1643]: 2024-02-09 18:55:38.600 [INFO][4506] utils.go 100: File /var/lib/calico/mtu does not exist Feb 9 18:55:39.078206 env[1643]: 2024-02-09 18:55:38.617 [INFO][4506] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--122-k8s-coredns--5d78c9869d--dlpjk-eth0 coredns-5d78c9869d- kube-system f00550ab-7b86-4c71-87d5-934dcf889278 773 0 2024-02-09 18:55:03 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-21-122 coredns-5d78c9869d-dlpjk eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] caliae75473e4f2 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610" Namespace="kube-system" Pod="coredns-5d78c9869d-dlpjk" WorkloadEndpoint="ip--172--31--21--122-k8s-coredns--5d78c9869d--dlpjk-" Feb 9 18:55:39.078206 env[1643]: 2024-02-09 18:55:38.617 [INFO][4506] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610" Namespace="kube-system" Pod="coredns-5d78c9869d-dlpjk" WorkloadEndpoint="ip--172--31--21--122-k8s-coredns--5d78c9869d--dlpjk-eth0" Feb 9 18:55:39.078206 env[1643]: 2024-02-09 18:55:38.704 [INFO][4519] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610" HandleID="k8s-pod-network.e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610" Workload="ip--172--31--21--122-k8s-coredns--5d78c9869d--dlpjk-eth0" Feb 9 18:55:39.078206 env[1643]: 2024-02-09 18:55:38.734 [INFO][4519] ipam_plugin.go 268: Auto assigning IP ContainerID="e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610" HandleID="k8s-pod-network.e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610" Workload="ip--172--31--21--122-k8s-coredns--5d78c9869d--dlpjk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002bfa00), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-21-122", "pod":"coredns-5d78c9869d-dlpjk", "timestamp":"2024-02-09 18:55:38.704177981 +0000 UTC"}, Hostname:"ip-172-31-21-122", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:55:39.078206 env[1643]: 2024-02-09 18:55:38.734 [INFO][4519] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:55:39.078206 env[1643]: 2024-02-09 18:55:38.734 [INFO][4519] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:55:39.078206 env[1643]: 2024-02-09 18:55:38.735 [INFO][4519] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-122' Feb 9 18:55:39.078206 env[1643]: 2024-02-09 18:55:38.740 [INFO][4519] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610" host="ip-172-31-21-122" Feb 9 18:55:39.078206 env[1643]: 2024-02-09 18:55:38.752 [INFO][4519] ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-122" Feb 9 18:55:39.078206 env[1643]: 2024-02-09 18:55:38.773 [INFO][4519] ipam.go 489: Trying affinity for 192.168.4.64/26 host="ip-172-31-21-122" Feb 9 18:55:39.078206 env[1643]: 2024-02-09 18:55:38.777 [INFO][4519] ipam.go 155: Attempting to load block cidr=192.168.4.64/26 host="ip-172-31-21-122" Feb 9 18:55:39.078206 env[1643]: 2024-02-09 18:55:38.781 [INFO][4519] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.4.64/26 host="ip-172-31-21-122" Feb 9 18:55:39.078206 env[1643]: 2024-02-09 18:55:38.781 [INFO][4519] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.4.64/26 handle="k8s-pod-network.e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610" host="ip-172-31-21-122" Feb 9 18:55:39.078206 env[1643]: 2024-02-09 18:55:38.783 [INFO][4519] ipam.go 1682: Creating new handle: k8s-pod-network.e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610 Feb 9 18:55:39.078206 env[1643]: 2024-02-09 18:55:38.874 [INFO][4519] ipam.go 1203: Writing block in order to claim IPs block=192.168.4.64/26 handle="k8s-pod-network.e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610" host="ip-172-31-21-122" Feb 9 18:55:39.078206 env[1643]: 2024-02-09 18:55:38.883 [INFO][4519] ipam.go 1216: Successfully claimed IPs: [192.168.4.67/26] block=192.168.4.64/26 handle="k8s-pod-network.e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610" host="ip-172-31-21-122" Feb 9 18:55:39.078206 env[1643]: 2024-02-09 18:55:38.883 [INFO][4519] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.4.67/26] handle="k8s-pod-network.e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610" host="ip-172-31-21-122" Feb 9 18:55:39.078206 env[1643]: 2024-02-09 18:55:38.884 [INFO][4519] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:55:39.078206 env[1643]: 2024-02-09 18:55:38.884 [INFO][4519] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.4.67/26] IPv6=[] ContainerID="e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610" HandleID="k8s-pod-network.e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610" Workload="ip--172--31--21--122-k8s-coredns--5d78c9869d--dlpjk-eth0" Feb 9 18:55:39.077409 systemd-networkd[1462]: cali6d50083869b: Gained IPv6LL Feb 9 18:55:39.080855 env[1643]: 2024-02-09 18:55:38.996 [INFO][4506] k8s.go 385: Populated endpoint ContainerID="e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610" Namespace="kube-system" Pod="coredns-5d78c9869d-dlpjk" WorkloadEndpoint="ip--172--31--21--122-k8s-coredns--5d78c9869d--dlpjk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--122-k8s-coredns--5d78c9869d--dlpjk-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"f00550ab-7b86-4c71-87d5-934dcf889278", ResourceVersion:"773", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 55, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-122", ContainerID:"", Pod:"coredns-5d78c9869d-dlpjk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.4.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliae75473e4f2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:55:39.080855 env[1643]: 2024-02-09 18:55:38.996 [INFO][4506] k8s.go 386: Calico CNI using IPs: [192.168.4.67/32] ContainerID="e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610" Namespace="kube-system" Pod="coredns-5d78c9869d-dlpjk" WorkloadEndpoint="ip--172--31--21--122-k8s-coredns--5d78c9869d--dlpjk-eth0" Feb 9 18:55:39.080855 env[1643]: 2024-02-09 18:55:38.996 [INFO][4506] dataplane_linux.go 68: Setting the host side veth name to caliae75473e4f2 ContainerID="e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610" Namespace="kube-system" Pod="coredns-5d78c9869d-dlpjk" WorkloadEndpoint="ip--172--31--21--122-k8s-coredns--5d78c9869d--dlpjk-eth0" Feb 9 18:55:39.080855 env[1643]: 2024-02-09 18:55:39.034 [INFO][4506] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610" Namespace="kube-system" Pod="coredns-5d78c9869d-dlpjk" WorkloadEndpoint="ip--172--31--21--122-k8s-coredns--5d78c9869d--dlpjk-eth0" Feb 9 18:55:39.080855 env[1643]: 2024-02-09 18:55:39.034 [INFO][4506] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610" Namespace="kube-system" Pod="coredns-5d78c9869d-dlpjk" WorkloadEndpoint="ip--172--31--21--122-k8s-coredns--5d78c9869d--dlpjk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--122-k8s-coredns--5d78c9869d--dlpjk-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"f00550ab-7b86-4c71-87d5-934dcf889278", ResourceVersion:"773", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 55, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-122", ContainerID:"e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610", Pod:"coredns-5d78c9869d-dlpjk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.4.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliae75473e4f2", MAC:"ea:e4:54:a0:9a:4d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:55:39.080855 env[1643]: 2024-02-09 18:55:39.074 [INFO][4506] k8s.go 491: Wrote updated endpoint to datastore ContainerID="e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610" Namespace="kube-system" Pod="coredns-5d78c9869d-dlpjk" WorkloadEndpoint="ip--172--31--21--122-k8s-coredns--5d78c9869d--dlpjk-eth0" Feb 9 18:55:39.258244 env[1643]: time="2024-02-09T18:55:39.247449445Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:55:39.258244 env[1643]: time="2024-02-09T18:55:39.247505058Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:55:39.258244 env[1643]: time="2024-02-09T18:55:39.247521659Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:55:39.258244 env[1643]: time="2024-02-09T18:55:39.247846028Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610 pid=4565 runtime=io.containerd.runc.v2 Feb 9 18:55:39.273883 systemd[1]: Started cri-containerd-e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610.scope. Feb 9 18:55:39.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.303000 audit: BPF prog-id=181 op=LOAD Feb 9 18:55:39.304000 audit[4573]: AVC avc: denied { bpf } for pid=4573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.304000 audit[4573]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4565 pid=4573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:39.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531323962643162326431366538356664336361353164643430323433 Feb 9 18:55:39.304000 audit[4573]: AVC avc: denied { perfmon } for pid=4573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.304000 audit[4573]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4565 pid=4573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:39.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531323962643162326431366538356664336361353164643430323433 Feb 9 18:55:39.304000 audit[4573]: AVC avc: denied { bpf } for pid=4573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.304000 audit[4573]: AVC avc: denied { bpf } for pid=4573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.304000 audit[4573]: AVC avc: denied { bpf } for pid=4573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.304000 audit[4573]: AVC avc: denied { perfmon } for pid=4573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.304000 audit[4573]: AVC avc: denied { perfmon } for pid=4573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.304000 audit[4573]: AVC avc: denied { perfmon } for pid=4573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.304000 audit[4573]: AVC avc: denied { perfmon } for pid=4573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.304000 audit[4573]: AVC avc: denied { perfmon } for pid=4573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.304000 audit[4573]: AVC avc: denied { bpf } for pid=4573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.304000 audit[4573]: AVC avc: denied { bpf } for pid=4573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.304000 audit: BPF prog-id=182 op=LOAD Feb 9 18:55:39.304000 audit[4573]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003b0a00 items=0 ppid=4565 pid=4573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:39.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531323962643162326431366538356664336361353164643430323433 Feb 9 18:55:39.305000 audit[4573]: AVC avc: denied { bpf } for pid=4573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.305000 audit[4573]: AVC avc: denied { bpf } for pid=4573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.305000 audit[4573]: AVC avc: denied { perfmon } for pid=4573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.305000 audit[4573]: AVC avc: denied { perfmon } for pid=4573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.305000 audit[4573]: AVC avc: denied { perfmon } for pid=4573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.305000 audit[4573]: AVC avc: denied { perfmon } for pid=4573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.305000 audit[4573]: AVC avc: denied { perfmon } for pid=4573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.305000 audit[4573]: AVC avc: denied { bpf } for pid=4573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.305000 audit[4573]: AVC avc: denied { bpf } for pid=4573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.305000 audit: BPF prog-id=183 op=LOAD Feb 9 18:55:39.305000 audit[4573]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003b0a48 items=0 ppid=4565 pid=4573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:39.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531323962643162326431366538356664336361353164643430323433 Feb 9 18:55:39.306000 audit: BPF prog-id=183 op=UNLOAD Feb 9 18:55:39.306000 audit: BPF prog-id=182 op=UNLOAD Feb 9 18:55:39.306000 audit[4573]: AVC avc: denied { bpf } for pid=4573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.306000 audit[4573]: AVC avc: denied { bpf } for pid=4573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.306000 audit[4573]: AVC avc: denied { bpf } for pid=4573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.306000 audit[4573]: AVC avc: denied { perfmon } for pid=4573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.306000 audit[4573]: AVC avc: denied { perfmon } for pid=4573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.306000 audit[4573]: AVC avc: denied { perfmon } for pid=4573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.306000 audit[4573]: AVC avc: denied { perfmon } for pid=4573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.306000 audit[4573]: AVC avc: denied { perfmon } for pid=4573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.306000 audit[4573]: AVC avc: denied { bpf } for pid=4573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.306000 audit[4573]: AVC avc: denied { bpf } for pid=4573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.306000 audit: BPF prog-id=184 op=LOAD Feb 9 18:55:39.306000 audit[4573]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b0e58 items=0 ppid=4565 pid=4573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:39.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531323962643162326431366538356664336361353164643430323433 Feb 9 18:55:39.345986 env[1643]: time="2024-02-09T18:55:39.345795546Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-dlpjk,Uid:f00550ab-7b86-4c71-87d5-934dcf889278,Namespace:kube-system,Attempt:1,} returns sandbox id \"e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610\"" Feb 9 18:55:39.355036 env[1643]: time="2024-02-09T18:55:39.354991864Z" level=info msg="CreateContainer within sandbox \"e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 18:55:39.408468 env[1643]: time="2024-02-09T18:55:39.408394635Z" level=info msg="CreateContainer within sandbox \"e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"8e08c766de5ea8d4d33aef6fd179619ccb84b451c8ba7649a1edb5e2391aade5\"" Feb 9 18:55:39.414503 env[1643]: time="2024-02-09T18:55:39.409341500Z" level=info msg="StartContainer for \"8e08c766de5ea8d4d33aef6fd179619ccb84b451c8ba7649a1edb5e2391aade5\"" Feb 9 18:55:39.436056 systemd[1]: Started cri-containerd-8e08c766de5ea8d4d33aef6fd179619ccb84b451c8ba7649a1edb5e2391aade5.scope. Feb 9 18:55:39.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.462000 audit: BPF prog-id=185 op=LOAD Feb 9 18:55:39.463000 audit[4607]: AVC avc: denied { bpf } for pid=4607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.463000 audit[4607]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4565 pid=4607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:39.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865303863373636646535656138643464333361656636666431373936 Feb 9 18:55:39.463000 audit[4607]: AVC avc: denied { perfmon } for pid=4607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.463000 audit[4607]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=4565 pid=4607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:39.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865303863373636646535656138643464333361656636666431373936 Feb 9 18:55:39.463000 audit[4607]: AVC avc: denied { bpf } for pid=4607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.463000 audit[4607]: AVC avc: denied { bpf } for pid=4607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.463000 audit[4607]: AVC avc: denied { bpf } for pid=4607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.463000 audit[4607]: AVC avc: denied { perfmon } for pid=4607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.463000 audit[4607]: AVC avc: denied { perfmon } for pid=4607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.463000 audit[4607]: AVC avc: denied { perfmon } for pid=4607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.463000 audit[4607]: AVC avc: denied { perfmon } for pid=4607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.463000 audit[4607]: AVC avc: denied { perfmon } for pid=4607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.463000 audit[4607]: AVC avc: denied { bpf } for pid=4607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.463000 audit[4607]: AVC avc: denied { bpf } for pid=4607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.463000 audit: BPF prog-id=186 op=LOAD Feb 9 18:55:39.463000 audit[4607]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000333910 items=0 ppid=4565 pid=4607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:39.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865303863373636646535656138643464333361656636666431373936 Feb 9 18:55:39.463000 audit[4607]: AVC avc: denied { bpf } for pid=4607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.463000 audit[4607]: AVC avc: denied { bpf } for pid=4607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.463000 audit[4607]: AVC avc: denied { perfmon } for pid=4607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.463000 audit[4607]: AVC avc: denied { perfmon } for pid=4607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.463000 audit[4607]: AVC avc: denied { perfmon } for pid=4607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.463000 audit[4607]: AVC avc: denied { perfmon } for pid=4607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.463000 audit[4607]: AVC avc: denied { perfmon } for pid=4607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.463000 audit[4607]: AVC avc: denied { bpf } for pid=4607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.463000 audit[4607]: AVC avc: denied { bpf } for pid=4607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.463000 audit: BPF prog-id=187 op=LOAD Feb 9 18:55:39.463000 audit[4607]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000333958 items=0 ppid=4565 pid=4607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:39.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865303863373636646535656138643464333361656636666431373936 Feb 9 18:55:39.464000 audit: BPF prog-id=187 op=UNLOAD Feb 9 18:55:39.464000 audit: BPF prog-id=186 op=UNLOAD Feb 9 18:55:39.464000 audit[4607]: AVC avc: denied { bpf } for pid=4607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.464000 audit[4607]: AVC avc: denied { bpf } for pid=4607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.464000 audit[4607]: AVC avc: denied { bpf } for pid=4607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.464000 audit[4607]: AVC avc: denied { perfmon } for pid=4607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.464000 audit[4607]: AVC avc: denied { perfmon } for pid=4607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.464000 audit[4607]: AVC avc: denied { perfmon } for pid=4607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.464000 audit[4607]: AVC avc: denied { perfmon } for pid=4607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.464000 audit[4607]: AVC avc: denied { perfmon } for pid=4607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.464000 audit[4607]: AVC avc: denied { bpf } for pid=4607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.464000 audit[4607]: AVC avc: denied { bpf } for pid=4607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:39.464000 audit: BPF prog-id=188 op=LOAD Feb 9 18:55:39.464000 audit[4607]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000333d68 items=0 ppid=4565 pid=4607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:39.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865303863373636646535656138643464333361656636666431373936 Feb 9 18:55:39.500953 env[1643]: time="2024-02-09T18:55:39.500895748Z" level=info msg="StartContainer for \"8e08c766de5ea8d4d33aef6fd179619ccb84b451c8ba7649a1edb5e2391aade5\" returns successfully" Feb 9 18:55:39.768614 kubelet[2665]: I0209 18:55:39.760004 2665 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-dlpjk" podStartSLOduration=36.759848772 podCreationTimestamp="2024-02-09 18:55:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:55:39.757274606 +0000 UTC m=+48.558264520" watchObservedRunningTime="2024-02-09 18:55:39.759848772 +0000 UTC m=+48.560838686" Feb 9 18:55:39.867934 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount52639598.mount: Deactivated successfully. Feb 9 18:55:39.893000 audit[4639]: NETFILTER_CFG table=filter:105 family=2 entries=13 op=nft_register_rule pid=4639 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:39.893000 audit[4639]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffecd157140 a2=0 a3=7ffecd15712c items=0 ppid=2987 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:39.893000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:39.896000 audit[4639]: NETFILTER_CFG table=nat:106 family=2 entries=33 op=nft_register_chain pid=4639 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:39.896000 audit[4639]: SYSCALL arch=c000003e syscall=46 success=yes exit=13060 a0=3 a1=7ffecd157140 a2=0 a3=7ffecd15712c items=0 ppid=2987 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:39.896000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:39.937000 audit[4642]: NETFILTER_CFG table=filter:107 family=2 entries=10 op=nft_register_rule pid=4642 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:39.937000 audit[4642]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fff2587eb90 a2=0 a3=7fff2587eb7c items=0 ppid=2987 pid=4642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:39.937000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:39.951000 audit[4642]: NETFILTER_CFG table=nat:108 family=2 entries=54 op=nft_register_chain pid=4642 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:39.951000 audit[4642]: SYSCALL arch=c000003e syscall=46 success=yes exit=18724 a0=3 a1=7fff2587eb90 a2=0 a3=7fff2587eb7c items=0 ppid=2987 pid=4642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:39.951000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:40.740422 systemd-networkd[1462]: caliae75473e4f2: Gained IPv6LL Feb 9 18:55:41.353662 env[1643]: time="2024-02-09T18:55:41.353624890Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:41.357637 env[1643]: time="2024-02-09T18:55:41.357599296Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:41.360859 env[1643]: time="2024-02-09T18:55:41.360821826Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:41.364865 env[1643]: time="2024-02-09T18:55:41.364827009Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:41.366311 env[1643]: time="2024-02-09T18:55:41.365346148Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 9 18:55:41.396925 env[1643]: time="2024-02-09T18:55:41.396881000Z" level=info msg="StopPodSandbox for \"3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82\"" Feb 9 18:55:41.402716 env[1643]: time="2024-02-09T18:55:41.402677161Z" level=info msg="CreateContainer within sandbox \"d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 18:55:41.442387 env[1643]: time="2024-02-09T18:55:41.442265782Z" level=info msg="CreateContainer within sandbox \"d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"23c72766c2e2c89c8218b08fae13b3a9fa653d707a922e89f1dc978905066c8c\"" Feb 9 18:55:41.444136 env[1643]: time="2024-02-09T18:55:41.443645714Z" level=info msg="StartContainer for \"23c72766c2e2c89c8218b08fae13b3a9fa653d707a922e89f1dc978905066c8c\"" Feb 9 18:55:41.515954 systemd[1]: Started cri-containerd-23c72766c2e2c89c8218b08fae13b3a9fa653d707a922e89f1dc978905066c8c.scope. Feb 9 18:55:41.573534 kubelet[2665]: I0209 18:55:41.573393 2665 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 18:55:41.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.653000 audit: BPF prog-id=189 op=LOAD Feb 9 18:55:41.656000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.656000 audit[4694]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4286 pid=4694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:41.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233633732373636633265326338396338323138623038666165313362 Feb 9 18:55:41.656000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.656000 audit[4694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4286 pid=4694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:41.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233633732373636633265326338396338323138623038666165313362 Feb 9 18:55:41.657000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.657000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.657000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.657000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.657000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.657000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.657000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.657000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.657000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.657000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.657000 audit: BPF prog-id=190 op=LOAD Feb 9 18:55:41.657000 audit[4694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002bfee0 items=0 ppid=4286 pid=4694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:41.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233633732373636633265326338396338323138623038666165313362 Feb 9 18:55:41.661000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.661000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.661000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.661000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.661000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.661000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.661000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.661000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.661000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.661000 audit: BPF prog-id=191 op=LOAD Feb 9 18:55:41.661000 audit[4694]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002bff28 items=0 ppid=4286 pid=4694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:41.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233633732373636633265326338396338323138623038666165313362 Feb 9 18:55:41.663000 audit: BPF prog-id=191 op=UNLOAD Feb 9 18:55:41.663000 audit: BPF prog-id=190 op=UNLOAD Feb 9 18:55:41.663000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.663000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.663000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.663000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.663000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.663000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.663000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.663000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.663000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.663000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:41.663000 audit: BPF prog-id=192 op=LOAD Feb 9 18:55:41.663000 audit[4694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00039c338 items=0 ppid=4286 pid=4694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:41.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233633732373636633265326338396338323138623038666165313362 Feb 9 18:55:41.760465 env[1643]: 2024-02-09 18:55:41.568 [INFO][4681] k8s.go 578: Cleaning up netns ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" Feb 9 18:55:41.760465 env[1643]: 2024-02-09 18:55:41.568 [INFO][4681] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" iface="eth0" netns="/var/run/netns/cni-4c8873a7-2a56-f3c5-874c-e1d9d913a6e3" Feb 9 18:55:41.760465 env[1643]: 2024-02-09 18:55:41.569 [INFO][4681] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" iface="eth0" netns="/var/run/netns/cni-4c8873a7-2a56-f3c5-874c-e1d9d913a6e3" Feb 9 18:55:41.760465 env[1643]: 2024-02-09 18:55:41.569 [INFO][4681] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" iface="eth0" netns="/var/run/netns/cni-4c8873a7-2a56-f3c5-874c-e1d9d913a6e3" Feb 9 18:55:41.760465 env[1643]: 2024-02-09 18:55:41.569 [INFO][4681] k8s.go 585: Releasing IP address(es) ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" Feb 9 18:55:41.760465 env[1643]: 2024-02-09 18:55:41.569 [INFO][4681] utils.go 188: Calico CNI releasing IP address ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" Feb 9 18:55:41.760465 env[1643]: 2024-02-09 18:55:41.723 [INFO][4707] ipam_plugin.go 415: Releasing address using handleID ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" HandleID="k8s-pod-network.3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" Workload="ip--172--31--21--122-k8s-csi--node--driver--jkc2m-eth0" Feb 9 18:55:41.760465 env[1643]: 2024-02-09 18:55:41.723 [INFO][4707] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:55:41.760465 env[1643]: 2024-02-09 18:55:41.723 [INFO][4707] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:55:41.760465 env[1643]: 2024-02-09 18:55:41.745 [WARNING][4707] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" HandleID="k8s-pod-network.3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" Workload="ip--172--31--21--122-k8s-csi--node--driver--jkc2m-eth0" Feb 9 18:55:41.760465 env[1643]: 2024-02-09 18:55:41.745 [INFO][4707] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" HandleID="k8s-pod-network.3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" Workload="ip--172--31--21--122-k8s-csi--node--driver--jkc2m-eth0" Feb 9 18:55:41.760465 env[1643]: 2024-02-09 18:55:41.755 [INFO][4707] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:55:41.760465 env[1643]: 2024-02-09 18:55:41.757 [INFO][4681] k8s.go 591: Teardown processing complete. ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" Feb 9 18:55:41.762680 env[1643]: time="2024-02-09T18:55:41.761401876Z" level=info msg="TearDown network for sandbox \"3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82\" successfully" Feb 9 18:55:41.762680 env[1643]: time="2024-02-09T18:55:41.761453120Z" level=info msg="StopPodSandbox for \"3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82\" returns successfully" Feb 9 18:55:41.762945 env[1643]: time="2024-02-09T18:55:41.762915444Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jkc2m,Uid:ee2f0cc0-a899-413e-bc32-44614edc0669,Namespace:calico-system,Attempt:1,}" Feb 9 18:55:41.857496 env[1643]: time="2024-02-09T18:55:41.857437932Z" level=info msg="StartContainer for \"23c72766c2e2c89c8218b08fae13b3a9fa653d707a922e89f1dc978905066c8c\" returns successfully" Feb 9 18:55:42.153472 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:55:42.153614 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali80dc81287cd: link becomes ready Feb 9 18:55:42.151519 systemd-networkd[1462]: cali80dc81287cd: Link UP Feb 9 18:55:42.155737 systemd-networkd[1462]: cali80dc81287cd: Gained carrier Feb 9 18:55:42.191688 env[1643]: 2024-02-09 18:55:41.932 [INFO][4751] utils.go 100: File /var/lib/calico/mtu does not exist Feb 9 18:55:42.191688 env[1643]: 2024-02-09 18:55:41.954 [INFO][4751] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--122-k8s-csi--node--driver--jkc2m-eth0 csi-node-driver- calico-system ee2f0cc0-a899-413e-bc32-44614edc0669 806 0 2024-02-09 18:55:10 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ip-172-31-21-122 csi-node-driver-jkc2m eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali80dc81287cd [] []}} ContainerID="6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79" Namespace="calico-system" Pod="csi-node-driver-jkc2m" WorkloadEndpoint="ip--172--31--21--122-k8s-csi--node--driver--jkc2m-" Feb 9 18:55:42.191688 env[1643]: 2024-02-09 18:55:41.955 [INFO][4751] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79" Namespace="calico-system" Pod="csi-node-driver-jkc2m" WorkloadEndpoint="ip--172--31--21--122-k8s-csi--node--driver--jkc2m-eth0" Feb 9 18:55:42.191688 env[1643]: 2024-02-09 18:55:42.064 [INFO][4773] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79" HandleID="k8s-pod-network.6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79" Workload="ip--172--31--21--122-k8s-csi--node--driver--jkc2m-eth0" Feb 9 18:55:42.191688 env[1643]: 2024-02-09 18:55:42.089 [INFO][4773] ipam_plugin.go 268: Auto assigning IP ContainerID="6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79" HandleID="k8s-pod-network.6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79" Workload="ip--172--31--21--122-k8s-csi--node--driver--jkc2m-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002a1440), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-21-122", "pod":"csi-node-driver-jkc2m", "timestamp":"2024-02-09 18:55:42.06477043 +0000 UTC"}, Hostname:"ip-172-31-21-122", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:55:42.191688 env[1643]: 2024-02-09 18:55:42.089 [INFO][4773] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:55:42.191688 env[1643]: 2024-02-09 18:55:42.089 [INFO][4773] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:55:42.191688 env[1643]: 2024-02-09 18:55:42.089 [INFO][4773] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-122' Feb 9 18:55:42.191688 env[1643]: 2024-02-09 18:55:42.094 [INFO][4773] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79" host="ip-172-31-21-122" Feb 9 18:55:42.191688 env[1643]: 2024-02-09 18:55:42.102 [INFO][4773] ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-122" Feb 9 18:55:42.191688 env[1643]: 2024-02-09 18:55:42.111 [INFO][4773] ipam.go 489: Trying affinity for 192.168.4.64/26 host="ip-172-31-21-122" Feb 9 18:55:42.191688 env[1643]: 2024-02-09 18:55:42.114 [INFO][4773] ipam.go 155: Attempting to load block cidr=192.168.4.64/26 host="ip-172-31-21-122" Feb 9 18:55:42.191688 env[1643]: 2024-02-09 18:55:42.118 [INFO][4773] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.4.64/26 host="ip-172-31-21-122" Feb 9 18:55:42.191688 env[1643]: 2024-02-09 18:55:42.118 [INFO][4773] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.4.64/26 handle="k8s-pod-network.6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79" host="ip-172-31-21-122" Feb 9 18:55:42.191688 env[1643]: 2024-02-09 18:55:42.121 [INFO][4773] ipam.go 1682: Creating new handle: k8s-pod-network.6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79 Feb 9 18:55:42.191688 env[1643]: 2024-02-09 18:55:42.126 [INFO][4773] ipam.go 1203: Writing block in order to claim IPs block=192.168.4.64/26 handle="k8s-pod-network.6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79" host="ip-172-31-21-122" Feb 9 18:55:42.191688 env[1643]: 2024-02-09 18:55:42.135 [INFO][4773] ipam.go 1216: Successfully claimed IPs: [192.168.4.68/26] block=192.168.4.64/26 handle="k8s-pod-network.6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79" host="ip-172-31-21-122" Feb 9 18:55:42.191688 env[1643]: 2024-02-09 18:55:42.135 [INFO][4773] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.4.68/26] handle="k8s-pod-network.6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79" host="ip-172-31-21-122" Feb 9 18:55:42.191688 env[1643]: 2024-02-09 18:55:42.136 [INFO][4773] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:55:42.191688 env[1643]: 2024-02-09 18:55:42.136 [INFO][4773] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.4.68/26] IPv6=[] ContainerID="6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79" HandleID="k8s-pod-network.6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79" Workload="ip--172--31--21--122-k8s-csi--node--driver--jkc2m-eth0" Feb 9 18:55:42.192930 env[1643]: 2024-02-09 18:55:42.138 [INFO][4751] k8s.go 385: Populated endpoint ContainerID="6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79" Namespace="calico-system" Pod="csi-node-driver-jkc2m" WorkloadEndpoint="ip--172--31--21--122-k8s-csi--node--driver--jkc2m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--122-k8s-csi--node--driver--jkc2m-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ee2f0cc0-a899-413e-bc32-44614edc0669", ResourceVersion:"806", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 55, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-122", ContainerID:"", Pod:"csi-node-driver-jkc2m", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.4.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali80dc81287cd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:55:42.192930 env[1643]: 2024-02-09 18:55:42.139 [INFO][4751] k8s.go 386: Calico CNI using IPs: [192.168.4.68/32] ContainerID="6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79" Namespace="calico-system" Pod="csi-node-driver-jkc2m" WorkloadEndpoint="ip--172--31--21--122-k8s-csi--node--driver--jkc2m-eth0" Feb 9 18:55:42.192930 env[1643]: 2024-02-09 18:55:42.139 [INFO][4751] dataplane_linux.go 68: Setting the host side veth name to cali80dc81287cd ContainerID="6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79" Namespace="calico-system" Pod="csi-node-driver-jkc2m" WorkloadEndpoint="ip--172--31--21--122-k8s-csi--node--driver--jkc2m-eth0" Feb 9 18:55:42.192930 env[1643]: 2024-02-09 18:55:42.157 [INFO][4751] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79" Namespace="calico-system" Pod="csi-node-driver-jkc2m" WorkloadEndpoint="ip--172--31--21--122-k8s-csi--node--driver--jkc2m-eth0" Feb 9 18:55:42.192930 env[1643]: 2024-02-09 18:55:42.160 [INFO][4751] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79" Namespace="calico-system" Pod="csi-node-driver-jkc2m" WorkloadEndpoint="ip--172--31--21--122-k8s-csi--node--driver--jkc2m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--122-k8s-csi--node--driver--jkc2m-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ee2f0cc0-a899-413e-bc32-44614edc0669", ResourceVersion:"806", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 55, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-122", ContainerID:"6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79", Pod:"csi-node-driver-jkc2m", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.4.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali80dc81287cd", MAC:"ea:96:52:52:d8:29", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:55:42.192930 env[1643]: 2024-02-09 18:55:42.189 [INFO][4751] k8s.go 491: Wrote updated endpoint to datastore ContainerID="6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79" Namespace="calico-system" Pod="csi-node-driver-jkc2m" WorkloadEndpoint="ip--172--31--21--122-k8s-csi--node--driver--jkc2m-eth0" Feb 9 18:55:42.220659 env[1643]: time="2024-02-09T18:55:42.220566985Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:55:42.220659 env[1643]: time="2024-02-09T18:55:42.220612678Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:55:42.221103 env[1643]: time="2024-02-09T18:55:42.220645049Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:55:42.221205 env[1643]: time="2024-02-09T18:55:42.221149719Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79 pid=4804 runtime=io.containerd.runc.v2 Feb 9 18:55:42.260201 systemd[1]: Started cri-containerd-6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79.scope. Feb 9 18:55:42.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.353000 audit: BPF prog-id=193 op=LOAD Feb 9 18:55:42.354000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.354000 audit[4814]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4804 pid=4814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:42.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666353561633432653365376238383630656236303164366236333236 Feb 9 18:55:42.354000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.354000 audit[4814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4804 pid=4814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:42.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666353561633432653365376238383630656236303164366236333236 Feb 9 18:55:42.354000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.354000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.354000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.354000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.354000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.354000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.354000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.354000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.354000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.354000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.354000 audit: BPF prog-id=194 op=LOAD Feb 9 18:55:42.354000 audit[4814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00015f4e0 items=0 ppid=4804 pid=4814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:42.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666353561633432653365376238383630656236303164366236333236 Feb 9 18:55:42.355000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.355000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.355000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.355000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.355000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.355000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.355000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.355000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.355000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.355000 audit: BPF prog-id=195 op=LOAD Feb 9 18:55:42.355000 audit[4814]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00015f528 items=0 ppid=4804 pid=4814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:42.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666353561633432653365376238383630656236303164366236333236 Feb 9 18:55:42.355000 audit: BPF prog-id=195 op=UNLOAD Feb 9 18:55:42.355000 audit: BPF prog-id=194 op=UNLOAD Feb 9 18:55:42.355000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.355000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.355000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.355000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.355000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.355000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.355000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.355000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.355000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.355000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.355000 audit: BPF prog-id=196 op=LOAD Feb 9 18:55:42.355000 audit[4814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00015f938 items=0 ppid=4804 pid=4814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:42.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666353561633432653365376238383630656236303164366236333236 Feb 9 18:55:42.389802 systemd[1]: run-netns-cni\x2d4c8873a7\x2d2a56\x2df3c5\x2d874c\x2de1d9d913a6e3.mount: Deactivated successfully. Feb 9 18:55:42.400234 env[1643]: time="2024-02-09T18:55:42.400187396Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jkc2m,Uid:ee2f0cc0-a899-413e-bc32-44614edc0669,Namespace:calico-system,Attempt:1,} returns sandbox id \"6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79\"" Feb 9 18:55:42.402953 env[1643]: time="2024-02-09T18:55:42.402915209Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 18:55:42.887770 kubelet[2665]: I0209 18:55:42.887721 2665 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7776c55fc5-xj6tw" podStartSLOduration=27.760830517 podCreationTimestamp="2024-02-09 18:55:11 +0000 UTC" firstStartedPulling="2024-02-09 18:55:37.240130534 +0000 UTC m=+46.041120439" lastFinishedPulling="2024-02-09 18:55:41.366948745 +0000 UTC m=+50.167938651" observedRunningTime="2024-02-09 18:55:42.776749274 +0000 UTC m=+51.577739190" watchObservedRunningTime="2024-02-09 18:55:42.887648729 +0000 UTC m=+51.688638642" Feb 9 18:55:43.585803 systemd-networkd[1462]: cali80dc81287cd: Gained IPv6LL Feb 9 18:55:43.983613 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3005607528.mount: Deactivated successfully. Feb 9 18:55:44.055639 amazon-ssm-agent[1665]: 2024-02-09 18:55:44 INFO [HealthCheck] HealthCheck reporting agent health. Feb 9 18:55:44.552141 kubelet[2665]: I0209 18:55:44.551101 2665 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 18:55:44.742940 env[1643]: time="2024-02-09T18:55:44.742855524Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:44.746495 env[1643]: time="2024-02-09T18:55:44.746454794Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:44.749411 env[1643]: time="2024-02-09T18:55:44.749364190Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:44.753193 env[1643]: time="2024-02-09T18:55:44.753160478Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:44.753847 env[1643]: time="2024-02-09T18:55:44.753818541Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 18:55:44.759776 env[1643]: time="2024-02-09T18:55:44.759465854Z" level=info msg="CreateContainer within sandbox \"6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 18:55:44.777239 kernel: kauditd_printk_skb: 350 callbacks suppressed Feb 9 18:55:44.777510 kernel: audit: type=1325 audit(1707504944.770:1407): table=filter:109 family=2 entries=9 op=nft_register_rule pid=4910 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:44.770000 audit[4910]: NETFILTER_CFG table=filter:109 family=2 entries=9 op=nft_register_rule pid=4910 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:44.770000 audit[4910]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fffe65d01b0 a2=0 a3=7fffe65d019c items=0 ppid=2987 pid=4910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:44.792391 kernel: audit: type=1300 audit(1707504944.770:1407): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fffe65d01b0 a2=0 a3=7fffe65d019c items=0 ppid=2987 pid=4910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:44.770000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:44.800987 env[1643]: time="2024-02-09T18:55:44.798131344Z" level=info msg="CreateContainer within sandbox \"6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"6222dd664521a4bf0ef4c820656176cfaa597ced1feeb4b0660d8b783620548c\"" Feb 9 18:55:44.801320 kernel: audit: type=1327 audit(1707504944.770:1407): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:44.795000 audit[4910]: NETFILTER_CFG table=nat:110 family=2 entries=25 op=nft_register_chain pid=4910 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:44.807184 env[1643]: time="2024-02-09T18:55:44.804456682Z" level=info msg="StartContainer for \"6222dd664521a4bf0ef4c820656176cfaa597ced1feeb4b0660d8b783620548c\"" Feb 9 18:55:44.807394 kernel: audit: type=1325 audit(1707504944.795:1408): table=nat:110 family=2 entries=25 op=nft_register_chain pid=4910 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:55:44.795000 audit[4910]: SYSCALL arch=c000003e syscall=46 success=yes exit=8252 a0=3 a1=7fffe65d01b0 a2=0 a3=7fffe65d019c items=0 ppid=2987 pid=4910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:44.817448 kernel: audit: type=1300 audit(1707504944.795:1408): arch=c000003e syscall=46 success=yes exit=8252 a0=3 a1=7fffe65d01b0 a2=0 a3=7fffe65d019c items=0 ppid=2987 pid=4910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:44.808497 systemd[1]: Started sshd@8-172.31.21.122:22-139.178.68.195:35112.service. Feb 9 18:55:44.795000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:44.822565 kernel: audit: type=1327 audit(1707504944.795:1408): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:55:44.833487 kernel: audit: type=1130 audit(1707504944.806:1409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.21.122:22-139.178.68.195:35112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:44.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.21.122:22-139.178.68.195:35112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:44.875414 systemd[1]: Started cri-containerd-6222dd664521a4bf0ef4c820656176cfaa597ced1feeb4b0660d8b783620548c.scope. Feb 9 18:55:44.908000 audit[4923]: AVC avc: denied { perfmon } for pid=4923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.917316 kernel: audit: type=1400 audit(1707504944.908:1410): avc: denied { perfmon } for pid=4923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.908000 audit[4923]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4804 pid=4923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:44.927359 kernel: audit: type=1300 audit(1707504944.908:1410): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4804 pid=4923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:44.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632323264643636343532316134626630656634633832303635363137 Feb 9 18:55:44.940337 kernel: audit: type=1327 audit(1707504944.908:1410): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632323264643636343532316134626630656634633832303635363137 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { bpf } for pid=4923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { bpf } for pid=4923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { bpf } for pid=4923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { perfmon } for pid=4923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { perfmon } for pid=4923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { perfmon } for pid=4923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { perfmon } for pid=4923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { perfmon } for pid=4923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { bpf } for pid=4923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { bpf } for pid=4923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit: BPF prog-id=197 op=LOAD Feb 9 18:55:44.925000 audit[4923]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b5a60 items=0 ppid=4804 pid=4923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:44.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632323264643636343532316134626630656634633832303635363137 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { bpf } for pid=4923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { bpf } for pid=4923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { perfmon } for pid=4923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { perfmon } for pid=4923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { perfmon } for pid=4923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { perfmon } for pid=4923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { perfmon } for pid=4923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { bpf } for pid=4923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { bpf } for pid=4923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit: BPF prog-id=198 op=LOAD Feb 9 18:55:44.925000 audit[4923]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b5aa8 items=0 ppid=4804 pid=4923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:44.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632323264643636343532316134626630656634633832303635363137 Feb 9 18:55:44.925000 audit: BPF prog-id=198 op=UNLOAD Feb 9 18:55:44.925000 audit: BPF prog-id=197 op=UNLOAD Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { bpf } for pid=4923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { bpf } for pid=4923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { bpf } for pid=4923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { perfmon } for pid=4923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { perfmon } for pid=4923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { perfmon } for pid=4923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { perfmon } for pid=4923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { perfmon } for pid=4923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { bpf } for pid=4923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit[4923]: AVC avc: denied { bpf } for pid=4923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:44.925000 audit: BPF prog-id=199 op=LOAD Feb 9 18:55:44.925000 audit[4923]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b5b38 items=0 ppid=4804 pid=4923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:44.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632323264643636343532316134626630656634633832303635363137 Feb 9 18:55:45.055229 env[1643]: time="2024-02-09T18:55:45.054989884Z" level=info msg="StartContainer for \"6222dd664521a4bf0ef4c820656176cfaa597ced1feeb4b0660d8b783620548c\" returns successfully" Feb 9 18:55:45.063542 env[1643]: time="2024-02-09T18:55:45.058545364Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 18:55:45.078000 audit[4914]: USER_ACCT pid=4914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:45.081000 audit[4914]: CRED_ACQ pid=4914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:45.081000 audit[4914]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd58f38f40 a2=3 a3=0 items=0 ppid=1 pid=4914 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:45.081000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:55:45.083922 sshd[4914]: Accepted publickey for core from 139.178.68.195 port 35112 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:55:45.085267 sshd[4914]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:55:45.105594 systemd[1]: Started session-8.scope. Feb 9 18:55:45.108512 systemd-logind[1633]: New session 8 of user core. Feb 9 18:55:45.118000 audit[4914]: USER_START pid=4914 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:45.121000 audit[4954]: CRED_ACQ pid=4954 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:45.809945 sshd[4914]: pam_unix(sshd:session): session closed for user core Feb 9 18:55:45.810000 audit[4914]: USER_END pid=4914 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:45.810000 audit[4914]: CRED_DISP pid=4914 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:45.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.21.122:22-139.178.68.195:35112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:45.813465 systemd[1]: sshd@8-172.31.21.122:22-139.178.68.195:35112.service: Deactivated successfully. Feb 9 18:55:45.815790 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 18:55:45.815840 systemd-logind[1633]: Session 8 logged out. Waiting for processes to exit. Feb 9 18:55:45.817690 systemd-logind[1633]: Removed session 8. Feb 9 18:55:46.023762 (udev-worker)[5038]: Network interface NamePolicy= disabled on kernel command line. Feb 9 18:55:46.023762 (udev-worker)[5037]: Network interface NamePolicy= disabled on kernel command line. Feb 9 18:55:46.047000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.047000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.047000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.047000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.047000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.047000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.047000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.047000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.047000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.047000 audit: BPF prog-id=200 op=LOAD Feb 9 18:55:46.047000 audit[5041]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe0f20b0c0 a2=70 a3=7fe534c70000 items=0 ppid=4970 pid=5041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:46.047000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:55:46.048000 audit: BPF prog-id=200 op=UNLOAD Feb 9 18:55:46.048000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.048000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.048000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.048000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.048000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.048000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.048000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.048000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.048000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.048000 audit: BPF prog-id=201 op=LOAD Feb 9 18:55:46.048000 audit[5041]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe0f20b0c0 a2=70 a3=6e items=0 ppid=4970 pid=5041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:46.048000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:55:46.048000 audit: BPF prog-id=201 op=UNLOAD Feb 9 18:55:46.048000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.048000 audit[5041]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe0f20b070 a2=70 a3=7ffe0f20b0c0 items=0 ppid=4970 pid=5041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:46.048000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:55:46.048000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.048000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.048000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.048000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.048000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.048000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.048000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.048000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.048000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.048000 audit: BPF prog-id=202 op=LOAD Feb 9 18:55:46.048000 audit[5041]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffe0f20b050 a2=70 a3=7ffe0f20b0c0 items=0 ppid=4970 pid=5041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:46.048000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:55:46.048000 audit: BPF prog-id=202 op=UNLOAD Feb 9 18:55:46.048000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.048000 audit[5041]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe0f20b130 a2=70 a3=0 items=0 ppid=4970 pid=5041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:46.048000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:55:46.048000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.048000 audit[5041]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe0f20b120 a2=70 a3=0 items=0 ppid=4970 pid=5041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:46.048000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:55:46.048000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.048000 audit[5041]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffe0f20b160 a2=70 a3=0 items=0 ppid=4970 pid=5041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:46.048000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:55:46.049000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.049000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.049000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.049000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.049000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.049000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.049000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.049000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.049000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.049000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.049000 audit: BPF prog-id=203 op=LOAD Feb 9 18:55:46.049000 audit[5041]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffe0f20b080 a2=70 a3=ffffffff items=0 ppid=4970 pid=5041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:46.049000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:55:46.055000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.055000 audit[5045]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffda574e8e0 a2=70 a3=fff80800 items=0 ppid=4970 pid=5045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:46.055000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 18:55:46.056000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:46.056000 audit[5045]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffda574e7b0 a2=70 a3=3 items=0 ppid=4970 pid=5045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:46.056000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 18:55:46.067000 audit: BPF prog-id=203 op=UNLOAD Feb 9 18:55:46.067000 audit[5042]: SYSCALL arch=c000003e syscall=46 success=yes exit=397 a0=11 a1=7ffeb8f79030 a2=0 a3=55de10523ee0 items=0 ppid=1453 pid=5042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:46.067000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 18:55:46.106000 audit[2518]: AVC avc: denied { watch } for pid=2518 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:55:46.106000 audit[2518]: AVC avc: denied { watch } for pid=2518 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:55:46.106000 audit[2518]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0025102d0 a2=fc6 a3=0 items=0 ppid=2354 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 key=(null) Feb 9 18:55:46.106000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:55:46.106000 audit[2518]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ab9bc0 a2=fc6 a3=0 items=0 ppid=2354 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 key=(null) Feb 9 18:55:46.106000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:55:46.207000 audit[5065]: NETFILTER_CFG table=raw:111 family=2 entries=19 op=nft_register_chain pid=5065 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:55:46.207000 audit[5065]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffe9edfe190 a2=0 a3=7ffe9edfe17c items=0 ppid=4970 pid=5065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:46.207000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:55:46.210000 audit[5070]: NETFILTER_CFG table=mangle:112 family=2 entries=19 op=nft_register_chain pid=5070 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:55:46.210000 audit[5070]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffcb80d69d0 a2=0 a3=5636d292f000 items=0 ppid=4970 pid=5070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:46.210000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:55:46.226000 audit[5071]: NETFILTER_CFG table=nat:113 family=2 entries=16 op=nft_register_chain pid=5071 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:55:46.226000 audit[5071]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffd68537980 a2=0 a3=7ffd6853796c items=0 ppid=4970 pid=5071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:46.226000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:55:46.229000 audit[5074]: NETFILTER_CFG table=filter:114 family=2 entries=151 op=nft_register_chain pid=5074 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:55:46.229000 audit[5074]: SYSCALL arch=c000003e syscall=46 success=yes exit=83968 a0=3 a1=7ffd43c38710 a2=0 a3=5612d18b8000 items=0 ppid=4970 pid=5074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:46.229000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:55:46.724461 (udev-worker)[5042]: Network interface NamePolicy= disabled on kernel command line. Feb 9 18:55:46.735156 systemd-networkd[1462]: vxlan.calico: Link UP Feb 9 18:55:46.735166 systemd-networkd[1462]: vxlan.calico: Gained carrier Feb 9 18:55:47.303197 env[1643]: time="2024-02-09T18:55:47.303144816Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:47.307794 env[1643]: time="2024-02-09T18:55:47.307740965Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:47.310809 env[1643]: time="2024-02-09T18:55:47.310769526Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:47.313472 env[1643]: time="2024-02-09T18:55:47.313431882Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:55:47.314165 env[1643]: time="2024-02-09T18:55:47.314135124Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 18:55:47.321759 env[1643]: time="2024-02-09T18:55:47.317893053Z" level=info msg="CreateContainer within sandbox \"6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 18:55:47.365222 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3788140226.mount: Deactivated successfully. Feb 9 18:55:47.378155 env[1643]: time="2024-02-09T18:55:47.378102536Z" level=info msg="CreateContainer within sandbox \"6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"976dd09fed5c417175372f08d15b074dde505c774af5fa901ddae29f98b06bdf\"" Feb 9 18:55:47.379028 env[1643]: time="2024-02-09T18:55:47.378989343Z" level=info msg="StartContainer for \"976dd09fed5c417175372f08d15b074dde505c774af5fa901ddae29f98b06bdf\"" Feb 9 18:55:47.420153 systemd[1]: Started cri-containerd-976dd09fed5c417175372f08d15b074dde505c774af5fa901ddae29f98b06bdf.scope. Feb 9 18:55:47.437826 systemd[1]: run-containerd-runc-k8s.io-976dd09fed5c417175372f08d15b074dde505c774af5fa901ddae29f98b06bdf-runc.XVLxoA.mount: Deactivated successfully. Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { perfmon } for pid=5092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit[5092]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4804 pid=5092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:47.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937366464303966656435633431373137353337326630386431356230 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { bpf } for pid=5092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { bpf } for pid=5092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { bpf } for pid=5092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { perfmon } for pid=5092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { perfmon } for pid=5092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { perfmon } for pid=5092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { perfmon } for pid=5092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { perfmon } for pid=5092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { bpf } for pid=5092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { bpf } for pid=5092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit: BPF prog-id=204 op=LOAD Feb 9 18:55:47.486000 audit[5092]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003e4040 items=0 ppid=4804 pid=5092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:47.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937366464303966656435633431373137353337326630386431356230 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { bpf } for pid=5092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { bpf } for pid=5092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { perfmon } for pid=5092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { perfmon } for pid=5092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { perfmon } for pid=5092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { perfmon } for pid=5092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { perfmon } for pid=5092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { bpf } for pid=5092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { bpf } for pid=5092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit: BPF prog-id=205 op=LOAD Feb 9 18:55:47.486000 audit[5092]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003e4088 items=0 ppid=4804 pid=5092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:47.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937366464303966656435633431373137353337326630386431356230 Feb 9 18:55:47.486000 audit: BPF prog-id=205 op=UNLOAD Feb 9 18:55:47.486000 audit: BPF prog-id=204 op=UNLOAD Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { bpf } for pid=5092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { bpf } for pid=5092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { bpf } for pid=5092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { perfmon } for pid=5092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { perfmon } for pid=5092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { perfmon } for pid=5092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { perfmon } for pid=5092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { perfmon } for pid=5092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { bpf } for pid=5092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit[5092]: AVC avc: denied { bpf } for pid=5092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:47.486000 audit: BPF prog-id=206 op=LOAD Feb 9 18:55:47.486000 audit[5092]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003e4118 items=0 ppid=4804 pid=5092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:47.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937366464303966656435633431373137353337326630386431356230 Feb 9 18:55:47.526627 env[1643]: time="2024-02-09T18:55:47.526579554Z" level=info msg="StartContainer for \"976dd09fed5c417175372f08d15b074dde505c774af5fa901ddae29f98b06bdf\" returns successfully" Feb 9 18:55:47.612000 audit[2496]: AVC avc: denied { watch } for pid=2496 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:55:47.612000 audit[2496]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c003f364c0 a2=fc6 a3=0 items=0 ppid=2374 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 key=(null) Feb 9 18:55:47.612000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 18:55:47.613000 audit[2496]: AVC avc: denied { watch } for pid=2496 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:55:47.613000 audit[2496]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c007aa1b00 a2=fc6 a3=0 items=0 ppid=2374 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 key=(null) Feb 9 18:55:47.613000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 18:55:47.630000 audit[2496]: AVC avc: denied { watch } for pid=2496 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:55:47.630000 audit[2496]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c007aa1b90 a2=fc6 a3=0 items=0 ppid=2374 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 key=(null) Feb 9 18:55:47.630000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 18:55:47.632000 audit[2496]: AVC avc: denied { watch } for pid=2496 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521018 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:55:47.632000 audit[2496]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c007aa1ce0 a2=fc6 a3=0 items=0 ppid=2374 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 key=(null) Feb 9 18:55:47.632000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 18:55:47.638968 kubelet[2665]: I0209 18:55:47.638908 2665 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 18:55:47.639927 kubelet[2665]: I0209 18:55:47.639897 2665 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 18:55:47.691000 audit[2496]: AVC avc: denied { watch } for pid=2496 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:55:47.691000 audit[2496]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00757ebd0 a2=fc6 a3=0 items=0 ppid=2374 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 key=(null) Feb 9 18:55:47.691000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 18:55:47.692000 audit[2496]: AVC avc: denied { watch } for pid=2496 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:55:47.692000 audit[2496]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c003f37060 a2=fc6 a3=0 items=0 ppid=2374 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 key=(null) Feb 9 18:55:47.692000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 18:55:47.844714 systemd-networkd[1462]: vxlan.calico: Gained IPv6LL Feb 9 18:55:47.866949 kubelet[2665]: I0209 18:55:47.866797 2665 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-jkc2m" podStartSLOduration=32.954225537 podCreationTimestamp="2024-02-09 18:55:10 +0000 UTC" firstStartedPulling="2024-02-09 18:55:42.402176699 +0000 UTC m=+51.203166603" lastFinishedPulling="2024-02-09 18:55:47.314681473 +0000 UTC m=+56.115671377" observedRunningTime="2024-02-09 18:55:47.865989455 +0000 UTC m=+56.666979369" watchObservedRunningTime="2024-02-09 18:55:47.866730311 +0000 UTC m=+56.667720227" Feb 9 18:55:49.930000 audit[2518]: AVC avc: denied { watch } for pid=2518 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:55:49.934312 kernel: kauditd_printk_skb: 202 callbacks suppressed Feb 9 18:55:49.934500 kernel: audit: type=1400 audit(1707504949.930:1456): avc: denied { watch } for pid=2518 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:55:49.930000 audit[2518]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002494100 a2=fc6 a3=0 items=0 ppid=2354 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 key=(null) Feb 9 18:55:49.949494 kernel: audit: type=1300 audit(1707504949.930:1456): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002494100 a2=fc6 a3=0 items=0 ppid=2354 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 key=(null) Feb 9 18:55:49.949663 kernel: audit: type=1327 audit(1707504949.930:1456): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:55:49.930000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:55:49.936000 audit[2518]: AVC avc: denied { watch } for pid=2518 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:55:49.956368 kernel: audit: type=1400 audit(1707504949.936:1457): avc: denied { watch } for pid=2518 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:55:49.936000 audit[2518]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002494120 a2=fc6 a3=0 items=0 ppid=2354 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 key=(null) Feb 9 18:55:49.963394 kernel: audit: type=1300 audit(1707504949.936:1457): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002494120 a2=fc6 a3=0 items=0 ppid=2354 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 key=(null) Feb 9 18:55:49.936000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:55:49.977558 kernel: audit: type=1327 audit(1707504949.936:1457): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:55:49.977913 kernel: audit: type=1400 audit(1707504949.937:1458): avc: denied { watch } for pid=2518 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:55:49.937000 audit[2518]: AVC avc: denied { watch } for pid=2518 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:55:49.937000 audit[2518]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002494240 a2=fc6 a3=0 items=0 ppid=2354 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 key=(null) Feb 9 18:55:49.994584 kernel: audit: type=1300 audit(1707504949.937:1458): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002494240 a2=fc6 a3=0 items=0 ppid=2354 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 key=(null) Feb 9 18:55:49.994857 kernel: audit: type=1327 audit(1707504949.937:1458): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:55:49.937000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:55:49.938000 audit[2518]: AVC avc: denied { watch } for pid=2518 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:55:50.024054 kernel: audit: type=1400 audit(1707504949.938:1459): avc: denied { watch } for pid=2518 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:55:49.938000 audit[2518]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0026ba060 a2=fc6 a3=0 items=0 ppid=2354 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 key=(null) Feb 9 18:55:49.938000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:55:50.840773 systemd[1]: Started sshd@9-172.31.21.122:22-139.178.68.195:44442.service. Feb 9 18:55:50.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.21.122:22-139.178.68.195:44442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:51.063000 audit[5121]: USER_ACCT pid=5121 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:51.064675 sshd[5121]: Accepted publickey for core from 139.178.68.195 port 44442 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:55:51.065000 audit[5121]: CRED_ACQ pid=5121 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:51.065000 audit[5121]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4dc3b910 a2=3 a3=0 items=0 ppid=1 pid=5121 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:51.065000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:55:51.068606 sshd[5121]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:55:51.088430 systemd-logind[1633]: New session 9 of user core. Feb 9 18:55:51.091785 systemd[1]: Started session-9.scope. Feb 9 18:55:51.100000 audit[5121]: USER_START pid=5121 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:51.102000 audit[5123]: CRED_ACQ pid=5123 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:51.369152 env[1643]: time="2024-02-09T18:55:51.368662166Z" level=info msg="StopPodSandbox for \"d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d\"" Feb 9 18:55:51.394656 sshd[5121]: pam_unix(sshd:session): session closed for user core Feb 9 18:55:51.395000 audit[5121]: USER_END pid=5121 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:51.395000 audit[5121]: CRED_DISP pid=5121 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:51.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.21.122:22-139.178.68.195:44442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:51.399091 systemd[1]: sshd@9-172.31.21.122:22-139.178.68.195:44442.service: Deactivated successfully. Feb 9 18:55:51.400509 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 18:55:51.402943 systemd-logind[1633]: Session 9 logged out. Waiting for processes to exit. Feb 9 18:55:51.405291 systemd-logind[1633]: Removed session 9. Feb 9 18:55:51.499369 env[1643]: 2024-02-09 18:55:51.433 [WARNING][5154] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--122-k8s-coredns--5d78c9869d--kjkvv-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"654f00aa-4484-41f3-9f60-f8ee2d4c8c15", ResourceVersion:"793", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 55, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-122", ContainerID:"afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6", Pod:"coredns-5d78c9869d-kjkvv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.4.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6d50083869b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:55:51.499369 env[1643]: 2024-02-09 18:55:51.433 [INFO][5154] k8s.go 578: Cleaning up netns ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" Feb 9 18:55:51.499369 env[1643]: 2024-02-09 18:55:51.433 [INFO][5154] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" iface="eth0" netns="" Feb 9 18:55:51.499369 env[1643]: 2024-02-09 18:55:51.433 [INFO][5154] k8s.go 585: Releasing IP address(es) ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" Feb 9 18:55:51.499369 env[1643]: 2024-02-09 18:55:51.433 [INFO][5154] utils.go 188: Calico CNI releasing IP address ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" Feb 9 18:55:51.499369 env[1643]: 2024-02-09 18:55:51.479 [INFO][5161] ipam_plugin.go 415: Releasing address using handleID ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" HandleID="k8s-pod-network.d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" Workload="ip--172--31--21--122-k8s-coredns--5d78c9869d--kjkvv-eth0" Feb 9 18:55:51.499369 env[1643]: 2024-02-09 18:55:51.480 [INFO][5161] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:55:51.499369 env[1643]: 2024-02-09 18:55:51.480 [INFO][5161] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:55:51.499369 env[1643]: 2024-02-09 18:55:51.491 [WARNING][5161] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" HandleID="k8s-pod-network.d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" Workload="ip--172--31--21--122-k8s-coredns--5d78c9869d--kjkvv-eth0" Feb 9 18:55:51.499369 env[1643]: 2024-02-09 18:55:51.491 [INFO][5161] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" HandleID="k8s-pod-network.d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" Workload="ip--172--31--21--122-k8s-coredns--5d78c9869d--kjkvv-eth0" Feb 9 18:55:51.499369 env[1643]: 2024-02-09 18:55:51.493 [INFO][5161] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:55:51.499369 env[1643]: 2024-02-09 18:55:51.496 [INFO][5154] k8s.go 591: Teardown processing complete. ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" Feb 9 18:55:51.500207 env[1643]: time="2024-02-09T18:55:51.500147355Z" level=info msg="TearDown network for sandbox \"d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d\" successfully" Feb 9 18:55:51.500207 env[1643]: time="2024-02-09T18:55:51.500185898Z" level=info msg="StopPodSandbox for \"d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d\" returns successfully" Feb 9 18:55:51.501066 env[1643]: time="2024-02-09T18:55:51.501019487Z" level=info msg="RemovePodSandbox for \"d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d\"" Feb 9 18:55:51.501172 env[1643]: time="2024-02-09T18:55:51.501056356Z" level=info msg="Forcibly stopping sandbox \"d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d\"" Feb 9 18:55:51.634122 env[1643]: 2024-02-09 18:55:51.559 [WARNING][5182] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--122-k8s-coredns--5d78c9869d--kjkvv-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"654f00aa-4484-41f3-9f60-f8ee2d4c8c15", ResourceVersion:"793", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 55, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-122", ContainerID:"afb0199bfbd867d35406fde91be4afb04105233f44a70e4b323507ec96ecf8f6", Pod:"coredns-5d78c9869d-kjkvv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.4.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6d50083869b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:55:51.634122 env[1643]: 2024-02-09 18:55:51.560 [INFO][5182] k8s.go 578: Cleaning up netns ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" Feb 9 18:55:51.634122 env[1643]: 2024-02-09 18:55:51.560 [INFO][5182] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" iface="eth0" netns="" Feb 9 18:55:51.634122 env[1643]: 2024-02-09 18:55:51.560 [INFO][5182] k8s.go 585: Releasing IP address(es) ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" Feb 9 18:55:51.634122 env[1643]: 2024-02-09 18:55:51.561 [INFO][5182] utils.go 188: Calico CNI releasing IP address ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" Feb 9 18:55:51.634122 env[1643]: 2024-02-09 18:55:51.606 [INFO][5188] ipam_plugin.go 415: Releasing address using handleID ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" HandleID="k8s-pod-network.d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" Workload="ip--172--31--21--122-k8s-coredns--5d78c9869d--kjkvv-eth0" Feb 9 18:55:51.634122 env[1643]: 2024-02-09 18:55:51.606 [INFO][5188] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:55:51.634122 env[1643]: 2024-02-09 18:55:51.606 [INFO][5188] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:55:51.634122 env[1643]: 2024-02-09 18:55:51.620 [WARNING][5188] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" HandleID="k8s-pod-network.d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" Workload="ip--172--31--21--122-k8s-coredns--5d78c9869d--kjkvv-eth0" Feb 9 18:55:51.634122 env[1643]: 2024-02-09 18:55:51.620 [INFO][5188] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" HandleID="k8s-pod-network.d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" Workload="ip--172--31--21--122-k8s-coredns--5d78c9869d--kjkvv-eth0" Feb 9 18:55:51.634122 env[1643]: 2024-02-09 18:55:51.625 [INFO][5188] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:55:51.634122 env[1643]: 2024-02-09 18:55:51.629 [INFO][5182] k8s.go 591: Teardown processing complete. ContainerID="d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d" Feb 9 18:55:51.634122 env[1643]: time="2024-02-09T18:55:51.631792507Z" level=info msg="TearDown network for sandbox \"d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d\" successfully" Feb 9 18:55:51.638568 env[1643]: time="2024-02-09T18:55:51.638472159Z" level=info msg="RemovePodSandbox \"d9bf63b01fc37d11ad48e7a12351c1cfa00ed291e44e32ee9dfffe9cd22aeb8d\" returns successfully" Feb 9 18:55:51.639754 env[1643]: time="2024-02-09T18:55:51.639676591Z" level=info msg="StopPodSandbox for \"60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde\"" Feb 9 18:55:51.766704 env[1643]: 2024-02-09 18:55:51.721 [WARNING][5207] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--122-k8s-coredns--5d78c9869d--dlpjk-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"f00550ab-7b86-4c71-87d5-934dcf889278", ResourceVersion:"790", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 55, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-122", ContainerID:"e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610", Pod:"coredns-5d78c9869d-dlpjk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.4.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliae75473e4f2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:55:51.766704 env[1643]: 2024-02-09 18:55:51.721 [INFO][5207] k8s.go 578: Cleaning up netns ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" Feb 9 18:55:51.766704 env[1643]: 2024-02-09 18:55:51.721 [INFO][5207] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" iface="eth0" netns="" Feb 9 18:55:51.766704 env[1643]: 2024-02-09 18:55:51.721 [INFO][5207] k8s.go 585: Releasing IP address(es) ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" Feb 9 18:55:51.766704 env[1643]: 2024-02-09 18:55:51.721 [INFO][5207] utils.go 188: Calico CNI releasing IP address ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" Feb 9 18:55:51.766704 env[1643]: 2024-02-09 18:55:51.752 [INFO][5213] ipam_plugin.go 415: Releasing address using handleID ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" HandleID="k8s-pod-network.60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" Workload="ip--172--31--21--122-k8s-coredns--5d78c9869d--dlpjk-eth0" Feb 9 18:55:51.766704 env[1643]: 2024-02-09 18:55:51.753 [INFO][5213] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:55:51.766704 env[1643]: 2024-02-09 18:55:51.753 [INFO][5213] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:55:51.766704 env[1643]: 2024-02-09 18:55:51.760 [WARNING][5213] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" HandleID="k8s-pod-network.60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" Workload="ip--172--31--21--122-k8s-coredns--5d78c9869d--dlpjk-eth0" Feb 9 18:55:51.766704 env[1643]: 2024-02-09 18:55:51.760 [INFO][5213] ipam_plugin.go 443: Releasing address using workloadID ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" HandleID="k8s-pod-network.60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" Workload="ip--172--31--21--122-k8s-coredns--5d78c9869d--dlpjk-eth0" Feb 9 18:55:51.766704 env[1643]: 2024-02-09 18:55:51.762 [INFO][5213] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:55:51.766704 env[1643]: 2024-02-09 18:55:51.765 [INFO][5207] k8s.go 591: Teardown processing complete. ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" Feb 9 18:55:51.767537 env[1643]: time="2024-02-09T18:55:51.766733459Z" level=info msg="TearDown network for sandbox \"60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde\" successfully" Feb 9 18:55:51.767537 env[1643]: time="2024-02-09T18:55:51.766769514Z" level=info msg="StopPodSandbox for \"60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde\" returns successfully" Feb 9 18:55:51.767537 env[1643]: time="2024-02-09T18:55:51.767269966Z" level=info msg="RemovePodSandbox for \"60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde\"" Feb 9 18:55:51.767537 env[1643]: time="2024-02-09T18:55:51.767356720Z" level=info msg="Forcibly stopping sandbox \"60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde\"" Feb 9 18:55:51.869793 env[1643]: 2024-02-09 18:55:51.807 [WARNING][5232] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--122-k8s-coredns--5d78c9869d--dlpjk-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"f00550ab-7b86-4c71-87d5-934dcf889278", ResourceVersion:"790", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 55, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-122", ContainerID:"e129bd1b2d16e85fd3ca51dd40243f16215aacf3018fcbf5d9ba1ea13b759610", Pod:"coredns-5d78c9869d-dlpjk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.4.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliae75473e4f2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:55:51.869793 env[1643]: 2024-02-09 18:55:51.807 [INFO][5232] k8s.go 578: Cleaning up netns ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" Feb 9 18:55:51.869793 env[1643]: 2024-02-09 18:55:51.807 [INFO][5232] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" iface="eth0" netns="" Feb 9 18:55:51.869793 env[1643]: 2024-02-09 18:55:51.808 [INFO][5232] k8s.go 585: Releasing IP address(es) ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" Feb 9 18:55:51.869793 env[1643]: 2024-02-09 18:55:51.808 [INFO][5232] utils.go 188: Calico CNI releasing IP address ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" Feb 9 18:55:51.869793 env[1643]: 2024-02-09 18:55:51.847 [INFO][5238] ipam_plugin.go 415: Releasing address using handleID ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" HandleID="k8s-pod-network.60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" Workload="ip--172--31--21--122-k8s-coredns--5d78c9869d--dlpjk-eth0" Feb 9 18:55:51.869793 env[1643]: 2024-02-09 18:55:51.848 [INFO][5238] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:55:51.869793 env[1643]: 2024-02-09 18:55:51.848 [INFO][5238] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:55:51.869793 env[1643]: 2024-02-09 18:55:51.862 [WARNING][5238] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" HandleID="k8s-pod-network.60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" Workload="ip--172--31--21--122-k8s-coredns--5d78c9869d--dlpjk-eth0" Feb 9 18:55:51.869793 env[1643]: 2024-02-09 18:55:51.862 [INFO][5238] ipam_plugin.go 443: Releasing address using workloadID ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" HandleID="k8s-pod-network.60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" Workload="ip--172--31--21--122-k8s-coredns--5d78c9869d--dlpjk-eth0" Feb 9 18:55:51.869793 env[1643]: 2024-02-09 18:55:51.865 [INFO][5238] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:55:51.869793 env[1643]: 2024-02-09 18:55:51.867 [INFO][5232] k8s.go 591: Teardown processing complete. ContainerID="60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde" Feb 9 18:55:51.871894 env[1643]: time="2024-02-09T18:55:51.869829994Z" level=info msg="TearDown network for sandbox \"60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde\" successfully" Feb 9 18:55:51.876860 env[1643]: time="2024-02-09T18:55:51.876809783Z" level=info msg="RemovePodSandbox \"60f3f099473994f8c021ae23608b8fd973c074d95fd87dd0e96e9bd5579befde\" returns successfully" Feb 9 18:55:51.877652 env[1643]: time="2024-02-09T18:55:51.877619579Z" level=info msg="StopPodSandbox for \"18282b8003a4ead6f2fc0b1429b70804d656178fe1cc510bbe30e81842a13a79\"" Feb 9 18:55:51.878059 env[1643]: time="2024-02-09T18:55:51.877983480Z" level=info msg="TearDown network for sandbox \"18282b8003a4ead6f2fc0b1429b70804d656178fe1cc510bbe30e81842a13a79\" successfully" Feb 9 18:55:51.878213 env[1643]: time="2024-02-09T18:55:51.878053358Z" level=info msg="StopPodSandbox for \"18282b8003a4ead6f2fc0b1429b70804d656178fe1cc510bbe30e81842a13a79\" returns successfully" Feb 9 18:55:51.879070 env[1643]: time="2024-02-09T18:55:51.879042872Z" level=info msg="RemovePodSandbox for \"18282b8003a4ead6f2fc0b1429b70804d656178fe1cc510bbe30e81842a13a79\"" Feb 9 18:55:51.879566 env[1643]: time="2024-02-09T18:55:51.879509117Z" level=info msg="Forcibly stopping sandbox \"18282b8003a4ead6f2fc0b1429b70804d656178fe1cc510bbe30e81842a13a79\"" Feb 9 18:55:51.879695 env[1643]: time="2024-02-09T18:55:51.879628341Z" level=info msg="TearDown network for sandbox \"18282b8003a4ead6f2fc0b1429b70804d656178fe1cc510bbe30e81842a13a79\" successfully" Feb 9 18:55:51.886747 env[1643]: time="2024-02-09T18:55:51.886615222Z" level=info msg="RemovePodSandbox \"18282b8003a4ead6f2fc0b1429b70804d656178fe1cc510bbe30e81842a13a79\" returns successfully" Feb 9 18:55:51.888059 env[1643]: time="2024-02-09T18:55:51.888025966Z" level=info msg="StopPodSandbox for \"3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82\"" Feb 9 18:55:52.070148 env[1643]: 2024-02-09 18:55:51.970 [WARNING][5257] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--122-k8s-csi--node--driver--jkc2m-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ee2f0cc0-a899-413e-bc32-44614edc0669", ResourceVersion:"890", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 55, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-122", ContainerID:"6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79", Pod:"csi-node-driver-jkc2m", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.4.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali80dc81287cd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:55:52.070148 env[1643]: 2024-02-09 18:55:51.971 [INFO][5257] k8s.go 578: Cleaning up netns ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" Feb 9 18:55:52.070148 env[1643]: 2024-02-09 18:55:51.971 [INFO][5257] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" iface="eth0" netns="" Feb 9 18:55:52.070148 env[1643]: 2024-02-09 18:55:51.971 [INFO][5257] k8s.go 585: Releasing IP address(es) ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" Feb 9 18:55:52.070148 env[1643]: 2024-02-09 18:55:51.971 [INFO][5257] utils.go 188: Calico CNI releasing IP address ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" Feb 9 18:55:52.070148 env[1643]: 2024-02-09 18:55:52.032 [INFO][5264] ipam_plugin.go 415: Releasing address using handleID ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" HandleID="k8s-pod-network.3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" Workload="ip--172--31--21--122-k8s-csi--node--driver--jkc2m-eth0" Feb 9 18:55:52.070148 env[1643]: 2024-02-09 18:55:52.033 [INFO][5264] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:55:52.070148 env[1643]: 2024-02-09 18:55:52.033 [INFO][5264] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:55:52.070148 env[1643]: 2024-02-09 18:55:52.062 [WARNING][5264] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" HandleID="k8s-pod-network.3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" Workload="ip--172--31--21--122-k8s-csi--node--driver--jkc2m-eth0" Feb 9 18:55:52.070148 env[1643]: 2024-02-09 18:55:52.062 [INFO][5264] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" HandleID="k8s-pod-network.3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" Workload="ip--172--31--21--122-k8s-csi--node--driver--jkc2m-eth0" Feb 9 18:55:52.070148 env[1643]: 2024-02-09 18:55:52.065 [INFO][5264] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:55:52.070148 env[1643]: 2024-02-09 18:55:52.068 [INFO][5257] k8s.go 591: Teardown processing complete. ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" Feb 9 18:55:52.071123 env[1643]: time="2024-02-09T18:55:52.071076578Z" level=info msg="TearDown network for sandbox \"3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82\" successfully" Feb 9 18:55:52.071123 env[1643]: time="2024-02-09T18:55:52.071120185Z" level=info msg="StopPodSandbox for \"3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82\" returns successfully" Feb 9 18:55:52.071863 env[1643]: time="2024-02-09T18:55:52.071828315Z" level=info msg="RemovePodSandbox for \"3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82\"" Feb 9 18:55:52.071946 env[1643]: time="2024-02-09T18:55:52.071863168Z" level=info msg="Forcibly stopping sandbox \"3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82\"" Feb 9 18:55:52.204123 env[1643]: 2024-02-09 18:55:52.144 [WARNING][5282] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--122-k8s-csi--node--driver--jkc2m-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ee2f0cc0-a899-413e-bc32-44614edc0669", ResourceVersion:"890", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 55, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-122", ContainerID:"6f55ac42e3e7b8860eb601d6b6326babe5b91f38d9f5c55b8a75903e023b8e79", Pod:"csi-node-driver-jkc2m", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.4.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali80dc81287cd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:55:52.204123 env[1643]: 2024-02-09 18:55:52.144 [INFO][5282] k8s.go 578: Cleaning up netns ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" Feb 9 18:55:52.204123 env[1643]: 2024-02-09 18:55:52.145 [INFO][5282] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" iface="eth0" netns="" Feb 9 18:55:52.204123 env[1643]: 2024-02-09 18:55:52.145 [INFO][5282] k8s.go 585: Releasing IP address(es) ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" Feb 9 18:55:52.204123 env[1643]: 2024-02-09 18:55:52.145 [INFO][5282] utils.go 188: Calico CNI releasing IP address ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" Feb 9 18:55:52.204123 env[1643]: 2024-02-09 18:55:52.186 [INFO][5289] ipam_plugin.go 415: Releasing address using handleID ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" HandleID="k8s-pod-network.3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" Workload="ip--172--31--21--122-k8s-csi--node--driver--jkc2m-eth0" Feb 9 18:55:52.204123 env[1643]: 2024-02-09 18:55:52.187 [INFO][5289] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:55:52.204123 env[1643]: 2024-02-09 18:55:52.187 [INFO][5289] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:55:52.204123 env[1643]: 2024-02-09 18:55:52.195 [WARNING][5289] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" HandleID="k8s-pod-network.3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" Workload="ip--172--31--21--122-k8s-csi--node--driver--jkc2m-eth0" Feb 9 18:55:52.204123 env[1643]: 2024-02-09 18:55:52.195 [INFO][5289] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" HandleID="k8s-pod-network.3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" Workload="ip--172--31--21--122-k8s-csi--node--driver--jkc2m-eth0" Feb 9 18:55:52.204123 env[1643]: 2024-02-09 18:55:52.198 [INFO][5289] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:55:52.204123 env[1643]: 2024-02-09 18:55:52.200 [INFO][5282] k8s.go 591: Teardown processing complete. ContainerID="3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82" Feb 9 18:55:52.204123 env[1643]: time="2024-02-09T18:55:52.203169095Z" level=info msg="TearDown network for sandbox \"3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82\" successfully" Feb 9 18:55:52.209565 env[1643]: time="2024-02-09T18:55:52.209509465Z" level=info msg="RemovePodSandbox \"3524a8cf0ce2e863ec924d4e642902e64027a0dce8fa2a844a414751f1cb2c82\" returns successfully" Feb 9 18:55:52.210052 env[1643]: time="2024-02-09T18:55:52.210014159Z" level=info msg="StopPodSandbox for \"996e19df37dbfab24e139dff1b50e9c529df12a5238d3ad2c304ad495acd5f8c\"" Feb 9 18:55:52.210155 env[1643]: time="2024-02-09T18:55:52.210105585Z" level=info msg="TearDown network for sandbox \"996e19df37dbfab24e139dff1b50e9c529df12a5238d3ad2c304ad495acd5f8c\" successfully" Feb 9 18:55:52.210231 env[1643]: time="2024-02-09T18:55:52.210157310Z" level=info msg="StopPodSandbox for \"996e19df37dbfab24e139dff1b50e9c529df12a5238d3ad2c304ad495acd5f8c\" returns successfully" Feb 9 18:55:52.210861 env[1643]: time="2024-02-09T18:55:52.210834036Z" level=info msg="RemovePodSandbox for \"996e19df37dbfab24e139dff1b50e9c529df12a5238d3ad2c304ad495acd5f8c\"" Feb 9 18:55:52.211010 env[1643]: time="2024-02-09T18:55:52.210863576Z" level=info msg="Forcibly stopping sandbox \"996e19df37dbfab24e139dff1b50e9c529df12a5238d3ad2c304ad495acd5f8c\"" Feb 9 18:55:52.211010 env[1643]: time="2024-02-09T18:55:52.210994741Z" level=info msg="TearDown network for sandbox \"996e19df37dbfab24e139dff1b50e9c529df12a5238d3ad2c304ad495acd5f8c\" successfully" Feb 9 18:55:52.216425 env[1643]: time="2024-02-09T18:55:52.216386917Z" level=info msg="RemovePodSandbox \"996e19df37dbfab24e139dff1b50e9c529df12a5238d3ad2c304ad495acd5f8c\" returns successfully" Feb 9 18:55:52.217167 env[1643]: time="2024-02-09T18:55:52.217125329Z" level=info msg="StopPodSandbox for \"d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329\"" Feb 9 18:55:52.325326 env[1643]: 2024-02-09 18:55:52.284 [WARNING][5307] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--122-k8s-calico--kube--controllers--7776c55fc5--xj6tw-eth0", GenerateName:"calico-kube-controllers-7776c55fc5-", Namespace:"calico-system", SelfLink:"", UID:"d41fed55-9537-4c19-aa2d-21bc829cf483", ResourceVersion:"826", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 55, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7776c55fc5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-122", ContainerID:"d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd", Pod:"calico-kube-controllers-7776c55fc5-xj6tw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.4.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali98ff04c56de", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:55:52.325326 env[1643]: 2024-02-09 18:55:52.284 [INFO][5307] k8s.go 578: Cleaning up netns ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" Feb 9 18:55:52.325326 env[1643]: 2024-02-09 18:55:52.284 [INFO][5307] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" iface="eth0" netns="" Feb 9 18:55:52.325326 env[1643]: 2024-02-09 18:55:52.284 [INFO][5307] k8s.go 585: Releasing IP address(es) ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" Feb 9 18:55:52.325326 env[1643]: 2024-02-09 18:55:52.284 [INFO][5307] utils.go 188: Calico CNI releasing IP address ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" Feb 9 18:55:52.325326 env[1643]: 2024-02-09 18:55:52.311 [INFO][5313] ipam_plugin.go 415: Releasing address using handleID ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" HandleID="k8s-pod-network.d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" Workload="ip--172--31--21--122-k8s-calico--kube--controllers--7776c55fc5--xj6tw-eth0" Feb 9 18:55:52.325326 env[1643]: 2024-02-09 18:55:52.311 [INFO][5313] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:55:52.325326 env[1643]: 2024-02-09 18:55:52.311 [INFO][5313] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:55:52.325326 env[1643]: 2024-02-09 18:55:52.319 [WARNING][5313] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" HandleID="k8s-pod-network.d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" Workload="ip--172--31--21--122-k8s-calico--kube--controllers--7776c55fc5--xj6tw-eth0" Feb 9 18:55:52.325326 env[1643]: 2024-02-09 18:55:52.319 [INFO][5313] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" HandleID="k8s-pod-network.d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" Workload="ip--172--31--21--122-k8s-calico--kube--controllers--7776c55fc5--xj6tw-eth0" Feb 9 18:55:52.325326 env[1643]: 2024-02-09 18:55:52.321 [INFO][5313] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:55:52.325326 env[1643]: 2024-02-09 18:55:52.323 [INFO][5307] k8s.go 591: Teardown processing complete. ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" Feb 9 18:55:52.326493 env[1643]: time="2024-02-09T18:55:52.325358773Z" level=info msg="TearDown network for sandbox \"d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329\" successfully" Feb 9 18:55:52.326493 env[1643]: time="2024-02-09T18:55:52.325397635Z" level=info msg="StopPodSandbox for \"d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329\" returns successfully" Feb 9 18:55:52.326493 env[1643]: time="2024-02-09T18:55:52.326159523Z" level=info msg="RemovePodSandbox for \"d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329\"" Feb 9 18:55:52.326493 env[1643]: time="2024-02-09T18:55:52.326279697Z" level=info msg="Forcibly stopping sandbox \"d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329\"" Feb 9 18:55:52.435887 env[1643]: 2024-02-09 18:55:52.387 [WARNING][5332] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--122-k8s-calico--kube--controllers--7776c55fc5--xj6tw-eth0", GenerateName:"calico-kube-controllers-7776c55fc5-", Namespace:"calico-system", SelfLink:"", UID:"d41fed55-9537-4c19-aa2d-21bc829cf483", ResourceVersion:"826", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 55, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7776c55fc5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-122", ContainerID:"d6b27acfc65856756bfce27659780f19f254fac5ad887ba984e330a7ce02f2bd", Pod:"calico-kube-controllers-7776c55fc5-xj6tw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.4.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali98ff04c56de", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:55:52.435887 env[1643]: 2024-02-09 18:55:52.388 [INFO][5332] k8s.go 578: Cleaning up netns ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" Feb 9 18:55:52.435887 env[1643]: 2024-02-09 18:55:52.388 [INFO][5332] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" iface="eth0" netns="" Feb 9 18:55:52.435887 env[1643]: 2024-02-09 18:55:52.388 [INFO][5332] k8s.go 585: Releasing IP address(es) ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" Feb 9 18:55:52.435887 env[1643]: 2024-02-09 18:55:52.388 [INFO][5332] utils.go 188: Calico CNI releasing IP address ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" Feb 9 18:55:52.435887 env[1643]: 2024-02-09 18:55:52.416 [INFO][5338] ipam_plugin.go 415: Releasing address using handleID ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" HandleID="k8s-pod-network.d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" Workload="ip--172--31--21--122-k8s-calico--kube--controllers--7776c55fc5--xj6tw-eth0" Feb 9 18:55:52.435887 env[1643]: 2024-02-09 18:55:52.416 [INFO][5338] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:55:52.435887 env[1643]: 2024-02-09 18:55:52.416 [INFO][5338] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:55:52.435887 env[1643]: 2024-02-09 18:55:52.427 [WARNING][5338] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" HandleID="k8s-pod-network.d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" Workload="ip--172--31--21--122-k8s-calico--kube--controllers--7776c55fc5--xj6tw-eth0" Feb 9 18:55:52.435887 env[1643]: 2024-02-09 18:55:52.427 [INFO][5338] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" HandleID="k8s-pod-network.d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" Workload="ip--172--31--21--122-k8s-calico--kube--controllers--7776c55fc5--xj6tw-eth0" Feb 9 18:55:52.435887 env[1643]: 2024-02-09 18:55:52.431 [INFO][5338] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:55:52.435887 env[1643]: 2024-02-09 18:55:52.433 [INFO][5332] k8s.go 591: Teardown processing complete. ContainerID="d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329" Feb 9 18:55:52.435887 env[1643]: time="2024-02-09T18:55:52.435364060Z" level=info msg="TearDown network for sandbox \"d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329\" successfully" Feb 9 18:55:52.441450 env[1643]: time="2024-02-09T18:55:52.441400268Z" level=info msg="RemovePodSandbox \"d1213af085ec11452236ac1296eccd157f2bd400baa89aa760ae5389d6746329\" returns successfully" Feb 9 18:55:56.422042 systemd[1]: Started sshd@10-172.31.21.122:22-139.178.68.195:60982.service. Feb 9 18:55:56.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.21.122:22-139.178.68.195:60982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:56.433103 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 18:55:56.433390 kernel: audit: type=1130 audit(1707504956.423:1469): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.21.122:22-139.178.68.195:60982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:56.610000 audit[5373]: USER_ACCT pid=5373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:56.623964 kernel: audit: type=1101 audit(1707504956.610:1470): pid=5373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:56.624045 sshd[5373]: Accepted publickey for core from 139.178.68.195 port 60982 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:55:56.630000 audit[5373]: CRED_ACQ pid=5373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:56.632378 sshd[5373]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:55:56.647222 kernel: audit: type=1103 audit(1707504956.630:1471): pid=5373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:56.647369 kernel: audit: type=1006 audit(1707504956.630:1472): pid=5373 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 9 18:55:56.646851 systemd[1]: Started session-10.scope. Feb 9 18:55:56.630000 audit[5373]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde5846f30 a2=3 a3=0 items=0 ppid=1 pid=5373 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:56.649158 systemd-logind[1633]: New session 10 of user core. Feb 9 18:55:56.657580 kernel: audit: type=1300 audit(1707504956.630:1472): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde5846f30 a2=3 a3=0 items=0 ppid=1 pid=5373 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:56.630000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:55:56.657000 audit[5373]: USER_START pid=5373 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:56.666535 kernel: audit: type=1327 audit(1707504956.630:1472): proctitle=737368643A20636F7265205B707269765D Feb 9 18:55:56.666611 kernel: audit: type=1105 audit(1707504956.657:1473): pid=5373 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:56.660000 audit[5375]: CRED_ACQ pid=5375 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:56.667397 kernel: audit: type=1103 audit(1707504956.660:1474): pid=5375 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:56.859681 sshd[5373]: pam_unix(sshd:session): session closed for user core Feb 9 18:55:56.859000 audit[5373]: USER_END pid=5373 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:56.868597 kernel: audit: type=1106 audit(1707504956.859:1475): pid=5373 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:56.861000 audit[5373]: CRED_DISP pid=5373 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:56.869589 systemd[1]: sshd@10-172.31.21.122:22-139.178.68.195:60982.service: Deactivated successfully. Feb 9 18:55:56.870898 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 18:55:56.872937 systemd-logind[1633]: Session 10 logged out. Waiting for processes to exit. Feb 9 18:55:56.875743 kernel: audit: type=1104 audit(1707504956.861:1476): pid=5373 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:55:56.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.21.122:22-139.178.68.195:60982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:56.874876 systemd-logind[1633]: Removed session 10. Feb 9 18:56:01.924385 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 18:56:01.924847 kernel: audit: type=1130 audit(1707504961.903:1478): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.21.122:22-139.178.68.195:60988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:01.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.21.122:22-139.178.68.195:60988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:01.898689 systemd[1]: Started sshd@11-172.31.21.122:22-139.178.68.195:60988.service. Feb 9 18:56:02.208000 audit[5386]: USER_ACCT pid=5386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:02.223693 kernel: audit: type=1101 audit(1707504962.208:1479): pid=5386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:02.224301 sshd[5386]: Accepted publickey for core from 139.178.68.195 port 60988 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:56:02.226000 audit[5386]: CRED_ACQ pid=5386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:02.229499 sshd[5386]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:56:02.252692 kernel: audit: type=1103 audit(1707504962.226:1480): pid=5386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:02.252938 kernel: audit: type=1006 audit(1707504962.226:1481): pid=5386 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 9 18:56:02.252990 kernel: audit: type=1300 audit(1707504962.226:1481): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff436c2af0 a2=3 a3=0 items=0 ppid=1 pid=5386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:02.226000 audit[5386]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff436c2af0 a2=3 a3=0 items=0 ppid=1 pid=5386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:02.252069 systemd[1]: Started session-11.scope. Feb 9 18:56:02.255273 systemd-logind[1633]: New session 11 of user core. Feb 9 18:56:02.226000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:56:02.262537 kernel: audit: type=1327 audit(1707504962.226:1481): proctitle=737368643A20636F7265205B707269765D Feb 9 18:56:02.262000 audit[5386]: USER_START pid=5386 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:02.265000 audit[5388]: CRED_ACQ pid=5388 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:02.271475 kernel: audit: type=1105 audit(1707504962.262:1482): pid=5386 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:02.271517 kernel: audit: type=1103 audit(1707504962.265:1483): pid=5388 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:02.541274 sshd[5386]: pam_unix(sshd:session): session closed for user core Feb 9 18:56:02.542000 audit[5386]: USER_END pid=5386 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:02.550996 systemd[1]: sshd@11-172.31.21.122:22-139.178.68.195:60988.service: Deactivated successfully. Feb 9 18:56:02.551374 kernel: audit: type=1106 audit(1707504962.542:1484): pid=5386 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:02.552187 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 18:56:02.542000 audit[5386]: CRED_DISP pid=5386 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:02.554511 systemd-logind[1633]: Session 11 logged out. Waiting for processes to exit. Feb 9 18:56:02.556011 systemd-logind[1633]: Removed session 11. Feb 9 18:56:02.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.21.122:22-139.178.68.195:60988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:02.562161 kernel: audit: type=1104 audit(1707504962.542:1485): pid=5386 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:02.591368 systemd[1]: Started sshd@12-172.31.21.122:22-139.178.68.195:32770.service. Feb 9 18:56:02.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.21.122:22-139.178.68.195:32770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:02.777000 audit[5399]: USER_ACCT pid=5399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:02.778807 sshd[5399]: Accepted publickey for core from 139.178.68.195 port 32770 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:56:02.778000 audit[5399]: CRED_ACQ pid=5399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:02.778000 audit[5399]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa6e66f00 a2=3 a3=0 items=0 ppid=1 pid=5399 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:02.778000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:56:02.780653 sshd[5399]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:56:02.803357 systemd-logind[1633]: New session 12 of user core. Feb 9 18:56:02.809461 systemd[1]: Started session-12.scope. Feb 9 18:56:02.831000 audit[5399]: USER_START pid=5399 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:02.838000 audit[5401]: CRED_ACQ pid=5401 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:04.802462 sshd[5399]: pam_unix(sshd:session): session closed for user core Feb 9 18:56:04.810000 audit[5399]: USER_END pid=5399 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:04.811000 audit[5399]: CRED_DISP pid=5399 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:04.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.21.122:22-139.178.68.195:32770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:04.820087 systemd[1]: sshd@12-172.31.21.122:22-139.178.68.195:32770.service: Deactivated successfully. Feb 9 18:56:04.821683 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 18:56:04.825524 systemd-logind[1633]: Session 12 logged out. Waiting for processes to exit. Feb 9 18:56:04.840552 systemd[1]: Started sshd@13-172.31.21.122:22-139.178.68.195:32782.service. Feb 9 18:56:04.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.21.122:22-139.178.68.195:32782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:04.843345 systemd-logind[1633]: Removed session 12. Feb 9 18:56:05.023000 audit[5409]: USER_ACCT pid=5409 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:05.024880 sshd[5409]: Accepted publickey for core from 139.178.68.195 port 32782 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:56:05.024000 audit[5409]: CRED_ACQ pid=5409 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:05.024000 audit[5409]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd67bfaf30 a2=3 a3=0 items=0 ppid=1 pid=5409 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:05.024000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:56:05.027759 sshd[5409]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:56:05.034333 systemd[1]: Started session-13.scope. Feb 9 18:56:05.035273 systemd-logind[1633]: New session 13 of user core. Feb 9 18:56:05.039000 audit[5409]: USER_START pid=5409 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:05.041000 audit[5413]: CRED_ACQ pid=5413 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:05.344192 sshd[5409]: pam_unix(sshd:session): session closed for user core Feb 9 18:56:05.345000 audit[5409]: USER_END pid=5409 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:05.345000 audit[5409]: CRED_DISP pid=5409 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:05.348831 systemd[1]: sshd@13-172.31.21.122:22-139.178.68.195:32782.service: Deactivated successfully. Feb 9 18:56:05.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.21.122:22-139.178.68.195:32782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:05.350039 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 18:56:05.351135 systemd-logind[1633]: Session 13 logged out. Waiting for processes to exit. Feb 9 18:56:05.352383 systemd-logind[1633]: Removed session 13. Feb 9 18:56:10.381575 systemd[1]: Started sshd@14-172.31.21.122:22-139.178.68.195:55488.service. Feb 9 18:56:10.397926 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 18:56:10.398061 kernel: audit: type=1130 audit(1707504970.383:1505): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.21.122:22-139.178.68.195:55488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:10.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.21.122:22-139.178.68.195:55488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:10.575433 kernel: audit: type=1101 audit(1707504970.561:1506): pid=5433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:10.575572 kernel: audit: type=1103 audit(1707504970.571:1507): pid=5433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:10.561000 audit[5433]: USER_ACCT pid=5433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:10.571000 audit[5433]: CRED_ACQ pid=5433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:10.573724 sshd[5433]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:56:10.576109 sshd[5433]: Accepted publickey for core from 139.178.68.195 port 55488 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:56:10.585638 kernel: audit: type=1006 audit(1707504970.571:1508): pid=5433 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 9 18:56:10.571000 audit[5433]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe36306260 a2=3 a3=0 items=0 ppid=1 pid=5433 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:10.587784 systemd[1]: Started session-14.scope. Feb 9 18:56:10.595532 kernel: audit: type=1300 audit(1707504970.571:1508): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe36306260 a2=3 a3=0 items=0 ppid=1 pid=5433 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:10.595636 kernel: audit: type=1327 audit(1707504970.571:1508): proctitle=737368643A20636F7265205B707269765D Feb 9 18:56:10.571000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:56:10.594103 systemd-logind[1633]: New session 14 of user core. Feb 9 18:56:10.600000 audit[5433]: USER_START pid=5433 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:10.610315 kernel: audit: type=1105 audit(1707504970.600:1509): pid=5433 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:10.610421 kernel: audit: type=1103 audit(1707504970.607:1510): pid=5435 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:10.607000 audit[5435]: CRED_ACQ pid=5435 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:10.794454 sshd[5433]: pam_unix(sshd:session): session closed for user core Feb 9 18:56:10.796000 audit[5433]: USER_END pid=5433 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:10.799710 systemd[1]: sshd@14-172.31.21.122:22-139.178.68.195:55488.service: Deactivated successfully. Feb 9 18:56:10.800794 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 18:56:10.803441 systemd-logind[1633]: Session 14 logged out. Waiting for processes to exit. Feb 9 18:56:10.796000 audit[5433]: CRED_DISP pid=5433 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:10.805093 systemd-logind[1633]: Removed session 14. Feb 9 18:56:10.809719 kernel: audit: type=1106 audit(1707504970.796:1511): pid=5433 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:10.809804 kernel: audit: type=1104 audit(1707504970.796:1512): pid=5433 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:10.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.21.122:22-139.178.68.195:55488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.823413 systemd[1]: Started sshd@15-172.31.21.122:22-139.178.68.195:55498.service. Feb 9 18:56:15.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.21.122:22-139.178.68.195:55498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.827857 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 18:56:15.827929 kernel: audit: type=1130 audit(1707504975.825:1514): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.21.122:22-139.178.68.195:55498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.990000 audit[5472]: USER_ACCT pid=5472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:15.994414 sshd[5472]: Accepted publickey for core from 139.178.68.195 port 55498 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:56:15.996918 sshd[5472]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:56:15.996000 audit[5472]: CRED_ACQ pid=5472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:16.004545 kernel: audit: type=1101 audit(1707504975.990:1515): pid=5472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:16.004673 kernel: audit: type=1103 audit(1707504975.996:1516): pid=5472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:16.011390 kernel: audit: type=1006 audit(1707504975.996:1517): pid=5472 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 9 18:56:15.996000 audit[5472]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9d3353c0 a2=3 a3=0 items=0 ppid=1 pid=5472 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:16.021310 kernel: audit: type=1300 audit(1707504975.996:1517): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9d3353c0 a2=3 a3=0 items=0 ppid=1 pid=5472 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:16.035403 systemd[1]: Started session-15.scope. Feb 9 18:56:16.039369 systemd-logind[1633]: New session 15 of user core. Feb 9 18:56:15.996000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:56:16.043340 kernel: audit: type=1327 audit(1707504975.996:1517): proctitle=737368643A20636F7265205B707269765D Feb 9 18:56:16.052000 audit[5472]: USER_START pid=5472 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:16.063621 kernel: audit: type=1105 audit(1707504976.052:1518): pid=5472 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:16.065000 audit[5474]: CRED_ACQ pid=5474 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:16.073309 kernel: audit: type=1103 audit(1707504976.065:1519): pid=5474 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:16.379063 sshd[5472]: pam_unix(sshd:session): session closed for user core Feb 9 18:56:16.381000 audit[5472]: USER_END pid=5472 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:16.384228 systemd[1]: sshd@15-172.31.21.122:22-139.178.68.195:55498.service: Deactivated successfully. Feb 9 18:56:16.386251 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 18:56:16.390302 kernel: audit: type=1106 audit(1707504976.381:1520): pid=5472 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:16.390638 systemd-logind[1633]: Session 15 logged out. Waiting for processes to exit. Feb 9 18:56:16.381000 audit[5472]: CRED_DISP pid=5472 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:16.384000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.21.122:22-139.178.68.195:55498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:16.398562 kernel: audit: type=1104 audit(1707504976.381:1521): pid=5472 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:16.397940 systemd-logind[1633]: Removed session 15. Feb 9 18:56:21.415204 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 18:56:21.415332 kernel: audit: type=1130 audit(1707504981.407:1523): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.21.122:22-139.178.68.195:36530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:21.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.21.122:22-139.178.68.195:36530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:21.407935 systemd[1]: Started sshd@16-172.31.21.122:22-139.178.68.195:36530.service. Feb 9 18:56:21.583000 audit[5485]: USER_ACCT pid=5485 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:21.593792 sshd[5485]: Accepted publickey for core from 139.178.68.195 port 36530 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:56:21.594297 kernel: audit: type=1101 audit(1707504981.583:1524): pid=5485 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:21.595000 audit[5485]: CRED_ACQ pid=5485 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:21.596171 sshd[5485]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:56:21.606021 kernel: audit: type=1103 audit(1707504981.595:1525): pid=5485 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:21.606132 kernel: audit: type=1006 audit(1707504981.595:1526): pid=5485 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 9 18:56:21.606169 kernel: audit: type=1300 audit(1707504981.595:1526): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddb4e0690 a2=3 a3=0 items=0 ppid=1 pid=5485 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:21.595000 audit[5485]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddb4e0690 a2=3 a3=0 items=0 ppid=1 pid=5485 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:21.610465 systemd[1]: Started session-16.scope. Feb 9 18:56:21.612614 systemd-logind[1633]: New session 16 of user core. Feb 9 18:56:21.595000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:56:21.616108 kernel: audit: type=1327 audit(1707504981.595:1526): proctitle=737368643A20636F7265205B707269765D Feb 9 18:56:21.623000 audit[5485]: USER_START pid=5485 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:21.634312 kernel: audit: type=1105 audit(1707504981.623:1527): pid=5485 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:21.634368 kernel: audit: type=1103 audit(1707504981.629:1528): pid=5487 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:21.629000 audit[5487]: CRED_ACQ pid=5487 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:21.845869 sshd[5485]: pam_unix(sshd:session): session closed for user core Feb 9 18:56:21.847000 audit[5485]: USER_END pid=5485 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:21.852479 systemd[1]: sshd@16-172.31.21.122:22-139.178.68.195:36530.service: Deactivated successfully. Feb 9 18:56:21.853627 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 18:56:21.855535 systemd-logind[1633]: Session 16 logged out. Waiting for processes to exit. Feb 9 18:56:21.847000 audit[5485]: CRED_DISP pid=5485 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:21.857629 systemd-logind[1633]: Removed session 16. Feb 9 18:56:21.862317 kernel: audit: type=1106 audit(1707504981.847:1529): pid=5485 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:21.862425 kernel: audit: type=1104 audit(1707504981.847:1530): pid=5485 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:21.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.21.122:22-139.178.68.195:36530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:25.384469 systemd[1]: run-containerd-runc-k8s.io-23c72766c2e2c89c8218b08fae13b3a9fa653d707a922e89f1dc978905066c8c-runc.f3HAbN.mount: Deactivated successfully. Feb 9 18:56:26.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.21.122:22-139.178.68.195:43418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:26.874717 systemd[1]: Started sshd@17-172.31.21.122:22-139.178.68.195:43418.service. Feb 9 18:56:26.884277 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 18:56:26.884340 kernel: audit: type=1130 audit(1707504986.875:1532): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.21.122:22-139.178.68.195:43418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:27.053000 audit[5523]: USER_ACCT pid=5523 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:27.059954 sshd[5523]: Accepted publickey for core from 139.178.68.195 port 43418 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:56:27.060609 kernel: audit: type=1101 audit(1707504987.053:1533): pid=5523 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:27.061231 kernel: audit: type=1103 audit(1707504987.060:1534): pid=5523 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:27.060000 audit[5523]: CRED_ACQ pid=5523 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:27.061000 sshd[5523]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:56:27.069697 systemd[1]: Started session-17.scope. Feb 9 18:56:27.060000 audit[5523]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd721485b0 a2=3 a3=0 items=0 ppid=1 pid=5523 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:27.071931 systemd-logind[1633]: New session 17 of user core. Feb 9 18:56:27.078838 kernel: audit: type=1006 audit(1707504987.060:1535): pid=5523 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 9 18:56:27.078937 kernel: audit: type=1300 audit(1707504987.060:1535): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd721485b0 a2=3 a3=0 items=0 ppid=1 pid=5523 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:27.078972 kernel: audit: type=1327 audit(1707504987.060:1535): proctitle=737368643A20636F7265205B707269765D Feb 9 18:56:27.060000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:56:27.081066 kernel: audit: type=1105 audit(1707504987.079:1536): pid=5523 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:27.079000 audit[5523]: USER_START pid=5523 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:27.081000 audit[5525]: CRED_ACQ pid=5525 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:27.096352 kernel: audit: type=1103 audit(1707504987.081:1537): pid=5525 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:27.288421 sshd[5523]: pam_unix(sshd:session): session closed for user core Feb 9 18:56:27.290000 audit[5523]: USER_END pid=5523 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:27.293889 systemd[1]: sshd@17-172.31.21.122:22-139.178.68.195:43418.service: Deactivated successfully. Feb 9 18:56:27.295157 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 18:56:27.297642 systemd-logind[1633]: Session 17 logged out. Waiting for processes to exit. Feb 9 18:56:27.291000 audit[5523]: CRED_DISP pid=5523 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:27.298967 systemd-logind[1633]: Removed session 17. Feb 9 18:56:27.304996 kernel: audit: type=1106 audit(1707504987.290:1538): pid=5523 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:27.305141 kernel: audit: type=1104 audit(1707504987.291:1539): pid=5523 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:27.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.21.122:22-139.178.68.195:43418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:27.317258 systemd[1]: Started sshd@18-172.31.21.122:22-139.178.68.195:43424.service. Feb 9 18:56:27.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.21.122:22-139.178.68.195:43424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:27.484000 audit[5536]: USER_ACCT pid=5536 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:27.485526 sshd[5536]: Accepted publickey for core from 139.178.68.195 port 43424 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:56:27.487000 audit[5536]: CRED_ACQ pid=5536 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:27.487000 audit[5536]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3d270590 a2=3 a3=0 items=0 ppid=1 pid=5536 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:27.487000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:56:27.487990 sshd[5536]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:56:27.496371 systemd-logind[1633]: New session 18 of user core. Feb 9 18:56:27.496778 systemd[1]: Started session-18.scope. Feb 9 18:56:27.504000 audit[5536]: USER_START pid=5536 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:27.506000 audit[5538]: CRED_ACQ pid=5538 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:28.403570 sshd[5536]: pam_unix(sshd:session): session closed for user core Feb 9 18:56:28.404000 audit[5536]: USER_END pid=5536 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:28.405000 audit[5536]: CRED_DISP pid=5536 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:28.408046 systemd-logind[1633]: Session 18 logged out. Waiting for processes to exit. Feb 9 18:56:28.408215 systemd[1]: sshd@18-172.31.21.122:22-139.178.68.195:43424.service: Deactivated successfully. Feb 9 18:56:28.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.21.122:22-139.178.68.195:43424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.410225 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 18:56:28.411485 systemd-logind[1633]: Removed session 18. Feb 9 18:56:28.432449 systemd[1]: Started sshd@19-172.31.21.122:22-139.178.68.195:43440.service. Feb 9 18:56:28.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.21.122:22-139.178.68.195:43440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.608000 audit[5547]: USER_ACCT pid=5547 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:28.608860 sshd[5547]: Accepted publickey for core from 139.178.68.195 port 43440 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:56:28.609000 audit[5547]: CRED_ACQ pid=5547 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:28.609000 audit[5547]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff011be1f0 a2=3 a3=0 items=0 ppid=1 pid=5547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:28.609000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:56:28.610408 sshd[5547]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:56:28.617826 systemd[1]: Started session-19.scope. Feb 9 18:56:28.618503 systemd-logind[1633]: New session 19 of user core. Feb 9 18:56:28.625000 audit[5547]: USER_START pid=5547 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:28.627000 audit[5549]: CRED_ACQ pid=5549 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:30.095767 kubelet[2665]: I0209 18:56:30.095721 2665 topology_manager.go:212] "Topology Admit Handler" Feb 9 18:56:30.121333 systemd[1]: Created slice kubepods-besteffort-pod7eeb8f4b_7b2d_49bb_83fe_c0d3de60f8e2.slice. Feb 9 18:56:30.255372 kubelet[2665]: I0209 18:56:30.255333 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fgnbq\" (UniqueName: \"kubernetes.io/projected/7eeb8f4b-7b2d-49bb-83fe-c0d3de60f8e2-kube-api-access-fgnbq\") pod \"calico-apiserver-678c79f86f-7rvwd\" (UID: \"7eeb8f4b-7b2d-49bb-83fe-c0d3de60f8e2\") " pod="calico-apiserver/calico-apiserver-678c79f86f-7rvwd" Feb 9 18:56:30.255644 kubelet[2665]: I0209 18:56:30.255630 2665 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/7eeb8f4b-7b2d-49bb-83fe-c0d3de60f8e2-calico-apiserver-certs\") pod \"calico-apiserver-678c79f86f-7rvwd\" (UID: \"7eeb8f4b-7b2d-49bb-83fe-c0d3de60f8e2\") " pod="calico-apiserver/calico-apiserver-678c79f86f-7rvwd" Feb 9 18:56:30.256000 audit[5559]: NETFILTER_CFG table=filter:115 family=2 entries=9 op=nft_register_rule pid=5559 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:30.256000 audit[5559]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffdfff232e0 a2=0 a3=7ffdfff232cc items=0 ppid=2987 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:30.256000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:30.276000 audit[5559]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=5559 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:30.276000 audit[5559]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffdfff232e0 a2=0 a3=7ffdfff232cc items=0 ppid=2987 pid=5559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:30.276000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:30.344000 audit[5561]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=5561 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:30.344000 audit[5561]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe54877410 a2=0 a3=7ffe548773fc items=0 ppid=2987 pid=5561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:30.344000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:30.347000 audit[5561]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=5561 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:30.347000 audit[5561]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe54877410 a2=0 a3=7ffe548773fc items=0 ppid=2987 pid=5561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:30.347000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:30.358566 kubelet[2665]: E0209 18:56:30.357995 2665 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 18:56:30.360319 kubelet[2665]: E0209 18:56:30.360280 2665 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/7eeb8f4b-7b2d-49bb-83fe-c0d3de60f8e2-calico-apiserver-certs podName:7eeb8f4b-7b2d-49bb-83fe-c0d3de60f8e2 nodeName:}" failed. No retries permitted until 2024-02-09 18:56:30.859045427 +0000 UTC m=+99.660035339 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/7eeb8f4b-7b2d-49bb-83fe-c0d3de60f8e2-calico-apiserver-certs") pod "calico-apiserver-678c79f86f-7rvwd" (UID: "7eeb8f4b-7b2d-49bb-83fe-c0d3de60f8e2") : secret "calico-apiserver-certs" not found Feb 9 18:56:30.458323 sshd[5547]: pam_unix(sshd:session): session closed for user core Feb 9 18:56:30.465000 audit[5547]: USER_END pid=5547 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:30.466000 audit[5547]: CRED_DISP pid=5547 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:30.477871 systemd[1]: sshd@19-172.31.21.122:22-139.178.68.195:43440.service: Deactivated successfully. Feb 9 18:56:30.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.21.122:22-139.178.68.195:43440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:30.487555 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 18:56:30.489465 systemd-logind[1633]: Session 19 logged out. Waiting for processes to exit. Feb 9 18:56:30.492780 systemd-logind[1633]: Removed session 19. Feb 9 18:56:30.497586 systemd[1]: Started sshd@20-172.31.21.122:22-139.178.68.195:43456.service. Feb 9 18:56:30.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.21.122:22-139.178.68.195:43456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:30.682000 audit[5565]: USER_ACCT pid=5565 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:30.683542 sshd[5565]: Accepted publickey for core from 139.178.68.195 port 43456 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:56:30.684000 audit[5565]: CRED_ACQ pid=5565 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:30.684000 audit[5565]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0afc6cb0 a2=3 a3=0 items=0 ppid=1 pid=5565 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:30.684000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:56:30.691867 sshd[5565]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:56:30.704209 systemd-logind[1633]: New session 20 of user core. Feb 9 18:56:30.706885 systemd[1]: Started session-20.scope. Feb 9 18:56:30.716000 audit[5565]: USER_START pid=5565 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:30.718000 audit[5567]: CRED_ACQ pid=5567 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:31.031329 env[1643]: time="2024-02-09T18:56:31.031188448Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-678c79f86f-7rvwd,Uid:7eeb8f4b-7b2d-49bb-83fe-c0d3de60f8e2,Namespace:calico-apiserver,Attempt:0,}" Feb 9 18:56:31.443000 audit[5585]: NETFILTER_CFG table=filter:119 family=2 entries=22 op=nft_register_rule pid=5585 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:31.443000 audit[5585]: SYSCALL arch=c000003e syscall=46 success=yes exit=11996 a0=3 a1=7ffd7285ede0 a2=0 a3=7ffd7285edcc items=0 ppid=2987 pid=5585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:31.443000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:31.445000 audit[5585]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=5585 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:31.445000 audit[5585]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd7285ede0 a2=0 a3=31030 items=0 ppid=2987 pid=5585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:31.445000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:31.811367 systemd-networkd[1462]: cali2ed41a88c26: Link UP Feb 9 18:56:31.814011 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:56:31.814108 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2ed41a88c26: link becomes ready Feb 9 18:56:31.814352 systemd-networkd[1462]: cali2ed41a88c26: Gained carrier Feb 9 18:56:31.821251 (udev-worker)[5595]: Network interface NamePolicy= disabled on kernel command line. Feb 9 18:56:31.832667 env[1643]: 2024-02-09 18:56:31.642 [INFO][5574] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--122-k8s-calico--apiserver--678c79f86f--7rvwd-eth0 calico-apiserver-678c79f86f- calico-apiserver 7eeb8f4b-7b2d-49bb-83fe-c0d3de60f8e2 1115 0 2024-02-09 18:56:29 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:678c79f86f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-21-122 calico-apiserver-678c79f86f-7rvwd eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali2ed41a88c26 [] []}} ContainerID="a8b8063dedd2c88743e26ce77722fc291633dabcb14a6adebea4edb5696ca20e" Namespace="calico-apiserver" Pod="calico-apiserver-678c79f86f-7rvwd" WorkloadEndpoint="ip--172--31--21--122-k8s-calico--apiserver--678c79f86f--7rvwd-" Feb 9 18:56:31.832667 env[1643]: 2024-02-09 18:56:31.642 [INFO][5574] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="a8b8063dedd2c88743e26ce77722fc291633dabcb14a6adebea4edb5696ca20e" Namespace="calico-apiserver" Pod="calico-apiserver-678c79f86f-7rvwd" WorkloadEndpoint="ip--172--31--21--122-k8s-calico--apiserver--678c79f86f--7rvwd-eth0" Feb 9 18:56:31.832667 env[1643]: 2024-02-09 18:56:31.719 [INFO][5588] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a8b8063dedd2c88743e26ce77722fc291633dabcb14a6adebea4edb5696ca20e" HandleID="k8s-pod-network.a8b8063dedd2c88743e26ce77722fc291633dabcb14a6adebea4edb5696ca20e" Workload="ip--172--31--21--122-k8s-calico--apiserver--678c79f86f--7rvwd-eth0" Feb 9 18:56:31.832667 env[1643]: 2024-02-09 18:56:31.737 [INFO][5588] ipam_plugin.go 268: Auto assigning IP ContainerID="a8b8063dedd2c88743e26ce77722fc291633dabcb14a6adebea4edb5696ca20e" HandleID="k8s-pod-network.a8b8063dedd2c88743e26ce77722fc291633dabcb14a6adebea4edb5696ca20e" Workload="ip--172--31--21--122-k8s-calico--apiserver--678c79f86f--7rvwd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002bea90), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-21-122", "pod":"calico-apiserver-678c79f86f-7rvwd", "timestamp":"2024-02-09 18:56:31.719511034 +0000 UTC"}, Hostname:"ip-172-31-21-122", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:56:31.832667 env[1643]: 2024-02-09 18:56:31.737 [INFO][5588] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:56:31.832667 env[1643]: 2024-02-09 18:56:31.737 [INFO][5588] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:56:31.832667 env[1643]: 2024-02-09 18:56:31.737 [INFO][5588] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-122' Feb 9 18:56:31.832667 env[1643]: 2024-02-09 18:56:31.740 [INFO][5588] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a8b8063dedd2c88743e26ce77722fc291633dabcb14a6adebea4edb5696ca20e" host="ip-172-31-21-122" Feb 9 18:56:31.832667 env[1643]: 2024-02-09 18:56:31.750 [INFO][5588] ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-122" Feb 9 18:56:31.832667 env[1643]: 2024-02-09 18:56:31.758 [INFO][5588] ipam.go 489: Trying affinity for 192.168.4.64/26 host="ip-172-31-21-122" Feb 9 18:56:31.832667 env[1643]: 2024-02-09 18:56:31.762 [INFO][5588] ipam.go 155: Attempting to load block cidr=192.168.4.64/26 host="ip-172-31-21-122" Feb 9 18:56:31.832667 env[1643]: 2024-02-09 18:56:31.766 [INFO][5588] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.4.64/26 host="ip-172-31-21-122" Feb 9 18:56:31.832667 env[1643]: 2024-02-09 18:56:31.767 [INFO][5588] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.4.64/26 handle="k8s-pod-network.a8b8063dedd2c88743e26ce77722fc291633dabcb14a6adebea4edb5696ca20e" host="ip-172-31-21-122" Feb 9 18:56:31.832667 env[1643]: 2024-02-09 18:56:31.770 [INFO][5588] ipam.go 1682: Creating new handle: k8s-pod-network.a8b8063dedd2c88743e26ce77722fc291633dabcb14a6adebea4edb5696ca20e Feb 9 18:56:31.832667 env[1643]: 2024-02-09 18:56:31.790 [INFO][5588] ipam.go 1203: Writing block in order to claim IPs block=192.168.4.64/26 handle="k8s-pod-network.a8b8063dedd2c88743e26ce77722fc291633dabcb14a6adebea4edb5696ca20e" host="ip-172-31-21-122" Feb 9 18:56:31.832667 env[1643]: 2024-02-09 18:56:31.802 [INFO][5588] ipam.go 1216: Successfully claimed IPs: [192.168.4.69/26] block=192.168.4.64/26 handle="k8s-pod-network.a8b8063dedd2c88743e26ce77722fc291633dabcb14a6adebea4edb5696ca20e" host="ip-172-31-21-122" Feb 9 18:56:31.832667 env[1643]: 2024-02-09 18:56:31.802 [INFO][5588] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.4.69/26] handle="k8s-pod-network.a8b8063dedd2c88743e26ce77722fc291633dabcb14a6adebea4edb5696ca20e" host="ip-172-31-21-122" Feb 9 18:56:31.832667 env[1643]: 2024-02-09 18:56:31.802 [INFO][5588] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:56:31.832667 env[1643]: 2024-02-09 18:56:31.802 [INFO][5588] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.4.69/26] IPv6=[] ContainerID="a8b8063dedd2c88743e26ce77722fc291633dabcb14a6adebea4edb5696ca20e" HandleID="k8s-pod-network.a8b8063dedd2c88743e26ce77722fc291633dabcb14a6adebea4edb5696ca20e" Workload="ip--172--31--21--122-k8s-calico--apiserver--678c79f86f--7rvwd-eth0" Feb 9 18:56:31.835867 env[1643]: 2024-02-09 18:56:31.806 [INFO][5574] k8s.go 385: Populated endpoint ContainerID="a8b8063dedd2c88743e26ce77722fc291633dabcb14a6adebea4edb5696ca20e" Namespace="calico-apiserver" Pod="calico-apiserver-678c79f86f-7rvwd" WorkloadEndpoint="ip--172--31--21--122-k8s-calico--apiserver--678c79f86f--7rvwd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--122-k8s-calico--apiserver--678c79f86f--7rvwd-eth0", GenerateName:"calico-apiserver-678c79f86f-", Namespace:"calico-apiserver", SelfLink:"", UID:"7eeb8f4b-7b2d-49bb-83fe-c0d3de60f8e2", ResourceVersion:"1115", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 56, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"678c79f86f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-122", ContainerID:"", Pod:"calico-apiserver-678c79f86f-7rvwd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.4.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2ed41a88c26", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:56:31.835867 env[1643]: 2024-02-09 18:56:31.807 [INFO][5574] k8s.go 386: Calico CNI using IPs: [192.168.4.69/32] ContainerID="a8b8063dedd2c88743e26ce77722fc291633dabcb14a6adebea4edb5696ca20e" Namespace="calico-apiserver" Pod="calico-apiserver-678c79f86f-7rvwd" WorkloadEndpoint="ip--172--31--21--122-k8s-calico--apiserver--678c79f86f--7rvwd-eth0" Feb 9 18:56:31.835867 env[1643]: 2024-02-09 18:56:31.807 [INFO][5574] dataplane_linux.go 68: Setting the host side veth name to cali2ed41a88c26 ContainerID="a8b8063dedd2c88743e26ce77722fc291633dabcb14a6adebea4edb5696ca20e" Namespace="calico-apiserver" Pod="calico-apiserver-678c79f86f-7rvwd" WorkloadEndpoint="ip--172--31--21--122-k8s-calico--apiserver--678c79f86f--7rvwd-eth0" Feb 9 18:56:31.835867 env[1643]: 2024-02-09 18:56:31.809 [INFO][5574] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a8b8063dedd2c88743e26ce77722fc291633dabcb14a6adebea4edb5696ca20e" Namespace="calico-apiserver" Pod="calico-apiserver-678c79f86f-7rvwd" WorkloadEndpoint="ip--172--31--21--122-k8s-calico--apiserver--678c79f86f--7rvwd-eth0" Feb 9 18:56:31.835867 env[1643]: 2024-02-09 18:56:31.810 [INFO][5574] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="a8b8063dedd2c88743e26ce77722fc291633dabcb14a6adebea4edb5696ca20e" Namespace="calico-apiserver" Pod="calico-apiserver-678c79f86f-7rvwd" WorkloadEndpoint="ip--172--31--21--122-k8s-calico--apiserver--678c79f86f--7rvwd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--122-k8s-calico--apiserver--678c79f86f--7rvwd-eth0", GenerateName:"calico-apiserver-678c79f86f-", Namespace:"calico-apiserver", SelfLink:"", UID:"7eeb8f4b-7b2d-49bb-83fe-c0d3de60f8e2", ResourceVersion:"1115", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 56, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"678c79f86f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-122", ContainerID:"a8b8063dedd2c88743e26ce77722fc291633dabcb14a6adebea4edb5696ca20e", Pod:"calico-apiserver-678c79f86f-7rvwd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.4.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2ed41a88c26", MAC:"96:7a:81:95:6d:36", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:56:31.835867 env[1643]: 2024-02-09 18:56:31.828 [INFO][5574] k8s.go 491: Wrote updated endpoint to datastore ContainerID="a8b8063dedd2c88743e26ce77722fc291633dabcb14a6adebea4edb5696ca20e" Namespace="calico-apiserver" Pod="calico-apiserver-678c79f86f-7rvwd" WorkloadEndpoint="ip--172--31--21--122-k8s-calico--apiserver--678c79f86f--7rvwd-eth0" Feb 9 18:56:31.921297 env[1643]: time="2024-02-09T18:56:31.919730718Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:56:31.921297 env[1643]: time="2024-02-09T18:56:31.919865672Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:56:31.921297 env[1643]: time="2024-02-09T18:56:31.919901407Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:56:31.921297 env[1643]: time="2024-02-09T18:56:31.920172098Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a8b8063dedd2c88743e26ce77722fc291633dabcb14a6adebea4edb5696ca20e pid=5619 runtime=io.containerd.runc.v2 Feb 9 18:56:31.969914 systemd[1]: Started cri-containerd-a8b8063dedd2c88743e26ce77722fc291633dabcb14a6adebea4edb5696ca20e.scope. Feb 9 18:56:32.027794 kernel: kauditd_printk_skb: 49 callbacks suppressed Feb 9 18:56:32.028015 kernel: audit: type=1325 audit(1707504992.021:1571): table=filter:121 family=2 entries=59 op=nft_register_chain pid=5639 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:56:32.021000 audit[5639]: NETFILTER_CFG table=filter:121 family=2 entries=59 op=nft_register_chain pid=5639 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:56:32.021000 audit[5639]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffcd77fdd30 a2=0 a3=7ffcd77fdd1c items=0 ppid=4970 pid=5639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:32.038352 kernel: audit: type=1300 audit(1707504992.021:1571): arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffcd77fdd30 a2=0 a3=7ffcd77fdd1c items=0 ppid=4970 pid=5639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:32.021000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:56:32.046391 kernel: audit: type=1327 audit(1707504992.021:1571): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:56:32.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.076607 kernel: audit: type=1400 audit(1707504992.063:1572): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.088431 kernel: audit: type=1400 audit(1707504992.063:1573): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.102991 kernel: audit: type=1400 audit(1707504992.063:1574): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.103084 kernel: audit: type=1400 audit(1707504992.063:1575): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.109425 kernel: audit: type=1400 audit(1707504992.063:1576): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.118397 kernel: audit: type=1400 audit(1707504992.063:1577): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.123837 kernel: audit: type=1400 audit(1707504992.063:1578): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.064000 audit: BPF prog-id=207 op=LOAD Feb 9 18:56:32.066000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.066000 audit[5628]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5619 pid=5628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:32.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138623830363364656464326338383734336532366365373737323266 Feb 9 18:56:32.066000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.066000 audit[5628]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=5619 pid=5628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:32.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138623830363364656464326338383734336532366365373737323266 Feb 9 18:56:32.066000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.066000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.066000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.066000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.066000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.066000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.066000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.066000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.066000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.066000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.066000 audit: BPF prog-id=208 op=LOAD Feb 9 18:56:32.066000 audit[5628]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003cc720 items=0 ppid=5619 pid=5628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:32.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138623830363364656464326338383734336532366365373737323266 Feb 9 18:56:32.074000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.074000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.074000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.074000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.074000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.074000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.074000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.074000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.074000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.074000 audit: BPF prog-id=209 op=LOAD Feb 9 18:56:32.074000 audit[5628]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003cc768 items=0 ppid=5619 pid=5628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:32.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138623830363364656464326338383734336532366365373737323266 Feb 9 18:56:32.075000 audit: BPF prog-id=209 op=UNLOAD Feb 9 18:56:32.075000 audit: BPF prog-id=208 op=UNLOAD Feb 9 18:56:32.075000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.075000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.075000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.075000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.075000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.075000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.075000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.075000 audit[5628]: AVC avc: denied { perfmon } for pid=5628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.075000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.075000 audit[5628]: AVC avc: denied { bpf } for pid=5628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:32.075000 audit: BPF prog-id=210 op=LOAD Feb 9 18:56:32.075000 audit[5628]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ccb78 items=0 ppid=5619 pid=5628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:32.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138623830363364656464326338383734336532366365373737323266 Feb 9 18:56:32.174176 env[1643]: time="2024-02-09T18:56:32.174127263Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-678c79f86f-7rvwd,Uid:7eeb8f4b-7b2d-49bb-83fe-c0d3de60f8e2,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"a8b8063dedd2c88743e26ce77722fc291633dabcb14a6adebea4edb5696ca20e\"" Feb 9 18:56:32.190317 env[1643]: time="2024-02-09T18:56:32.190266191Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 18:56:32.747640 sshd[5565]: pam_unix(sshd:session): session closed for user core Feb 9 18:56:32.757000 audit[5565]: USER_END pid=5565 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:32.758000 audit[5565]: CRED_DISP pid=5565 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:32.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.21.122:22-139.178.68.195:43456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:32.766013 systemd[1]: sshd@20-172.31.21.122:22-139.178.68.195:43456.service: Deactivated successfully. Feb 9 18:56:32.771011 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 18:56:32.771877 systemd-logind[1633]: Session 20 logged out. Waiting for processes to exit. Feb 9 18:56:32.788234 systemd[1]: Started sshd@21-172.31.21.122:22-139.178.68.195:43458.service. Feb 9 18:56:32.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.21.122:22-139.178.68.195:43458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:32.796698 systemd-logind[1633]: Removed session 20. Feb 9 18:56:32.965000 audit[5659]: USER_ACCT pid=5659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:32.966224 sshd[5659]: Accepted publickey for core from 139.178.68.195 port 43458 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:56:32.970000 audit[5659]: CRED_ACQ pid=5659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:32.970000 audit[5659]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3b297db0 a2=3 a3=0 items=0 ppid=1 pid=5659 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:32.970000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:56:32.971160 sshd[5659]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:56:32.976394 systemd-logind[1633]: New session 21 of user core. Feb 9 18:56:32.980044 systemd[1]: Started session-21.scope. Feb 9 18:56:32.992000 audit[5659]: USER_START pid=5659 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:32.994000 audit[5661]: CRED_ACQ pid=5661 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:33.220477 sshd[5659]: pam_unix(sshd:session): session closed for user core Feb 9 18:56:33.222000 audit[5659]: USER_END pid=5659 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:33.222000 audit[5659]: CRED_DISP pid=5659 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:33.226504 systemd[1]: sshd@21-172.31.21.122:22-139.178.68.195:43458.service: Deactivated successfully. Feb 9 18:56:33.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.21.122:22-139.178.68.195:43458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:33.228887 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 18:56:33.230450 systemd-logind[1633]: Session 21 logged out. Waiting for processes to exit. Feb 9 18:56:33.231773 systemd-logind[1633]: Removed session 21. Feb 9 18:56:33.348534 systemd-networkd[1462]: cali2ed41a88c26: Gained IPv6LL Feb 9 18:56:37.474689 env[1643]: time="2024-02-09T18:56:37.474636802Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:37.488555 env[1643]: time="2024-02-09T18:56:37.483345526Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:37.489383 env[1643]: time="2024-02-09T18:56:37.489344056Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:37.498148 env[1643]: time="2024-02-09T18:56:37.498104932Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:37.500141 env[1643]: time="2024-02-09T18:56:37.500002666Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 18:56:37.518856 env[1643]: time="2024-02-09T18:56:37.518807126Z" level=info msg="CreateContainer within sandbox \"a8b8063dedd2c88743e26ce77722fc291633dabcb14a6adebea4edb5696ca20e\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 18:56:37.552828 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount868135555.mount: Deactivated successfully. Feb 9 18:56:37.563497 env[1643]: time="2024-02-09T18:56:37.563415596Z" level=info msg="CreateContainer within sandbox \"a8b8063dedd2c88743e26ce77722fc291633dabcb14a6adebea4edb5696ca20e\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"1669e69816967f9eed6c2b3bc9fce80e7bb981a86484fa1577f892485b230ff5\"" Feb 9 18:56:37.567582 env[1643]: time="2024-02-09T18:56:37.567528397Z" level=info msg="StartContainer for \"1669e69816967f9eed6c2b3bc9fce80e7bb981a86484fa1577f892485b230ff5\"" Feb 9 18:56:37.629046 systemd[1]: Started cri-containerd-1669e69816967f9eed6c2b3bc9fce80e7bb981a86484fa1577f892485b230ff5.scope. Feb 9 18:56:37.658542 kernel: kauditd_printk_skb: 64 callbacks suppressed Feb 9 18:56:37.658701 kernel: audit: type=1400 audit(1707504997.652:1602): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.664185 kernel: audit: type=1400 audit(1707504997.652:1603): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.677328 kernel: audit: type=1400 audit(1707504997.652:1604): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.688840 kernel: audit: type=1400 audit(1707504997.652:1605): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.688984 kernel: audit: type=1400 audit(1707504997.652:1606): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.694222 kernel: audit: type=1400 audit(1707504997.652:1607): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.699398 kernel: audit: type=1400 audit(1707504997.652:1608): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.708745 kernel: audit: type=1400 audit(1707504997.652:1609): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.708859 kernel: audit: type=1400 audit(1707504997.652:1610): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.715343 kernel: audit: type=1400 audit(1707504997.658:1611): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.658000 audit: BPF prog-id=211 op=LOAD Feb 9 18:56:37.658000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.658000 audit[5683]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5619 pid=5683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:37.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136363965363938313639363766396565643663326233626339666365 Feb 9 18:56:37.658000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.658000 audit[5683]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=5619 pid=5683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:37.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136363965363938313639363766396565643663326233626339666365 Feb 9 18:56:37.658000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.658000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.658000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.658000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.658000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.658000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.658000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.658000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.658000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.658000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.658000 audit: BPF prog-id=212 op=LOAD Feb 9 18:56:37.658000 audit[5683]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003b2390 items=0 ppid=5619 pid=5683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:37.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136363965363938313639363766396565643663326233626339666365 Feb 9 18:56:37.664000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.664000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.664000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.664000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.664000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.664000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.664000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.664000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.664000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.664000 audit: BPF prog-id=213 op=LOAD Feb 9 18:56:37.664000 audit[5683]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003b23d8 items=0 ppid=5619 pid=5683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:37.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136363965363938313639363766396565643663326233626339666365 Feb 9 18:56:37.664000 audit: BPF prog-id=213 op=UNLOAD Feb 9 18:56:37.664000 audit: BPF prog-id=212 op=UNLOAD Feb 9 18:56:37.664000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.664000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.664000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.664000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.664000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.664000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.664000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.664000 audit[5683]: AVC avc: denied { perfmon } for pid=5683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.664000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.664000 audit[5683]: AVC avc: denied { bpf } for pid=5683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.664000 audit: BPF prog-id=214 op=LOAD Feb 9 18:56:37.664000 audit[5683]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b27e8 items=0 ppid=5619 pid=5683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:37.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136363965363938313639363766396565643663326233626339666365 Feb 9 18:56:37.746073 env[1643]: time="2024-02-09T18:56:37.744770290Z" level=info msg="StartContainer for \"1669e69816967f9eed6c2b3bc9fce80e7bb981a86484fa1577f892485b230ff5\" returns successfully" Feb 9 18:56:38.093000 audit[5716]: NETFILTER_CFG table=filter:122 family=2 entries=34 op=nft_register_rule pid=5716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:38.093000 audit[5716]: SYSCALL arch=c000003e syscall=46 success=yes exit=11996 a0=3 a1=7ffcea01dba0 a2=0 a3=7ffcea01db8c items=0 ppid=2987 pid=5716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:38.093000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:38.094000 audit[5716]: NETFILTER_CFG table=nat:123 family=2 entries=20 op=nft_register_rule pid=5716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:38.094000 audit[5716]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffcea01dba0 a2=0 a3=31030 items=0 ppid=2987 pid=5716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:38.094000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:38.253931 systemd[1]: Started sshd@22-172.31.21.122:22-139.178.68.195:33970.service. Feb 9 18:56:38.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.21.122:22-139.178.68.195:33970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:38.457000 audit[5718]: USER_ACCT pid=5718 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:38.458060 sshd[5718]: Accepted publickey for core from 139.178.68.195 port 33970 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:56:38.459000 audit[5718]: CRED_ACQ pid=5718 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:38.459000 audit[5718]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed566ada0 a2=3 a3=0 items=0 ppid=1 pid=5718 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:38.459000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:56:38.461357 sshd[5718]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:56:38.470704 systemd-logind[1633]: New session 22 of user core. Feb 9 18:56:38.471502 systemd[1]: Started session-22.scope. Feb 9 18:56:38.484000 audit[5718]: USER_START pid=5718 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:38.486000 audit[5720]: CRED_ACQ pid=5720 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:38.504000 audit[5694]: AVC avc: denied { watch } for pid=5694 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_56_30.3887166161/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c779,c977 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c779,c977 tclass=file permissive=0 Feb 9 18:56:38.504000 audit[5694]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000dfde60 a2=fc6 a3=0 items=0 ppid=5619 pid=5694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c779,c977 key=(null) Feb 9 18:56:38.504000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:56:38.769508 sshd[5718]: pam_unix(sshd:session): session closed for user core Feb 9 18:56:38.770000 audit[5718]: USER_END pid=5718 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:38.771000 audit[5718]: CRED_DISP pid=5718 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:38.773245 systemd[1]: sshd@22-172.31.21.122:22-139.178.68.195:33970.service: Deactivated successfully. Feb 9 18:56:38.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.21.122:22-139.178.68.195:33970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:38.774323 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 18:56:38.775689 systemd-logind[1633]: Session 22 logged out. Waiting for processes to exit. Feb 9 18:56:38.776901 systemd-logind[1633]: Removed session 22. Feb 9 18:56:39.404000 audit[5730]: NETFILTER_CFG table=filter:124 family=2 entries=22 op=nft_register_rule pid=5730 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:39.404000 audit[5730]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc04cfeee0 a2=0 a3=7ffc04cfeecc items=0 ppid=2987 pid=5730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:39.404000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:39.413000 audit[5730]: NETFILTER_CFG table=nat:125 family=2 entries=104 op=nft_register_chain pid=5730 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:39.413000 audit[5730]: SYSCALL arch=c000003e syscall=46 success=yes exit=47436 a0=3 a1=7ffc04cfeee0 a2=0 a3=7ffc04cfeecc items=0 ppid=2987 pid=5730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:39.413000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:41.622077 systemd[1]: run-containerd-runc-k8s.io-3b43bd4f9b8320ba673e92820ebc9041a620aef509c264cae3ad0ef56c0502bd-runc.Iu4dEA.mount: Deactivated successfully. Feb 9 18:56:42.085078 systemd[1]: run-containerd-runc-k8s.io-23c72766c2e2c89c8218b08fae13b3a9fa653d707a922e89f1dc978905066c8c-runc.QojCZ6.mount: Deactivated successfully. Feb 9 18:56:43.432677 kernel: kauditd_printk_skb: 73 callbacks suppressed Feb 9 18:56:43.432838 kernel: audit: type=1325 audit(1707505003.427:1634): table=filter:126 family=2 entries=10 op=nft_register_rule pid=5775 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:43.427000 audit[5775]: NETFILTER_CFG table=filter:126 family=2 entries=10 op=nft_register_rule pid=5775 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:43.427000 audit[5775]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fffe538d310 a2=0 a3=7fffe538d2fc items=0 ppid=2987 pid=5775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:43.442322 kernel: audit: type=1300 audit(1707505003.427:1634): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fffe538d310 a2=0 a3=7fffe538d2fc items=0 ppid=2987 pid=5775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:43.427000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:43.438000 audit[5775]: NETFILTER_CFG table=nat:127 family=2 entries=44 op=nft_register_rule pid=5775 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:43.450225 kernel: audit: type=1327 audit(1707505003.427:1634): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:43.450987 kernel: audit: type=1325 audit(1707505003.438:1635): table=nat:127 family=2 entries=44 op=nft_register_rule pid=5775 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:43.451042 kernel: audit: type=1300 audit(1707505003.438:1635): arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7fffe538d310 a2=0 a3=7fffe538d2fc items=0 ppid=2987 pid=5775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:43.438000 audit[5775]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7fffe538d310 a2=0 a3=7fffe538d2fc items=0 ppid=2987 pid=5775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:43.438000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:43.462398 kernel: audit: type=1327 audit(1707505003.438:1635): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:43.799589 systemd[1]: Started sshd@23-172.31.21.122:22-139.178.68.195:33984.service. Feb 9 18:56:43.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.21.122:22-139.178.68.195:33984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:43.808515 kernel: audit: type=1130 audit(1707505003.801:1636): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.21.122:22-139.178.68.195:33984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:43.998000 audit[5777]: USER_ACCT pid=5777 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:44.017201 kernel: audit: type=1101 audit(1707505003.998:1637): pid=5777 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:44.017305 kernel: audit: type=1103 audit(1707505004.007:1638): pid=5777 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:44.017341 kernel: audit: type=1006 audit(1707505004.007:1639): pid=5777 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 9 18:56:44.007000 audit[5777]: CRED_ACQ pid=5777 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:44.017934 sshd[5777]: Accepted publickey for core from 139.178.68.195 port 33984 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:56:44.010092 sshd[5777]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:56:44.007000 audit[5777]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd70829b0 a2=3 a3=0 items=0 ppid=1 pid=5777 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:44.007000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:56:44.027012 systemd-logind[1633]: New session 23 of user core. Feb 9 18:56:44.027607 systemd[1]: Started session-23.scope. Feb 9 18:56:44.036000 audit[5777]: USER_START pid=5777 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:44.045000 audit[5779]: CRED_ACQ pid=5779 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:44.346775 sshd[5777]: pam_unix(sshd:session): session closed for user core Feb 9 18:56:44.348000 audit[5777]: USER_END pid=5777 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:44.348000 audit[5777]: CRED_DISP pid=5777 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:44.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.21.122:22-139.178.68.195:33984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:44.353851 systemd[1]: sshd@23-172.31.21.122:22-139.178.68.195:33984.service: Deactivated successfully. Feb 9 18:56:44.356055 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 18:56:44.357118 systemd-logind[1633]: Session 23 logged out. Waiting for processes to exit. Feb 9 18:56:44.360342 systemd-logind[1633]: Removed session 23. Feb 9 18:56:46.122000 audit[2518]: AVC avc: denied { watch } for pid=2518 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:56:46.122000 audit[2518]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002711710 a2=fc6 a3=0 items=0 ppid=2354 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 key=(null) Feb 9 18:56:46.122000 audit[2518]: AVC avc: denied { watch } for pid=2518 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:56:46.122000 audit[2518]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002868f20 a2=fc6 a3=0 items=0 ppid=2354 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 key=(null) Feb 9 18:56:46.122000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:56:46.122000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:56:47.636000 audit[2496]: AVC avc: denied { watch } for pid=2496 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:56:47.636000 audit[2496]: AVC avc: denied { watch } for pid=2496 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:56:47.636000 audit[2496]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c0098b4740 a2=fc6 a3=0 items=0 ppid=2374 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 key=(null) Feb 9 18:56:47.636000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 18:56:47.636000 audit[2496]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c009780540 a2=fc6 a3=0 items=0 ppid=2374 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 key=(null) Feb 9 18:56:47.636000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 18:56:47.638000 audit[2496]: AVC avc: denied { watch } for pid=2496 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:56:47.638000 audit[2496]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c0097805a0 a2=fc6 a3=0 items=0 ppid=2374 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 key=(null) Feb 9 18:56:47.638000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 18:56:47.638000 audit[2496]: AVC avc: denied { watch } for pid=2496 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521018 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:56:47.638000 audit[2496]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c0096370b0 a2=fc6 a3=0 items=0 ppid=2374 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 key=(null) Feb 9 18:56:47.638000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 18:56:47.693000 audit[2496]: AVC avc: denied { watch } for pid=2496 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:56:47.693000 audit[2496]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c009637c50 a2=fc6 a3=0 items=0 ppid=2374 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 key=(null) Feb 9 18:56:47.693000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 18:56:47.695000 audit[2496]: AVC avc: denied { watch } for pid=2496 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:56:47.695000 audit[2496]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c009b321c0 a2=fc6 a3=0 items=0 ppid=2374 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c340,c420 key=(null) Feb 9 18:56:47.695000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E313232002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 9 18:56:49.374968 systemd[1]: Started sshd@24-172.31.21.122:22-139.178.68.195:48206.service. Feb 9 18:56:49.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.21.122:22-139.178.68.195:48206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:49.376945 kernel: kauditd_printk_skb: 31 callbacks suppressed Feb 9 18:56:49.377034 kernel: audit: type=1130 audit(1707505009.375:1653): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.21.122:22-139.178.68.195:48206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:49.575428 kernel: audit: type=1101 audit(1707505009.568:1654): pid=5790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:49.575547 kernel: audit: type=1103 audit(1707505009.574:1655): pid=5790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:49.568000 audit[5790]: USER_ACCT pid=5790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:49.574000 audit[5790]: CRED_ACQ pid=5790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:49.575787 sshd[5790]: Accepted publickey for core from 139.178.68.195 port 48206 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:56:49.578062 sshd[5790]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:56:49.583943 kernel: audit: type=1006 audit(1707505009.574:1656): pid=5790 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 9 18:56:49.586149 kernel: audit: type=1300 audit(1707505009.574:1656): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9d9a1410 a2=3 a3=0 items=0 ppid=1 pid=5790 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:49.574000 audit[5790]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9d9a1410 a2=3 a3=0 items=0 ppid=1 pid=5790 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:49.585741 systemd[1]: Started session-24.scope. Feb 9 18:56:49.587988 systemd-logind[1633]: New session 24 of user core. Feb 9 18:56:49.574000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:56:49.600642 kernel: audit: type=1327 audit(1707505009.574:1656): proctitle=737368643A20636F7265205B707269765D Feb 9 18:56:49.600753 kernel: audit: type=1105 audit(1707505009.596:1657): pid=5790 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:49.596000 audit[5790]: USER_START pid=5790 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:49.597000 audit[5792]: CRED_ACQ pid=5792 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:49.610177 kernel: audit: type=1103 audit(1707505009.597:1658): pid=5792 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:49.826978 sshd[5790]: pam_unix(sshd:session): session closed for user core Feb 9 18:56:49.828000 audit[5790]: USER_END pid=5790 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:49.830647 systemd[1]: sshd@24-172.31.21.122:22-139.178.68.195:48206.service: Deactivated successfully. Feb 9 18:56:49.831709 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 18:56:49.836451 kernel: audit: type=1106 audit(1707505009.828:1659): pid=5790 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:49.828000 audit[5790]: CRED_DISP pid=5790 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:49.836968 systemd-logind[1633]: Session 24 logged out. Waiting for processes to exit. Feb 9 18:56:49.838998 systemd-logind[1633]: Removed session 24. Feb 9 18:56:49.842381 kernel: audit: type=1104 audit(1707505009.828:1660): pid=5790 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:49.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.21.122:22-139.178.68.195:48206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:49.932000 audit[2518]: AVC avc: denied { watch } for pid=2518 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:56:49.932000 audit[2518]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001bc0ac0 a2=fc6 a3=0 items=0 ppid=2354 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 key=(null) Feb 9 18:56:49.932000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:56:49.938000 audit[2518]: AVC avc: denied { watch } for pid=2518 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:56:49.938000 audit[2518]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001bc0ae0 a2=fc6 a3=0 items=0 ppid=2354 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 key=(null) Feb 9 18:56:49.938000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:56:49.938000 audit[2518]: AVC avc: denied { watch } for pid=2518 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:56:49.938000 audit[2518]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001bc0b00 a2=fc6 a3=0 items=0 ppid=2354 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 key=(null) Feb 9 18:56:49.938000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:56:49.940000 audit[2518]: AVC avc: denied { watch } for pid=2518 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:56:49.940000 audit[2518]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002869440 a2=fc6 a3=0 items=0 ppid=2354 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 key=(null) Feb 9 18:56:49.940000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:56:54.867069 systemd[1]: Started sshd@25-172.31.21.122:22-139.178.68.195:48220.service. Feb 9 18:56:54.873323 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 18:56:54.873924 kernel: audit: type=1130 audit(1707505014.870:1666): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.21.122:22-139.178.68.195:48220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:54.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.21.122:22-139.178.68.195:48220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:55.048000 audit[5805]: USER_ACCT pid=5805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:55.055449 kernel: audit: type=1101 audit(1707505015.048:1667): pid=5805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:55.055676 sshd[5805]: Accepted publickey for core from 139.178.68.195 port 48220 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:56:55.055000 audit[5805]: CRED_ACQ pid=5805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:55.056845 sshd[5805]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:56:55.064319 systemd[1]: Started session-25.scope. Feb 9 18:56:55.067105 kernel: audit: type=1103 audit(1707505015.055:1668): pid=5805 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:55.067171 kernel: audit: type=1006 audit(1707505015.055:1669): pid=5805 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 9 18:56:55.067856 kernel: audit: type=1300 audit(1707505015.055:1669): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9fe114b0 a2=3 a3=0 items=0 ppid=1 pid=5805 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:55.055000 audit[5805]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9fe114b0 a2=3 a3=0 items=0 ppid=1 pid=5805 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:55.067323 systemd-logind[1633]: New session 25 of user core. Feb 9 18:56:55.055000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:56:55.077000 audit[5805]: USER_START pid=5805 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:55.091050 kernel: audit: type=1327 audit(1707505015.055:1669): proctitle=737368643A20636F7265205B707269765D Feb 9 18:56:55.091190 kernel: audit: type=1105 audit(1707505015.077:1670): pid=5805 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:55.080000 audit[5807]: CRED_ACQ pid=5807 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:55.099509 kernel: audit: type=1103 audit(1707505015.080:1671): pid=5807 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:55.287407 sshd[5805]: pam_unix(sshd:session): session closed for user core Feb 9 18:56:55.289000 audit[5805]: USER_END pid=5805 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:55.292567 systemd[1]: sshd@25-172.31.21.122:22-139.178.68.195:48220.service: Deactivated successfully. Feb 9 18:56:55.293578 systemd[1]: session-25.scope: Deactivated successfully. Feb 9 18:56:55.295591 systemd-logind[1633]: Session 25 logged out. Waiting for processes to exit. Feb 9 18:56:55.290000 audit[5805]: CRED_DISP pid=5805 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:55.296888 systemd-logind[1633]: Removed session 25. Feb 9 18:56:55.302300 kernel: audit: type=1106 audit(1707505015.289:1672): pid=5805 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:55.302436 kernel: audit: type=1104 audit(1707505015.290:1673): pid=5805 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:56:55.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.21.122:22-139.178.68.195:48220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:55.394577 systemd[1]: run-containerd-runc-k8s.io-23c72766c2e2c89c8218b08fae13b3a9fa653d707a922e89f1dc978905066c8c-runc.BDMpwc.mount: Deactivated successfully. Feb 9 18:57:00.333989 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 18:57:00.334203 kernel: audit: type=1130 audit(1707505020.318:1675): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.21.122:22-139.178.68.195:44470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:00.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.21.122:22-139.178.68.195:44470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:00.318482 systemd[1]: Started sshd@26-172.31.21.122:22-139.178.68.195:44470.service. Feb 9 18:57:00.488000 audit[5838]: USER_ACCT pid=5838 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:00.495221 sshd[5838]: Accepted publickey for core from 139.178.68.195 port 44470 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:57:00.496221 kernel: audit: type=1101 audit(1707505020.488:1676): pid=5838 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:00.496316 kernel: audit: type=1103 audit(1707505020.494:1677): pid=5838 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:00.494000 audit[5838]: CRED_ACQ pid=5838 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:00.504621 kernel: audit: type=1006 audit(1707505020.494:1678): pid=5838 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 9 18:57:00.504914 sshd[5838]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:57:00.494000 audit[5838]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb3c74210 a2=3 a3=0 items=0 ppid=1 pid=5838 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:00.513331 kernel: audit: type=1300 audit(1707505020.494:1678): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb3c74210 a2=3 a3=0 items=0 ppid=1 pid=5838 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:00.494000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:57:00.516941 kernel: audit: type=1327 audit(1707505020.494:1678): proctitle=737368643A20636F7265205B707269765D Feb 9 18:57:00.517264 systemd-logind[1633]: New session 26 of user core. Feb 9 18:57:00.518366 systemd[1]: Started session-26.scope. Feb 9 18:57:00.526000 audit[5838]: USER_START pid=5838 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:00.534474 kernel: audit: type=1105 audit(1707505020.526:1679): pid=5838 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:00.540595 kernel: audit: type=1103 audit(1707505020.534:1680): pid=5841 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:00.534000 audit[5841]: CRED_ACQ pid=5841 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:00.759593 sshd[5838]: pam_unix(sshd:session): session closed for user core Feb 9 18:57:00.761000 audit[5838]: USER_END pid=5838 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:00.765426 systemd-logind[1633]: Session 26 logged out. Waiting for processes to exit. Feb 9 18:57:00.767154 systemd[1]: sshd@26-172.31.21.122:22-139.178.68.195:44470.service: Deactivated successfully. Feb 9 18:57:00.768496 systemd[1]: session-26.scope: Deactivated successfully. Feb 9 18:57:00.770596 kernel: audit: type=1106 audit(1707505020.761:1681): pid=5838 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:00.770649 systemd-logind[1633]: Removed session 26. Feb 9 18:57:00.762000 audit[5838]: CRED_DISP pid=5838 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:00.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.21.122:22-139.178.68.195:44470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:00.777307 kernel: audit: type=1104 audit(1707505020.762:1682): pid=5838 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:01.146441 kubelet[2665]: I0209 18:57:01.146396 2665 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-678c79f86f-7rvwd" podStartSLOduration=26.821041549 podCreationTimestamp="2024-02-09 18:56:29 +0000 UTC" firstStartedPulling="2024-02-09 18:56:32.183001983 +0000 UTC m=+100.983991890" lastFinishedPulling="2024-02-09 18:56:37.500578241 +0000 UTC m=+106.301568153" observedRunningTime="2024-02-09 18:56:38.045841492 +0000 UTC m=+106.846831401" watchObservedRunningTime="2024-02-09 18:57:01.138617812 +0000 UTC m=+129.939607726" Feb 9 18:57:01.341000 audit[5870]: NETFILTER_CFG table=filter:128 family=2 entries=9 op=nft_register_rule pid=5870 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:57:01.341000 audit[5870]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffddbb9f5a0 a2=0 a3=7ffddbb9f58c items=0 ppid=2987 pid=5870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:01.341000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:57:01.344000 audit[5870]: NETFILTER_CFG table=nat:129 family=2 entries=51 op=nft_register_chain pid=5870 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:57:01.344000 audit[5870]: SYSCALL arch=c000003e syscall=46 success=yes exit=17716 a0=3 a1=7ffddbb9f5a0 a2=0 a3=7ffddbb9f58c items=0 ppid=2987 pid=5870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:01.344000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:57:01.355000 audit[5872]: NETFILTER_CFG table=filter:130 family=2 entries=8 op=nft_register_rule pid=5872 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:57:01.355000 audit[5872]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff3840c510 a2=0 a3=7fff3840c4fc items=0 ppid=2987 pid=5872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:01.355000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:57:01.359000 audit[5872]: NETFILTER_CFG table=nat:131 family=2 entries=58 op=nft_register_chain pid=5872 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:57:01.359000 audit[5872]: SYSCALL arch=c000003e syscall=46 success=yes exit=19604 a0=3 a1=7fff3840c510 a2=0 a3=7fff3840c4fc items=0 ppid=2987 pid=5872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:01.359000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:57:05.787344 systemd[1]: Started sshd@27-172.31.21.122:22-139.178.68.195:44472.service. Feb 9 18:57:05.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.21.122:22-139.178.68.195:44472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:05.790022 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 18:57:05.790403 kernel: audit: type=1130 audit(1707505025.787:1688): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.21.122:22-139.178.68.195:44472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:05.983000 audit[5876]: USER_ACCT pid=5876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:05.984174 sshd[5876]: Accepted publickey for core from 139.178.68.195 port 44472 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:57:05.995356 kernel: audit: type=1101 audit(1707505025.983:1689): pid=5876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:05.995000 audit[5876]: CRED_ACQ pid=5876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:05.997776 sshd[5876]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:57:06.012748 kernel: audit: type=1103 audit(1707505025.995:1690): pid=5876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:06.022001 kernel: audit: type=1006 audit(1707505025.995:1691): pid=5876 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 9 18:57:05.995000 audit[5876]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcae8a0520 a2=3 a3=0 items=0 ppid=1 pid=5876 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:06.038983 kernel: audit: type=1300 audit(1707505025.995:1691): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcae8a0520 a2=3 a3=0 items=0 ppid=1 pid=5876 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:06.026888 systemd[1]: Started session-27.scope. Feb 9 18:57:06.030837 systemd-logind[1633]: New session 27 of user core. Feb 9 18:57:05.995000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:57:06.054000 audit[5876]: USER_START pid=5876 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:06.065438 kernel: audit: type=1327 audit(1707505025.995:1691): proctitle=737368643A20636F7265205B707269765D Feb 9 18:57:06.065578 kernel: audit: type=1105 audit(1707505026.054:1692): pid=5876 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:06.056000 audit[5878]: CRED_ACQ pid=5878 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:06.073403 kernel: audit: type=1103 audit(1707505026.056:1693): pid=5878 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:06.392048 sshd[5876]: pam_unix(sshd:session): session closed for user core Feb 9 18:57:06.393000 audit[5876]: USER_END pid=5876 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:06.400306 kernel: audit: type=1106 audit(1707505026.393:1694): pid=5876 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:06.400501 kernel: audit: type=1104 audit(1707505026.394:1695): pid=5876 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:06.394000 audit[5876]: CRED_DISP pid=5876 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:06.402386 systemd[1]: sshd@27-172.31.21.122:22-139.178.68.195:44472.service: Deactivated successfully. Feb 9 18:57:06.403536 systemd[1]: session-27.scope: Deactivated successfully. Feb 9 18:57:06.405596 systemd-logind[1633]: Session 27 logged out. Waiting for processes to exit. Feb 9 18:57:06.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.21.122:22-139.178.68.195:44472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:06.407083 systemd-logind[1633]: Removed session 27. Feb 9 18:57:11.421264 systemd[1]: Started sshd@28-172.31.21.122:22-139.178.68.195:47568.service. Feb 9 18:57:11.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.21.122:22-139.178.68.195:47568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:11.425652 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 18:57:11.425812 kernel: audit: type=1130 audit(1707505031.421:1697): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.21.122:22-139.178.68.195:47568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:11.594000 audit[5895]: USER_ACCT pid=5895 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:11.600659 sshd[5895]: Accepted publickey for core from 139.178.68.195 port 47568 ssh2: RSA SHA256:kZCGRB9AT+jVFxeaX4/tO2T0hB3bd3sNSBeK3Rz6bcg Feb 9 18:57:11.600000 audit[5895]: CRED_ACQ pid=5895 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:11.601693 sshd[5895]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:57:11.607495 kernel: audit: type=1101 audit(1707505031.594:1698): pid=5895 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:11.607617 kernel: audit: type=1103 audit(1707505031.600:1699): pid=5895 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:11.611401 kernel: audit: type=1006 audit(1707505031.601:1700): pid=5895 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 9 18:57:11.626238 kernel: audit: type=1300 audit(1707505031.601:1700): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbe859040 a2=3 a3=0 items=0 ppid=1 pid=5895 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:11.601000 audit[5895]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbe859040 a2=3 a3=0 items=0 ppid=1 pid=5895 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:11.624162 systemd-logind[1633]: New session 28 of user core. Feb 9 18:57:11.624458 systemd[1]: Started session-28.scope. Feb 9 18:57:11.601000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:57:11.631344 kernel: audit: type=1327 audit(1707505031.601:1700): proctitle=737368643A20636F7265205B707269765D Feb 9 18:57:11.636000 audit[5895]: USER_START pid=5895 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:11.643670 kernel: audit: type=1105 audit(1707505031.636:1701): pid=5895 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:11.638000 audit[5906]: CRED_ACQ pid=5906 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:11.650427 kernel: audit: type=1103 audit(1707505031.638:1702): pid=5906 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:11.888120 sshd[5895]: pam_unix(sshd:session): session closed for user core Feb 9 18:57:11.889000 audit[5895]: USER_END pid=5895 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:11.889000 audit[5895]: CRED_DISP pid=5895 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:11.899315 systemd[1]: sshd@28-172.31.21.122:22-139.178.68.195:47568.service: Deactivated successfully. Feb 9 18:57:11.900330 systemd[1]: session-28.scope: Deactivated successfully. Feb 9 18:57:11.902936 systemd-logind[1633]: Session 28 logged out. Waiting for processes to exit. Feb 9 18:57:11.903741 kernel: audit: type=1106 audit(1707505031.889:1703): pid=5895 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:11.903808 kernel: audit: type=1104 audit(1707505031.889:1704): pid=5895 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 9 18:57:11.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.21.122:22-139.178.68.195:47568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:11.904618 systemd-logind[1633]: Removed session 28. Feb 9 18:57:25.378761 systemd[1]: run-containerd-runc-k8s.io-23c72766c2e2c89c8218b08fae13b3a9fa653d707a922e89f1dc978905066c8c-runc.3vjQnQ.mount: Deactivated successfully. Feb 9 18:57:25.737050 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 18:57:25.737279 kernel: audit: type=1334 audit(1707505045.732:1706): prog-id=129 op=UNLOAD Feb 9 18:57:25.732000 audit: BPF prog-id=129 op=UNLOAD Feb 9 18:57:25.732416 systemd[1]: cri-containerd-d0cd46c89618776c0408183f72ab34bc64896c32b8b2cca7a2e72daed4ac76aa.scope: Deactivated successfully. Feb 9 18:57:25.732820 systemd[1]: cri-containerd-d0cd46c89618776c0408183f72ab34bc64896c32b8b2cca7a2e72daed4ac76aa.scope: Consumed 7.061s CPU time. Feb 9 18:57:25.738000 audit: BPF prog-id=132 op=UNLOAD Feb 9 18:57:25.741359 kernel: audit: type=1334 audit(1707505045.738:1707): prog-id=132 op=UNLOAD Feb 9 18:57:25.767941 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d0cd46c89618776c0408183f72ab34bc64896c32b8b2cca7a2e72daed4ac76aa-rootfs.mount: Deactivated successfully. Feb 9 18:57:25.770642 env[1643]: time="2024-02-09T18:57:25.770581898Z" level=info msg="shim disconnected" id=d0cd46c89618776c0408183f72ab34bc64896c32b8b2cca7a2e72daed4ac76aa Feb 9 18:57:25.771106 env[1643]: time="2024-02-09T18:57:25.770648760Z" level=warning msg="cleaning up after shim disconnected" id=d0cd46c89618776c0408183f72ab34bc64896c32b8b2cca7a2e72daed4ac76aa namespace=k8s.io Feb 9 18:57:25.771106 env[1643]: time="2024-02-09T18:57:25.770663396Z" level=info msg="cleaning up dead shim" Feb 9 18:57:25.781570 env[1643]: time="2024-02-09T18:57:25.781523543Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:57:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5974 runtime=io.containerd.runc.v2\n" Feb 9 18:57:26.192539 kubelet[2665]: I0209 18:57:26.192505 2665 scope.go:115] "RemoveContainer" containerID="d0cd46c89618776c0408183f72ab34bc64896c32b8b2cca7a2e72daed4ac76aa" Feb 9 18:57:26.198854 env[1643]: time="2024-02-09T18:57:26.198805879Z" level=info msg="CreateContainer within sandbox \"ed803d11fcfe31c1b334997303b93079dc412675fc1252aaa9565dc5fe69c2e9\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Feb 9 18:57:26.233311 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3210924269.mount: Deactivated successfully. Feb 9 18:57:26.236501 env[1643]: time="2024-02-09T18:57:26.236435657Z" level=info msg="CreateContainer within sandbox \"ed803d11fcfe31c1b334997303b93079dc412675fc1252aaa9565dc5fe69c2e9\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"50d922cec7e6810f32bbbf2be7c76a86e2aa1449883171c0446f8d9581bb6ac7\"" Feb 9 18:57:26.238793 env[1643]: time="2024-02-09T18:57:26.238756173Z" level=info msg="StartContainer for \"50d922cec7e6810f32bbbf2be7c76a86e2aa1449883171c0446f8d9581bb6ac7\"" Feb 9 18:57:26.259922 systemd[1]: Started cri-containerd-50d922cec7e6810f32bbbf2be7c76a86e2aa1449883171c0446f8d9581bb6ac7.scope. Feb 9 18:57:26.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.288607 kernel: audit: type=1400 audit(1707505046.278:1708): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.293418 kernel: audit: type=1400 audit(1707505046.278:1709): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.299398 kernel: audit: type=1400 audit(1707505046.278:1710): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.308880 kernel: audit: type=1400 audit(1707505046.278:1711): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.308997 kernel: audit: type=1400 audit(1707505046.278:1712): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.314393 kernel: audit: type=1400 audit(1707505046.278:1713): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.319822 kernel: audit: type=1400 audit(1707505046.278:1714): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.326346 kernel: audit: type=1400 audit(1707505046.278:1715): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.288000 audit: BPF prog-id=215 op=LOAD Feb 9 18:57:26.288000 audit[5993]: AVC avc: denied { bpf } for pid=5993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.288000 audit[5993]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3008 pid=5993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:26.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530643932326365633765363831306633326262626632626537633736 Feb 9 18:57:26.288000 audit[5993]: AVC avc: denied { perfmon } for pid=5993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.288000 audit[5993]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3008 pid=5993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:26.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530643932326365633765363831306633326262626632626537633736 Feb 9 18:57:26.288000 audit[5993]: AVC avc: denied { bpf } for pid=5993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.288000 audit[5993]: AVC avc: denied { bpf } for pid=5993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.288000 audit[5993]: AVC avc: denied { bpf } for pid=5993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.288000 audit[5993]: AVC avc: denied { perfmon } for pid=5993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.288000 audit[5993]: AVC avc: denied { perfmon } for pid=5993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.288000 audit[5993]: AVC avc: denied { perfmon } for pid=5993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.288000 audit[5993]: AVC avc: denied { perfmon } for pid=5993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.288000 audit[5993]: AVC avc: denied { perfmon } for pid=5993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.288000 audit[5993]: AVC avc: denied { bpf } for pid=5993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.288000 audit[5993]: AVC avc: denied { bpf } for pid=5993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.288000 audit: BPF prog-id=216 op=LOAD Feb 9 18:57:26.288000 audit[5993]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d0240 items=0 ppid=3008 pid=5993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:26.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530643932326365633765363831306633326262626632626537633736 Feb 9 18:57:26.292000 audit[5993]: AVC avc: denied { bpf } for pid=5993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.292000 audit[5993]: AVC avc: denied { bpf } for pid=5993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.292000 audit[5993]: AVC avc: denied { perfmon } for pid=5993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.292000 audit[5993]: AVC avc: denied { perfmon } for pid=5993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.292000 audit[5993]: AVC avc: denied { perfmon } for pid=5993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.292000 audit[5993]: AVC avc: denied { perfmon } for pid=5993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.292000 audit[5993]: AVC avc: denied { perfmon } for pid=5993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.292000 audit[5993]: AVC avc: denied { bpf } for pid=5993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.292000 audit[5993]: AVC avc: denied { bpf } for pid=5993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.292000 audit: BPF prog-id=217 op=LOAD Feb 9 18:57:26.292000 audit[5993]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d0288 items=0 ppid=3008 pid=5993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:26.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530643932326365633765363831306633326262626632626537633736 Feb 9 18:57:26.293000 audit: BPF prog-id=217 op=UNLOAD Feb 9 18:57:26.293000 audit: BPF prog-id=216 op=UNLOAD Feb 9 18:57:26.293000 audit[5993]: AVC avc: denied { bpf } for pid=5993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.293000 audit[5993]: AVC avc: denied { bpf } for pid=5993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.293000 audit[5993]: AVC avc: denied { bpf } for pid=5993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.293000 audit[5993]: AVC avc: denied { perfmon } for pid=5993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.293000 audit[5993]: AVC avc: denied { perfmon } for pid=5993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.293000 audit[5993]: AVC avc: denied { perfmon } for pid=5993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.293000 audit[5993]: AVC avc: denied { perfmon } for pid=5993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.293000 audit[5993]: AVC avc: denied { perfmon } for pid=5993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.293000 audit[5993]: AVC avc: denied { bpf } for pid=5993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.293000 audit[5993]: AVC avc: denied { bpf } for pid=5993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:26.293000 audit: BPF prog-id=218 op=LOAD Feb 9 18:57:26.293000 audit[5993]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d0698 items=0 ppid=3008 pid=5993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:26.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530643932326365633765363831306633326262626632626537633736 Feb 9 18:57:26.347585 env[1643]: time="2024-02-09T18:57:26.347534553Z" level=info msg="StartContainer for \"50d922cec7e6810f32bbbf2be7c76a86e2aa1449883171c0446f8d9581bb6ac7\" returns successfully" Feb 9 18:57:27.039439 systemd[1]: cri-containerd-d4ca606d7f6f111e63dc2d987ca1e04908bdfe920dddf35edd0788a95966d538.scope: Deactivated successfully. Feb 9 18:57:27.039757 systemd[1]: cri-containerd-d4ca606d7f6f111e63dc2d987ca1e04908bdfe920dddf35edd0788a95966d538.scope: Consumed 3.646s CPU time. Feb 9 18:57:27.046000 audit: BPF prog-id=92 op=UNLOAD Feb 9 18:57:27.046000 audit: BPF prog-id=104 op=UNLOAD Feb 9 18:57:27.074890 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d4ca606d7f6f111e63dc2d987ca1e04908bdfe920dddf35edd0788a95966d538-rootfs.mount: Deactivated successfully. Feb 9 18:57:27.076830 env[1643]: time="2024-02-09T18:57:27.076777553Z" level=info msg="shim disconnected" id=d4ca606d7f6f111e63dc2d987ca1e04908bdfe920dddf35edd0788a95966d538 Feb 9 18:57:27.077224 env[1643]: time="2024-02-09T18:57:27.076831498Z" level=warning msg="cleaning up after shim disconnected" id=d4ca606d7f6f111e63dc2d987ca1e04908bdfe920dddf35edd0788a95966d538 namespace=k8s.io Feb 9 18:57:27.077224 env[1643]: time="2024-02-09T18:57:27.076844296Z" level=info msg="cleaning up dead shim" Feb 9 18:57:27.086864 env[1643]: time="2024-02-09T18:57:27.086755448Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:57:27Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6033 runtime=io.containerd.runc.v2\n" Feb 9 18:57:27.197825 kubelet[2665]: I0209 18:57:27.197792 2665 scope.go:115] "RemoveContainer" containerID="d4ca606d7f6f111e63dc2d987ca1e04908bdfe920dddf35edd0788a95966d538" Feb 9 18:57:27.201025 env[1643]: time="2024-02-09T18:57:27.200991987Z" level=info msg="CreateContainer within sandbox \"9e751667eac6013cb5a591d75f7feba23866c603e8bf41737617c3fa2127a5bd\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Feb 9 18:57:27.233537 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3054317429.mount: Deactivated successfully. Feb 9 18:57:27.242781 env[1643]: time="2024-02-09T18:57:27.242496555Z" level=info msg="CreateContainer within sandbox \"9e751667eac6013cb5a591d75f7feba23866c603e8bf41737617c3fa2127a5bd\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"7af4b6dfc458c92bd916d6fa13eb76591aecdc8df8b252875b88f68b078b52cc\"" Feb 9 18:57:27.244788 env[1643]: time="2024-02-09T18:57:27.243388970Z" level=info msg="StartContainer for \"7af4b6dfc458c92bd916d6fa13eb76591aecdc8df8b252875b88f68b078b52cc\"" Feb 9 18:57:27.277569 systemd[1]: Started cri-containerd-7af4b6dfc458c92bd916d6fa13eb76591aecdc8df8b252875b88f68b078b52cc.scope. Feb 9 18:57:27.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.303000 audit: BPF prog-id=219 op=LOAD Feb 9 18:57:27.305000 audit[6053]: AVC avc: denied { bpf } for pid=6053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.305000 audit[6053]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2354 pid=6053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:27.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761663462366466633435386339326264393136643666613133656237 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { perfmon } for pid=6053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit[6053]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2354 pid=6053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:27.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761663462366466633435386339326264393136643666613133656237 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { bpf } for pid=6053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { bpf } for pid=6053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { bpf } for pid=6053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { perfmon } for pid=6053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { perfmon } for pid=6053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { perfmon } for pid=6053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { perfmon } for pid=6053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { perfmon } for pid=6053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { bpf } for pid=6053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { bpf } for pid=6053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit: BPF prog-id=220 op=LOAD Feb 9 18:57:27.306000 audit[6053]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002cdf20 items=0 ppid=2354 pid=6053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:27.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761663462366466633435386339326264393136643666613133656237 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { bpf } for pid=6053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { bpf } for pid=6053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { perfmon } for pid=6053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { perfmon } for pid=6053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { perfmon } for pid=6053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { perfmon } for pid=6053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { perfmon } for pid=6053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { bpf } for pid=6053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { bpf } for pid=6053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit: BPF prog-id=221 op=LOAD Feb 9 18:57:27.306000 audit[6053]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002cdf68 items=0 ppid=2354 pid=6053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:27.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761663462366466633435386339326264393136643666613133656237 Feb 9 18:57:27.306000 audit: BPF prog-id=221 op=UNLOAD Feb 9 18:57:27.306000 audit: BPF prog-id=220 op=UNLOAD Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { bpf } for pid=6053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { bpf } for pid=6053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { bpf } for pid=6053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { perfmon } for pid=6053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { perfmon } for pid=6053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { perfmon } for pid=6053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { perfmon } for pid=6053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { perfmon } for pid=6053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { bpf } for pid=6053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit[6053]: AVC avc: denied { bpf } for pid=6053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:27.306000 audit: BPF prog-id=222 op=LOAD Feb 9 18:57:27.306000 audit[6053]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000348378 items=0 ppid=2354 pid=6053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:27.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761663462366466633435386339326264393136643666613133656237 Feb 9 18:57:27.359926 env[1643]: time="2024-02-09T18:57:27.359872438Z" level=info msg="StartContainer for \"7af4b6dfc458c92bd916d6fa13eb76591aecdc8df8b252875b88f68b078b52cc\" returns successfully" Feb 9 18:57:28.657000 audit[6063]: AVC avc: denied { watch } for pid=6063 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:57:28.657000 audit[6063]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ad2000 a2=fc6 a3=0 items=0 ppid=2354 pid=6063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 key=(null) Feb 9 18:57:28.657000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:57:28.659000 audit[6063]: AVC avc: denied { watch } for pid=6063 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:57:28.659000 audit[6063]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0001567e0 a2=fc6 a3=0 items=0 ppid=2354 pid=6063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c677,c784 key=(null) Feb 9 18:57:28.659000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:57:31.913704 systemd[1]: cri-containerd-186987e3c8c5845fbf131957b109ec5baaf57beec6e4516bb22b552db4d4503e.scope: Deactivated successfully. Feb 9 18:57:31.914028 systemd[1]: cri-containerd-186987e3c8c5845fbf131957b109ec5baaf57beec6e4516bb22b552db4d4503e.scope: Consumed 2.221s CPU time. Feb 9 18:57:31.921623 kernel: kauditd_printk_skb: 114 callbacks suppressed Feb 9 18:57:31.921849 kernel: audit: type=1334 audit(1707505051.916:1748): prog-id=96 op=UNLOAD Feb 9 18:57:31.921994 kernel: audit: type=1334 audit(1707505051.916:1749): prog-id=109 op=UNLOAD Feb 9 18:57:31.916000 audit: BPF prog-id=96 op=UNLOAD Feb 9 18:57:31.916000 audit: BPF prog-id=109 op=UNLOAD Feb 9 18:57:31.949631 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-186987e3c8c5845fbf131957b109ec5baaf57beec6e4516bb22b552db4d4503e-rootfs.mount: Deactivated successfully. Feb 9 18:57:31.951489 env[1643]: time="2024-02-09T18:57:31.951441714Z" level=info msg="shim disconnected" id=186987e3c8c5845fbf131957b109ec5baaf57beec6e4516bb22b552db4d4503e Feb 9 18:57:31.952128 env[1643]: time="2024-02-09T18:57:31.952062690Z" level=warning msg="cleaning up after shim disconnected" id=186987e3c8c5845fbf131957b109ec5baaf57beec6e4516bb22b552db4d4503e namespace=k8s.io Feb 9 18:57:31.952128 env[1643]: time="2024-02-09T18:57:31.952122081Z" level=info msg="cleaning up dead shim" Feb 9 18:57:31.962604 env[1643]: time="2024-02-09T18:57:31.962550199Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:57:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6114 runtime=io.containerd.runc.v2\n" Feb 9 18:57:32.214482 kubelet[2665]: I0209 18:57:32.213782 2665 scope.go:115] "RemoveContainer" containerID="186987e3c8c5845fbf131957b109ec5baaf57beec6e4516bb22b552db4d4503e" Feb 9 18:57:32.219651 env[1643]: time="2024-02-09T18:57:32.219609091Z" level=info msg="CreateContainer within sandbox \"d04fbe026763491a3bf37e276e9bde3c63d7c9f97e6d7d7116d5a19f7199c14f\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Feb 9 18:57:32.245623 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount597299598.mount: Deactivated successfully. Feb 9 18:57:32.256209 env[1643]: time="2024-02-09T18:57:32.256158162Z" level=info msg="CreateContainer within sandbox \"d04fbe026763491a3bf37e276e9bde3c63d7c9f97e6d7d7116d5a19f7199c14f\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"6d1563c4072f4159318ede61237b8c5ecfb415eb127f3f575252587c9decde92\"" Feb 9 18:57:32.262595 env[1643]: time="2024-02-09T18:57:32.262549619Z" level=info msg="StartContainer for \"6d1563c4072f4159318ede61237b8c5ecfb415eb127f3f575252587c9decde92\"" Feb 9 18:57:32.295727 systemd[1]: Started cri-containerd-6d1563c4072f4159318ede61237b8c5ecfb415eb127f3f575252587c9decde92.scope. Feb 9 18:57:32.337550 kernel: audit: type=1400 audit(1707505052.325:1750): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.337874 kernel: audit: type=1400 audit(1707505052.325:1751): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.350814 kernel: audit: type=1400 audit(1707505052.325:1752): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.351198 kernel: audit: type=1400 audit(1707505052.325:1753): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.361740 kernel: audit: type=1400 audit(1707505052.325:1754): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.361874 kernel: audit: type=1400 audit(1707505052.325:1755): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.370232 kernel: audit: type=1400 audit(1707505052.325:1756): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.370424 kernel: audit: type=1400 audit(1707505052.325:1757): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.334000 audit: BPF prog-id=223 op=LOAD Feb 9 18:57:32.339000 audit[6134]: AVC avc: denied { bpf } for pid=6134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.339000 audit[6134]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2385 pid=6134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:32.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664313536336334303732663431353933313865646536313233376238 Feb 9 18:57:32.339000 audit[6134]: AVC avc: denied { perfmon } for pid=6134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.339000 audit[6134]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2385 pid=6134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:32.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664313536336334303732663431353933313865646536313233376238 Feb 9 18:57:32.339000 audit[6134]: AVC avc: denied { bpf } for pid=6134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.339000 audit[6134]: AVC avc: denied { bpf } for pid=6134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.339000 audit[6134]: AVC avc: denied { bpf } for pid=6134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.339000 audit[6134]: AVC avc: denied { perfmon } for pid=6134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.339000 audit[6134]: AVC avc: denied { perfmon } for pid=6134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.339000 audit[6134]: AVC avc: denied { perfmon } for pid=6134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.339000 audit[6134]: AVC avc: denied { perfmon } for pid=6134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.339000 audit[6134]: AVC avc: denied { perfmon } for pid=6134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.339000 audit[6134]: AVC avc: denied { bpf } for pid=6134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.339000 audit[6134]: AVC avc: denied { bpf } for pid=6134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.339000 audit: BPF prog-id=224 op=LOAD Feb 9 18:57:32.339000 audit[6134]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000221030 items=0 ppid=2385 pid=6134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:32.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664313536336334303732663431353933313865646536313233376238 Feb 9 18:57:32.343000 audit[6134]: AVC avc: denied { bpf } for pid=6134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.343000 audit[6134]: AVC avc: denied { bpf } for pid=6134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.343000 audit[6134]: AVC avc: denied { perfmon } for pid=6134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.343000 audit[6134]: AVC avc: denied { perfmon } for pid=6134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.343000 audit[6134]: AVC avc: denied { perfmon } for pid=6134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.343000 audit[6134]: AVC avc: denied { perfmon } for pid=6134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.343000 audit[6134]: AVC avc: denied { perfmon } for pid=6134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.343000 audit[6134]: AVC avc: denied { bpf } for pid=6134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.343000 audit[6134]: AVC avc: denied { bpf } for pid=6134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.343000 audit: BPF prog-id=225 op=LOAD Feb 9 18:57:32.343000 audit[6134]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000221078 items=0 ppid=2385 pid=6134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:32.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664313536336334303732663431353933313865646536313233376238 Feb 9 18:57:32.343000 audit: BPF prog-id=225 op=UNLOAD Feb 9 18:57:32.343000 audit: BPF prog-id=224 op=UNLOAD Feb 9 18:57:32.343000 audit[6134]: AVC avc: denied { bpf } for pid=6134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.343000 audit[6134]: AVC avc: denied { bpf } for pid=6134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.343000 audit[6134]: AVC avc: denied { bpf } for pid=6134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.343000 audit[6134]: AVC avc: denied { perfmon } for pid=6134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.343000 audit[6134]: AVC avc: denied { perfmon } for pid=6134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.343000 audit[6134]: AVC avc: denied { perfmon } for pid=6134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.343000 audit[6134]: AVC avc: denied { perfmon } for pid=6134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.343000 audit[6134]: AVC avc: denied { perfmon } for pid=6134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.343000 audit[6134]: AVC avc: denied { bpf } for pid=6134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.343000 audit[6134]: AVC avc: denied { bpf } for pid=6134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:32.343000 audit: BPF prog-id=226 op=LOAD Feb 9 18:57:32.343000 audit[6134]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000221488 items=0 ppid=2385 pid=6134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:32.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664313536336334303732663431353933313865646536313233376238 Feb 9 18:57:32.410204 env[1643]: time="2024-02-09T18:57:32.410151694Z" level=info msg="StartContainer for \"6d1563c4072f4159318ede61237b8c5ecfb415eb127f3f575252587c9decde92\" returns successfully" Feb 9 18:57:34.701230 kubelet[2665]: E0209 18:57:34.701182 2665 controller.go:193] "Failed to update lease" err="Put \"https://172.31.21.122:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-122?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 18:57:38.513000 audit[5694]: AVC avc: denied { watch } for pid=5694 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_56_30.3887166161/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c779,c977 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c779,c977 tclass=file permissive=0 Feb 9 18:57:38.515377 kernel: kauditd_printk_skb: 49 callbacks suppressed Feb 9 18:57:38.515445 kernel: audit: type=1400 audit(1707505058.513:1768): avc: denied { watch } for pid=5694 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_56_30.3887166161/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c779,c977 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c779,c977 tclass=file permissive=0 Feb 9 18:57:38.513000 audit[5694]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009634c0 a2=fc6 a3=0 items=0 ppid=5619 pid=5694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c779,c977 key=(null) Feb 9 18:57:38.529132 kernel: audit: type=1300 audit(1707505058.513:1768): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009634c0 a2=fc6 a3=0 items=0 ppid=5619 pid=5694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c779,c977 key=(null) Feb 9 18:57:38.529250 kernel: audit: type=1327 audit(1707505058.513:1768): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:57:38.513000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:57:41.610998 systemd[1]: run-containerd-runc-k8s.io-3b43bd4f9b8320ba673e92820ebc9041a620aef509c264cae3ad0ef56c0502bd-runc.MaecIu.mount: Deactivated successfully. Feb 9 18:57:44.702461 kubelet[2665]: E0209 18:57:44.702428 2665 controller.go:193] "Failed to update lease" err="Put \"https://172.31.21.122:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-122?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)"