Feb 12 22:21:25.060731 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 12 22:21:25.060764 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 22:21:25.060780 kernel: BIOS-provided physical RAM map: Feb 12 22:21:25.060792 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 12 22:21:25.060803 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 12 22:21:25.060814 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 12 22:21:25.060830 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Feb 12 22:21:25.060842 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Feb 12 22:21:25.060854 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Feb 12 22:21:25.060866 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 12 22:21:25.060877 kernel: NX (Execute Disable) protection: active Feb 12 22:21:25.060889 kernel: SMBIOS 2.7 present. Feb 12 22:21:25.060901 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Feb 12 22:21:25.060912 kernel: Hypervisor detected: KVM Feb 12 22:21:25.060928 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 12 22:21:25.060941 kernel: kvm-clock: cpu 0, msr 1efaa001, primary cpu clock Feb 12 22:21:25.060954 kernel: kvm-clock: using sched offset of 7837733191 cycles Feb 12 22:21:25.060968 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 12 22:21:25.061133 kernel: tsc: Detected 2499.998 MHz processor Feb 12 22:21:25.061148 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 22:21:25.061166 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 22:21:25.061179 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Feb 12 22:21:25.061192 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 22:21:25.061205 kernel: Using GB pages for direct mapping Feb 12 22:21:25.061218 kernel: ACPI: Early table checksum verification disabled Feb 12 22:21:25.061231 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Feb 12 22:21:25.061244 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Feb 12 22:21:25.061257 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Feb 12 22:21:25.061270 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Feb 12 22:21:25.061297 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Feb 12 22:21:25.061308 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Feb 12 22:21:25.061320 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Feb 12 22:21:25.061333 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Feb 12 22:21:25.061346 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Feb 12 22:21:25.061358 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Feb 12 22:21:25.061371 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Feb 12 22:21:25.061558 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Feb 12 22:21:25.061576 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Feb 12 22:21:25.061587 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Feb 12 22:21:25.061598 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Feb 12 22:21:25.061613 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Feb 12 22:21:25.061624 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Feb 12 22:21:25.061635 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Feb 12 22:21:25.061648 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Feb 12 22:21:25.061663 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Feb 12 22:21:25.061675 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Feb 12 22:21:25.061687 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Feb 12 22:21:25.061698 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 12 22:21:25.061709 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 12 22:21:25.061720 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Feb 12 22:21:25.061732 kernel: NUMA: Initialized distance table, cnt=1 Feb 12 22:21:25.061744 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Feb 12 22:21:25.061758 kernel: Zone ranges: Feb 12 22:21:25.061772 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 22:21:25.061785 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Feb 12 22:21:25.061797 kernel: Normal empty Feb 12 22:21:25.061809 kernel: Movable zone start for each node Feb 12 22:21:25.061822 kernel: Early memory node ranges Feb 12 22:21:25.061834 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 12 22:21:25.061847 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Feb 12 22:21:25.061859 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Feb 12 22:21:25.061874 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 22:21:25.061887 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 12 22:21:25.062230 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Feb 12 22:21:25.062246 kernel: ACPI: PM-Timer IO Port: 0xb008 Feb 12 22:21:25.062259 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 12 22:21:25.062272 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Feb 12 22:21:25.062285 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 12 22:21:25.062298 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 12 22:21:25.062311 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 12 22:21:25.062329 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 12 22:21:25.062342 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 22:21:25.062354 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 12 22:21:25.062368 kernel: TSC deadline timer available Feb 12 22:21:25.062399 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 12 22:21:25.062414 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Feb 12 22:21:25.062427 kernel: Booting paravirtualized kernel on KVM Feb 12 22:21:25.062440 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 22:21:25.062453 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 12 22:21:25.062471 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 12 22:21:25.062484 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 12 22:21:25.062498 kernel: pcpu-alloc: [0] 0 1 Feb 12 22:21:25.062510 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0 Feb 12 22:21:25.062523 kernel: kvm-guest: PV spinlocks enabled Feb 12 22:21:25.062534 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 12 22:21:25.062545 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Feb 12 22:21:25.062557 kernel: Policy zone: DMA32 Feb 12 22:21:25.062571 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 22:21:25.062587 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 22:21:25.062598 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 22:21:25.062611 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 12 22:21:25.062622 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 22:21:25.062634 kernel: Memory: 1936476K/2057760K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 121024K reserved, 0K cma-reserved) Feb 12 22:21:25.062646 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 12 22:21:25.062658 kernel: Kernel/User page tables isolation: enabled Feb 12 22:21:25.062670 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 22:21:25.062739 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 22:21:25.062780 kernel: rcu: Hierarchical RCU implementation. Feb 12 22:21:25.062794 kernel: rcu: RCU event tracing is enabled. Feb 12 22:21:25.062807 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 12 22:21:25.062820 kernel: Rude variant of Tasks RCU enabled. Feb 12 22:21:25.062832 kernel: Tracing variant of Tasks RCU enabled. Feb 12 22:21:25.063138 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 22:21:25.063155 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 12 22:21:25.063167 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 12 22:21:25.063186 kernel: random: crng init done Feb 12 22:21:25.063246 kernel: Console: colour VGA+ 80x25 Feb 12 22:21:25.063264 kernel: printk: console [ttyS0] enabled Feb 12 22:21:25.063276 kernel: ACPI: Core revision 20210730 Feb 12 22:21:25.063291 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Feb 12 22:21:25.063303 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 22:21:25.063316 kernel: x2apic enabled Feb 12 22:21:25.063328 kernel: Switched APIC routing to physical x2apic. Feb 12 22:21:25.063340 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Feb 12 22:21:25.063355 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499998) Feb 12 22:21:25.063368 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 12 22:21:25.063396 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 12 22:21:25.063408 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 22:21:25.063432 kernel: Spectre V2 : Mitigation: Retpolines Feb 12 22:21:25.063446 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 22:21:25.063458 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 12 22:21:25.063469 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Feb 12 22:21:25.063482 kernel: RETBleed: Vulnerable Feb 12 22:21:25.063494 kernel: Speculative Store Bypass: Vulnerable Feb 12 22:21:25.063507 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 22:21:25.063520 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 22:21:25.063533 kernel: GDS: Unknown: Dependent on hypervisor status Feb 12 22:21:25.063545 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 12 22:21:25.063562 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 12 22:21:25.063575 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 12 22:21:25.063588 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 12 22:21:25.063601 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 12 22:21:25.063614 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Feb 12 22:21:25.063629 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Feb 12 22:21:25.063642 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Feb 12 22:21:25.063655 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Feb 12 22:21:25.063668 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 12 22:21:25.063722 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 12 22:21:25.063739 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 12 22:21:25.063753 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Feb 12 22:21:25.063766 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Feb 12 22:21:25.063778 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Feb 12 22:21:25.063791 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Feb 12 22:21:25.063804 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Feb 12 22:21:25.063817 kernel: Freeing SMP alternatives memory: 32K Feb 12 22:21:25.063832 kernel: pid_max: default: 32768 minimum: 301 Feb 12 22:21:25.063845 kernel: LSM: Security Framework initializing Feb 12 22:21:25.063858 kernel: SELinux: Initializing. Feb 12 22:21:25.063871 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 22:21:25.063883 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 22:21:25.063897 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Feb 12 22:21:25.063910 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Feb 12 22:21:25.063923 kernel: signal: max sigframe size: 3632 Feb 12 22:21:25.063936 kernel: rcu: Hierarchical SRCU implementation. Feb 12 22:21:25.063949 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 12 22:21:25.063965 kernel: smp: Bringing up secondary CPUs ... Feb 12 22:21:25.063978 kernel: x86: Booting SMP configuration: Feb 12 22:21:25.063991 kernel: .... node #0, CPUs: #1 Feb 12 22:21:25.064004 kernel: kvm-clock: cpu 1, msr 1efaa041, secondary cpu clock Feb 12 22:21:25.064017 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0 Feb 12 22:21:25.064032 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Feb 12 22:21:25.064046 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 12 22:21:25.064059 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 22:21:25.064119 kernel: smpboot: Max logical packages: 1 Feb 12 22:21:25.064149 kernel: smpboot: Total of 2 processors activated (9999.99 BogoMIPS) Feb 12 22:21:25.064161 kernel: devtmpfs: initialized Feb 12 22:21:25.064174 kernel: x86/mm: Memory block size: 128MB Feb 12 22:21:25.064186 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 22:21:25.064199 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 12 22:21:25.064212 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 22:21:25.064225 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 22:21:25.064238 kernel: audit: initializing netlink subsys (disabled) Feb 12 22:21:25.064268 kernel: audit: type=2000 audit(1707776484.187:1): state=initialized audit_enabled=0 res=1 Feb 12 22:21:25.064283 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 22:21:25.064296 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 22:21:25.064309 kernel: cpuidle: using governor menu Feb 12 22:21:25.064322 kernel: ACPI: bus type PCI registered Feb 12 22:21:25.064335 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 22:21:25.064348 kernel: dca service started, version 1.12.1 Feb 12 22:21:25.064361 kernel: PCI: Using configuration type 1 for base access Feb 12 22:21:25.064375 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 22:21:25.064403 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 22:21:25.064420 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 22:21:25.064433 kernel: ACPI: Added _OSI(Module Device) Feb 12 22:21:25.064447 kernel: ACPI: Added _OSI(Processor Device) Feb 12 22:21:25.064460 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 22:21:25.064473 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 22:21:25.064486 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 22:21:25.064500 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 22:21:25.064512 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 22:21:25.064526 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Feb 12 22:21:25.064542 kernel: ACPI: Interpreter enabled Feb 12 22:21:25.064555 kernel: ACPI: PM: (supports S0 S5) Feb 12 22:21:25.064568 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 22:21:25.064580 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 22:21:25.064594 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Feb 12 22:21:25.064617 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 12 22:21:25.064866 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 12 22:21:25.065125 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 12 22:21:25.065231 kernel: acpiphp: Slot [3] registered Feb 12 22:21:25.065246 kernel: acpiphp: Slot [4] registered Feb 12 22:21:25.065287 kernel: acpiphp: Slot [5] registered Feb 12 22:21:25.065301 kernel: acpiphp: Slot [6] registered Feb 12 22:21:25.065455 kernel: acpiphp: Slot [7] registered Feb 12 22:21:25.065470 kernel: acpiphp: Slot [8] registered Feb 12 22:21:25.065484 kernel: acpiphp: Slot [9] registered Feb 12 22:21:25.065499 kernel: acpiphp: Slot [10] registered Feb 12 22:21:25.065513 kernel: acpiphp: Slot [11] registered Feb 12 22:21:25.065532 kernel: acpiphp: Slot [12] registered Feb 12 22:21:25.065546 kernel: acpiphp: Slot [13] registered Feb 12 22:21:25.065560 kernel: acpiphp: Slot [14] registered Feb 12 22:21:25.065574 kernel: acpiphp: Slot [15] registered Feb 12 22:21:25.065589 kernel: acpiphp: Slot [16] registered Feb 12 22:21:25.065603 kernel: acpiphp: Slot [17] registered Feb 12 22:21:25.065615 kernel: acpiphp: Slot [18] registered Feb 12 22:21:25.065629 kernel: acpiphp: Slot [19] registered Feb 12 22:21:25.065643 kernel: acpiphp: Slot [20] registered Feb 12 22:21:25.065661 kernel: acpiphp: Slot [21] registered Feb 12 22:21:25.065675 kernel: acpiphp: Slot [22] registered Feb 12 22:21:25.065689 kernel: acpiphp: Slot [23] registered Feb 12 22:21:25.065731 kernel: acpiphp: Slot [24] registered Feb 12 22:21:25.065746 kernel: acpiphp: Slot [25] registered Feb 12 22:21:25.065761 kernel: acpiphp: Slot [26] registered Feb 12 22:21:25.065775 kernel: acpiphp: Slot [27] registered Feb 12 22:21:25.065790 kernel: acpiphp: Slot [28] registered Feb 12 22:21:25.065804 kernel: acpiphp: Slot [29] registered Feb 12 22:21:25.065880 kernel: acpiphp: Slot [30] registered Feb 12 22:21:25.065914 kernel: acpiphp: Slot [31] registered Feb 12 22:21:25.065929 kernel: PCI host bridge to bus 0000:00 Feb 12 22:21:25.066154 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 12 22:21:25.066330 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 12 22:21:25.066547 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 12 22:21:25.066666 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Feb 12 22:21:25.066778 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 12 22:21:25.066929 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 12 22:21:25.067065 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 12 22:21:25.067248 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Feb 12 22:21:25.067398 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Feb 12 22:21:25.067532 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Feb 12 22:21:25.067661 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Feb 12 22:21:25.067790 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Feb 12 22:21:25.067924 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Feb 12 22:21:25.068054 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Feb 12 22:21:25.068178 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Feb 12 22:21:25.068304 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Feb 12 22:21:25.068448 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Feb 12 22:21:25.068575 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Feb 12 22:21:25.068701 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Feb 12 22:21:25.068841 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 12 22:21:25.068971 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Feb 12 22:21:25.069116 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Feb 12 22:21:25.069252 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Feb 12 22:21:25.069402 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Feb 12 22:21:25.069423 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 12 22:21:25.069442 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 12 22:21:25.069457 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 12 22:21:25.069490 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 12 22:21:25.069505 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 12 22:21:25.069520 kernel: iommu: Default domain type: Translated Feb 12 22:21:25.069535 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 22:21:25.069671 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Feb 12 22:21:25.069795 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 12 22:21:25.069917 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Feb 12 22:21:25.069939 kernel: vgaarb: loaded Feb 12 22:21:25.069954 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 22:21:25.069970 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 22:21:25.069984 kernel: PTP clock support registered Feb 12 22:21:25.069999 kernel: PCI: Using ACPI for IRQ routing Feb 12 22:21:25.070013 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 12 22:21:25.070028 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 12 22:21:25.070043 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Feb 12 22:21:25.070059 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Feb 12 22:21:25.070073 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Feb 12 22:21:25.070096 kernel: clocksource: Switched to clocksource kvm-clock Feb 12 22:21:25.070128 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 22:21:25.070143 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 22:21:25.070158 kernel: pnp: PnP ACPI init Feb 12 22:21:25.070173 kernel: pnp: PnP ACPI: found 5 devices Feb 12 22:21:25.070189 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 22:21:25.070204 kernel: NET: Registered PF_INET protocol family Feb 12 22:21:25.070222 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 22:21:25.070238 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Feb 12 22:21:25.070253 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 22:21:25.070268 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 22:21:25.070284 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 12 22:21:25.070299 kernel: TCP: Hash tables configured (established 16384 bind 16384) Feb 12 22:21:25.070313 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 22:21:25.070329 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 22:21:25.070344 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 22:21:25.070363 kernel: NET: Registered PF_XDP protocol family Feb 12 22:21:25.070493 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 12 22:21:25.070608 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 12 22:21:25.070719 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 12 22:21:25.070832 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Feb 12 22:21:25.070962 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 12 22:21:25.071091 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 12 22:21:25.071115 kernel: PCI: CLS 0 bytes, default 64 Feb 12 22:21:25.071131 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 12 22:21:25.071146 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Feb 12 22:21:25.071162 kernel: clocksource: Switched to clocksource tsc Feb 12 22:21:25.071177 kernel: Initialise system trusted keyrings Feb 12 22:21:25.071192 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Feb 12 22:21:25.071256 kernel: Key type asymmetric registered Feb 12 22:21:25.071272 kernel: Asymmetric key parser 'x509' registered Feb 12 22:21:25.071286 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 22:21:25.071305 kernel: io scheduler mq-deadline registered Feb 12 22:21:25.071319 kernel: io scheduler kyber registered Feb 12 22:21:25.071334 kernel: io scheduler bfq registered Feb 12 22:21:25.071349 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 22:21:25.071364 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 22:21:25.071380 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 22:21:25.071406 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 12 22:21:25.071421 kernel: i8042: Warning: Keylock active Feb 12 22:21:25.071436 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 12 22:21:25.071455 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 12 22:21:25.071600 kernel: rtc_cmos 00:00: RTC can wake from S4 Feb 12 22:21:25.071722 kernel: rtc_cmos 00:00: registered as rtc0 Feb 12 22:21:25.071841 kernel: rtc_cmos 00:00: setting system clock to 2024-02-12T22:21:24 UTC (1707776484) Feb 12 22:21:25.072050 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Feb 12 22:21:25.072071 kernel: intel_pstate: CPU model not supported Feb 12 22:21:25.072087 kernel: NET: Registered PF_INET6 protocol family Feb 12 22:21:25.072103 kernel: Segment Routing with IPv6 Feb 12 22:21:25.072122 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 22:21:25.072137 kernel: NET: Registered PF_PACKET protocol family Feb 12 22:21:25.072153 kernel: Key type dns_resolver registered Feb 12 22:21:25.072168 kernel: IPI shorthand broadcast: enabled Feb 12 22:21:25.072184 kernel: sched_clock: Marking stable (412149364, 285819284)->(832040897, -134072249) Feb 12 22:21:25.072199 kernel: registered taskstats version 1 Feb 12 22:21:25.072226 kernel: Loading compiled-in X.509 certificates Feb 12 22:21:25.072241 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 12 22:21:25.072256 kernel: Key type .fscrypt registered Feb 12 22:21:25.072273 kernel: Key type fscrypt-provisioning registered Feb 12 22:21:25.072287 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 22:21:25.072302 kernel: ima: Allocated hash algorithm: sha1 Feb 12 22:21:25.072317 kernel: ima: No architecture policies found Feb 12 22:21:25.072332 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 22:21:25.072347 kernel: Write protecting the kernel read-only data: 28672k Feb 12 22:21:25.072362 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 22:21:25.072377 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 22:21:25.072401 kernel: Run /init as init process Feb 12 22:21:25.072418 kernel: with arguments: Feb 12 22:21:25.072431 kernel: /init Feb 12 22:21:25.072445 kernel: with environment: Feb 12 22:21:25.072459 kernel: HOME=/ Feb 12 22:21:25.072473 kernel: TERM=linux Feb 12 22:21:25.072487 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 22:21:25.072505 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 22:21:25.072526 systemd[1]: Detected virtualization amazon. Feb 12 22:21:25.072542 systemd[1]: Detected architecture x86-64. Feb 12 22:21:25.072556 systemd[1]: Running in initrd. Feb 12 22:21:25.072571 systemd[1]: No hostname configured, using default hostname. Feb 12 22:21:25.072585 systemd[1]: Hostname set to . Feb 12 22:21:25.072618 systemd[1]: Initializing machine ID from VM UUID. Feb 12 22:21:25.072636 systemd[1]: Queued start job for default target initrd.target. Feb 12 22:21:25.072652 systemd[1]: Started systemd-ask-password-console.path. Feb 12 22:21:25.072672 systemd[1]: Reached target cryptsetup.target. Feb 12 22:21:25.072688 systemd[1]: Reached target paths.target. Feb 12 22:21:25.072704 systemd[1]: Reached target slices.target. Feb 12 22:21:25.072720 systemd[1]: Reached target swap.target. Feb 12 22:21:25.072736 systemd[1]: Reached target timers.target. Feb 12 22:21:25.072752 systemd[1]: Listening on iscsid.socket. Feb 12 22:21:25.072771 systemd[1]: Listening on iscsiuio.socket. Feb 12 22:21:25.072787 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 22:21:25.072803 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 22:21:25.072873 systemd[1]: Listening on systemd-journald.socket. Feb 12 22:21:25.072892 systemd[1]: Listening on systemd-networkd.socket. Feb 12 22:21:25.072908 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 22:21:25.072924 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 22:21:25.072940 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 12 22:21:25.072955 systemd[1]: Reached target sockets.target. Feb 12 22:21:25.072974 systemd[1]: Starting kmod-static-nodes.service... Feb 12 22:21:25.072990 systemd[1]: Finished network-cleanup.service. Feb 12 22:21:25.073006 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 22:21:25.073022 systemd[1]: Starting systemd-journald.service... Feb 12 22:21:25.073037 systemd[1]: Starting systemd-modules-load.service... Feb 12 22:21:25.073053 systemd[1]: Starting systemd-resolved.service... Feb 12 22:21:25.073172 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 22:21:25.073196 systemd-journald[185]: Journal started Feb 12 22:21:25.073276 systemd-journald[185]: Runtime Journal (/run/log/journal/ec21cbee5547c443cba93a03c2004e69) is 4.8M, max 38.7M, 33.9M free. Feb 12 22:21:25.091415 systemd[1]: Started systemd-journald.service. Feb 12 22:21:25.109826 systemd-modules-load[186]: Inserted module 'overlay' Feb 12 22:21:25.284396 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 22:21:25.284423 kernel: Bridge firewalling registered Feb 12 22:21:25.284436 kernel: SCSI subsystem initialized Feb 12 22:21:25.284447 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 22:21:25.284459 kernel: device-mapper: uevent: version 1.0.3 Feb 12 22:21:25.284473 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 22:21:25.284487 kernel: audit: type=1130 audit(1707776485.273:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:25.284499 kernel: audit: type=1130 audit(1707776485.277:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:25.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:25.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:25.114890 systemd-resolved[187]: Positive Trust Anchors: Feb 12 22:21:25.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:25.294468 kernel: audit: type=1130 audit(1707776485.285:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:25.114901 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 22:21:25.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:25.114953 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 22:21:25.310408 kernel: audit: type=1130 audit(1707776485.294:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:25.119238 systemd-resolved[187]: Defaulting to hostname 'linux'. Feb 12 22:21:25.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:25.154564 systemd-modules-load[186]: Inserted module 'br_netfilter' Feb 12 22:21:25.325560 kernel: audit: type=1130 audit(1707776485.310:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:25.325600 kernel: audit: type=1130 audit(1707776485.317:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:25.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:25.201520 systemd-modules-load[186]: Inserted module 'dm_multipath' Feb 12 22:21:25.273830 systemd[1]: Started systemd-resolved.service. Feb 12 22:21:25.278541 systemd[1]: Finished kmod-static-nodes.service. Feb 12 22:21:25.285646 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 22:21:25.294719 systemd[1]: Finished systemd-modules-load.service. Feb 12 22:21:25.311863 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 22:21:25.318040 systemd[1]: Reached target nss-lookup.target. Feb 12 22:21:25.326721 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 22:21:25.334233 systemd[1]: Starting systemd-sysctl.service... Feb 12 22:21:25.346260 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 22:21:25.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:25.356062 systemd[1]: Finished systemd-sysctl.service. Feb 12 22:21:25.363620 kernel: audit: type=1130 audit(1707776485.356:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:25.362252 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 22:21:25.372819 kernel: audit: type=1130 audit(1707776485.364:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:25.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:25.379852 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 22:21:25.387110 kernel: audit: type=1130 audit(1707776485.379:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:25.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:25.381187 systemd[1]: Starting dracut-cmdline.service... Feb 12 22:21:25.398977 dracut-cmdline[207]: dracut-dracut-053 Feb 12 22:21:25.401920 dracut-cmdline[207]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 22:21:25.473409 kernel: Loading iSCSI transport class v2.0-870. Feb 12 22:21:25.486421 kernel: iscsi: registered transport (tcp) Feb 12 22:21:25.512816 kernel: iscsi: registered transport (qla4xxx) Feb 12 22:21:25.512893 kernel: QLogic iSCSI HBA Driver Feb 12 22:21:25.555179 systemd[1]: Finished dracut-cmdline.service. Feb 12 22:21:25.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:25.557638 systemd[1]: Starting dracut-pre-udev.service... Feb 12 22:21:25.632436 kernel: raid6: avx512x4 gen() 15294 MB/s Feb 12 22:21:25.649422 kernel: raid6: avx512x4 xor() 6059 MB/s Feb 12 22:21:25.666432 kernel: raid6: avx512x2 gen() 14652 MB/s Feb 12 22:21:25.683433 kernel: raid6: avx512x2 xor() 20378 MB/s Feb 12 22:21:25.700430 kernel: raid6: avx512x1 gen() 15493 MB/s Feb 12 22:21:25.718432 kernel: raid6: avx512x1 xor() 20077 MB/s Feb 12 22:21:25.736512 kernel: raid6: avx2x4 gen() 13715 MB/s Feb 12 22:21:25.753456 kernel: raid6: avx2x4 xor() 6865 MB/s Feb 12 22:21:25.770435 kernel: raid6: avx2x2 gen() 13933 MB/s Feb 12 22:21:25.787432 kernel: raid6: avx2x2 xor() 16066 MB/s Feb 12 22:21:25.805431 kernel: raid6: avx2x1 gen() 10198 MB/s Feb 12 22:21:25.822421 kernel: raid6: avx2x1 xor() 14453 MB/s Feb 12 22:21:25.840486 kernel: raid6: sse2x4 gen() 7010 MB/s Feb 12 22:21:25.857457 kernel: raid6: sse2x4 xor() 5173 MB/s Feb 12 22:21:25.875586 kernel: raid6: sse2x2 gen() 7671 MB/s Feb 12 22:21:25.893428 kernel: raid6: sse2x2 xor() 3574 MB/s Feb 12 22:21:25.910423 kernel: raid6: sse2x1 gen() 4286 MB/s Feb 12 22:21:25.928459 kernel: raid6: sse2x1 xor() 4400 MB/s Feb 12 22:21:25.928529 kernel: raid6: using algorithm avx512x1 gen() 15493 MB/s Feb 12 22:21:25.928548 kernel: raid6: .... xor() 20077 MB/s, rmw enabled Feb 12 22:21:25.929505 kernel: raid6: using avx512x2 recovery algorithm Feb 12 22:21:25.945417 kernel: xor: automatically using best checksumming function avx Feb 12 22:21:26.077419 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 22:21:26.089044 systemd[1]: Finished dracut-pre-udev.service. Feb 12 22:21:26.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:26.091000 audit: BPF prog-id=7 op=LOAD Feb 12 22:21:26.091000 audit: BPF prog-id=8 op=LOAD Feb 12 22:21:26.092031 systemd[1]: Starting systemd-udevd.service... Feb 12 22:21:26.112766 systemd-udevd[384]: Using default interface naming scheme 'v252'. Feb 12 22:21:26.120601 systemd[1]: Started systemd-udevd.service. Feb 12 22:21:26.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:26.127099 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 22:21:26.152796 dracut-pre-trigger[400]: rd.md=0: removing MD RAID activation Feb 12 22:21:26.197873 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 22:21:26.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:26.200919 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 22:21:26.265508 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 22:21:26.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:26.334409 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 22:21:26.366405 kernel: ena 0000:00:05.0: ENA device version: 0.10 Feb 12 22:21:26.366670 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Feb 12 22:21:26.369417 kernel: AVX2 version of gcm_enc/dec engaged. Feb 12 22:21:26.369467 kernel: AES CTR mode by8 optimization enabled Feb 12 22:21:26.376421 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Feb 12 22:21:26.389408 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:2d:51:7f:37:cb Feb 12 22:21:26.391530 (udev-worker)[441]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:21:26.552349 kernel: nvme nvme0: pci function 0000:00:04.0 Feb 12 22:21:26.552596 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Feb 12 22:21:26.552616 kernel: nvme nvme0: 2/0/0 default/read/poll queues Feb 12 22:21:26.552743 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 12 22:21:26.552760 kernel: GPT:9289727 != 16777215 Feb 12 22:21:26.552776 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 12 22:21:26.552791 kernel: GPT:9289727 != 16777215 Feb 12 22:21:26.552805 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 22:21:26.552826 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 12 22:21:26.552845 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (438) Feb 12 22:21:26.549418 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 22:21:26.582293 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 22:21:26.723299 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 22:21:26.753949 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 22:21:26.754164 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 22:21:26.762351 systemd[1]: Starting disk-uuid.service... Feb 12 22:21:26.771225 disk-uuid[587]: Primary Header is updated. Feb 12 22:21:26.771225 disk-uuid[587]: Secondary Entries is updated. Feb 12 22:21:26.771225 disk-uuid[587]: Secondary Header is updated. Feb 12 22:21:27.782409 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 12 22:21:27.782502 disk-uuid[594]: The operation has completed successfully. Feb 12 22:21:27.918417 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 22:21:27.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:27.918528 systemd[1]: Finished disk-uuid.service. Feb 12 22:21:27.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:27.926511 systemd[1]: Starting verity-setup.service... Feb 12 22:21:28.016876 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 12 22:21:28.150557 systemd[1]: Found device dev-mapper-usr.device. Feb 12 22:21:28.152765 systemd[1]: Finished verity-setup.service. Feb 12 22:21:28.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:28.156500 systemd[1]: Mounting sysusr-usr.mount... Feb 12 22:21:28.251416 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 22:21:28.251485 systemd[1]: Mounted sysusr-usr.mount. Feb 12 22:21:28.251760 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 22:21:28.252837 systemd[1]: Starting ignition-setup.service... Feb 12 22:21:28.259730 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 22:21:28.277036 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Feb 12 22:21:28.277106 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 12 22:21:28.277133 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 12 22:21:28.288411 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 12 22:21:28.304051 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 22:21:28.351555 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 22:21:28.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:28.354000 audit: BPF prog-id=9 op=LOAD Feb 12 22:21:28.354953 systemd[1]: Starting systemd-networkd.service... Feb 12 22:21:28.386935 systemd-networkd[1021]: lo: Link UP Feb 12 22:21:28.386949 systemd-networkd[1021]: lo: Gained carrier Feb 12 22:21:28.387934 systemd-networkd[1021]: Enumeration completed Feb 12 22:21:28.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:28.388028 systemd[1]: Started systemd-networkd.service. Feb 12 22:21:28.388428 systemd-networkd[1021]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 22:21:28.391022 systemd[1]: Reached target network.target. Feb 12 22:21:28.397041 systemd-networkd[1021]: eth0: Link UP Feb 12 22:21:28.397050 systemd-networkd[1021]: eth0: Gained carrier Feb 12 22:21:28.397227 systemd[1]: Starting iscsiuio.service... Feb 12 22:21:28.405711 systemd[1]: Started iscsiuio.service. Feb 12 22:21:28.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:28.408647 systemd[1]: Starting iscsid.service... Feb 12 22:21:28.409862 systemd-networkd[1021]: eth0: DHCPv4 address 172.31.25.241/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 12 22:21:28.415706 iscsid[1026]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 22:21:28.415706 iscsid[1026]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 22:21:28.415706 iscsid[1026]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 22:21:28.415706 iscsid[1026]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 22:21:28.415706 iscsid[1026]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 22:21:28.415706 iscsid[1026]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 22:21:28.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:28.418160 systemd[1]: Started iscsid.service. Feb 12 22:21:28.426783 systemd[1]: Starting dracut-initqueue.service... Feb 12 22:21:28.447035 systemd[1]: Finished ignition-setup.service. Feb 12 22:21:28.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:28.449260 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 22:21:28.453982 systemd[1]: Finished dracut-initqueue.service. Feb 12 22:21:28.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:28.455891 systemd[1]: Reached target remote-fs-pre.target. Feb 12 22:21:28.456970 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 22:21:28.458800 systemd[1]: Reached target remote-fs.target. Feb 12 22:21:28.462291 systemd[1]: Starting dracut-pre-mount.service... Feb 12 22:21:28.472537 systemd[1]: Finished dracut-pre-mount.service. Feb 12 22:21:28.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:30.064563 systemd-networkd[1021]: eth0: Gained IPv6LL Feb 12 22:21:30.636562 ignition[1035]: Ignition 2.14.0 Feb 12 22:21:30.636576 ignition[1035]: Stage: fetch-offline Feb 12 22:21:30.636712 ignition[1035]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:21:30.636762 ignition[1035]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:21:30.653323 ignition[1035]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:21:30.653669 ignition[1035]: Ignition finished successfully Feb 12 22:21:30.656645 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 22:21:30.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:30.658718 systemd[1]: Starting ignition-fetch.service... Feb 12 22:21:30.664858 kernel: kauditd_printk_skb: 18 callbacks suppressed Feb 12 22:21:30.664890 kernel: audit: type=1130 audit(1707776490.657:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:30.671023 ignition[1047]: Ignition 2.14.0 Feb 12 22:21:30.671033 ignition[1047]: Stage: fetch Feb 12 22:21:30.671177 ignition[1047]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:21:30.671199 ignition[1047]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:21:30.681052 ignition[1047]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:21:30.682462 ignition[1047]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:21:30.699566 ignition[1047]: INFO : PUT result: OK Feb 12 22:21:30.703138 ignition[1047]: DEBUG : parsed url from cmdline: "" Feb 12 22:21:30.703138 ignition[1047]: INFO : no config URL provided Feb 12 22:21:30.703138 ignition[1047]: INFO : reading system config file "/usr/lib/ignition/user.ign" Feb 12 22:21:30.703138 ignition[1047]: INFO : no config at "/usr/lib/ignition/user.ign" Feb 12 22:21:30.708830 ignition[1047]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:21:30.708830 ignition[1047]: INFO : PUT result: OK Feb 12 22:21:30.708830 ignition[1047]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Feb 12 22:21:30.708830 ignition[1047]: INFO : GET result: OK Feb 12 22:21:30.708830 ignition[1047]: DEBUG : parsing config with SHA512: ecfe65d30d407365e490c5996f5a0064b6c6c6355e72250c8e1d96e129b2b57a1bd9cd68ec07f26bc46598474e9882be691f5c1be529f6b85bad8a77d73166a2 Feb 12 22:21:30.767165 unknown[1047]: fetched base config from "system" Feb 12 22:21:30.768549 unknown[1047]: fetched base config from "system" Feb 12 22:21:30.768559 unknown[1047]: fetched user config from "aws" Feb 12 22:21:30.772738 ignition[1047]: fetch: fetch complete Feb 12 22:21:30.772752 ignition[1047]: fetch: fetch passed Feb 12 22:21:30.772834 ignition[1047]: Ignition finished successfully Feb 12 22:21:30.775739 systemd[1]: Finished ignition-fetch.service. Feb 12 22:21:30.778072 systemd[1]: Starting ignition-kargs.service... Feb 12 22:21:30.783937 kernel: audit: type=1130 audit(1707776490.776:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:30.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:30.792876 ignition[1053]: Ignition 2.14.0 Feb 12 22:21:30.792889 ignition[1053]: Stage: kargs Feb 12 22:21:30.793155 ignition[1053]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:21:30.793188 ignition[1053]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:21:30.801670 ignition[1053]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:21:30.803107 ignition[1053]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:21:30.804916 ignition[1053]: INFO : PUT result: OK Feb 12 22:21:30.808819 ignition[1053]: kargs: kargs passed Feb 12 22:21:30.808952 ignition[1053]: Ignition finished successfully Feb 12 22:21:30.811216 systemd[1]: Finished ignition-kargs.service. Feb 12 22:21:30.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:30.816580 systemd[1]: Starting ignition-disks.service... Feb 12 22:21:30.822311 kernel: audit: type=1130 audit(1707776490.813:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:30.830629 ignition[1059]: Ignition 2.14.0 Feb 12 22:21:30.830641 ignition[1059]: Stage: disks Feb 12 22:21:30.831441 ignition[1059]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:21:30.831476 ignition[1059]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:21:30.843973 ignition[1059]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:21:30.845669 ignition[1059]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:21:30.847854 ignition[1059]: INFO : PUT result: OK Feb 12 22:21:30.851827 ignition[1059]: disks: disks passed Feb 12 22:21:30.852124 ignition[1059]: Ignition finished successfully Feb 12 22:21:30.854743 systemd[1]: Finished ignition-disks.service. Feb 12 22:21:30.856985 systemd[1]: Reached target initrd-root-device.target. Feb 12 22:21:30.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:30.858901 systemd[1]: Reached target local-fs-pre.target. Feb 12 22:21:30.866875 kernel: audit: type=1130 audit(1707776490.856:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:30.871339 systemd[1]: Reached target local-fs.target. Feb 12 22:21:30.872644 systemd[1]: Reached target sysinit.target. Feb 12 22:21:30.876745 systemd[1]: Reached target basic.target. Feb 12 22:21:30.880791 systemd[1]: Starting systemd-fsck-root.service... Feb 12 22:21:30.921524 systemd-fsck[1067]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 12 22:21:30.926091 systemd[1]: Finished systemd-fsck-root.service. Feb 12 22:21:30.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:30.928519 systemd[1]: Mounting sysroot.mount... Feb 12 22:21:30.936323 kernel: audit: type=1130 audit(1707776490.927:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:30.945671 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 22:21:30.947044 systemd[1]: Mounted sysroot.mount. Feb 12 22:21:30.948015 systemd[1]: Reached target initrd-root-fs.target. Feb 12 22:21:30.967908 systemd[1]: Mounting sysroot-usr.mount... Feb 12 22:21:30.971286 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 12 22:21:30.973127 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 22:21:30.973180 systemd[1]: Reached target ignition-diskful.target. Feb 12 22:21:30.977827 systemd[1]: Mounted sysroot-usr.mount. Feb 12 22:21:30.992616 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 22:21:30.995665 systemd[1]: Starting initrd-setup-root.service... Feb 12 22:21:31.009407 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1084) Feb 12 22:21:31.013275 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Feb 12 22:21:31.013353 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 12 22:21:31.013365 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 12 22:21:31.020400 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 12 22:21:31.022917 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 22:21:31.050973 initrd-setup-root[1089]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 22:21:31.127706 initrd-setup-root[1115]: cut: /sysroot/etc/group: No such file or directory Feb 12 22:21:31.132861 initrd-setup-root[1123]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 22:21:31.138506 initrd-setup-root[1131]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 22:21:31.558767 systemd[1]: Finished initrd-setup-root.service. Feb 12 22:21:31.565101 kernel: audit: type=1130 audit(1707776491.558:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:31.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:31.566011 systemd[1]: Starting ignition-mount.service... Feb 12 22:21:31.570827 systemd[1]: Starting sysroot-boot.service... Feb 12 22:21:31.578340 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 12 22:21:31.578476 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 12 22:21:31.608813 systemd[1]: Finished sysroot-boot.service. Feb 12 22:21:31.614859 kernel: audit: type=1130 audit(1707776491.608:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:31.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:31.720191 ignition[1152]: INFO : Ignition 2.14.0 Feb 12 22:21:31.720191 ignition[1152]: INFO : Stage: mount Feb 12 22:21:31.723888 ignition[1152]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:21:31.723888 ignition[1152]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:21:31.738714 ignition[1152]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:21:31.740483 ignition[1152]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:21:31.743123 ignition[1152]: INFO : PUT result: OK Feb 12 22:21:31.749164 ignition[1152]: INFO : mount: mount passed Feb 12 22:21:31.751525 ignition[1152]: INFO : Ignition finished successfully Feb 12 22:21:31.751895 systemd[1]: Finished ignition-mount.service. Feb 12 22:21:31.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:31.757342 systemd[1]: Starting ignition-files.service... Feb 12 22:21:31.768342 kernel: audit: type=1130 audit(1707776491.755:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:31.774780 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 22:21:31.791759 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1159) Feb 12 22:21:31.798569 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Feb 12 22:21:31.798634 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 12 22:21:31.798653 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 12 22:21:31.809405 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 12 22:21:31.812981 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 22:21:31.832970 ignition[1178]: INFO : Ignition 2.14.0 Feb 12 22:21:31.832970 ignition[1178]: INFO : Stage: files Feb 12 22:21:31.836133 ignition[1178]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:21:31.836133 ignition[1178]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:21:31.853051 ignition[1178]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:21:31.855867 ignition[1178]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:21:31.857404 ignition[1178]: INFO : PUT result: OK Feb 12 22:21:31.863464 ignition[1178]: DEBUG : files: compiled without relabeling support, skipping Feb 12 22:21:31.868964 ignition[1178]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 22:21:31.872910 ignition[1178]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 22:21:31.948661 ignition[1178]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 22:21:31.950761 ignition[1178]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 22:21:31.950761 ignition[1178]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 22:21:31.950571 unknown[1178]: wrote ssh authorized keys file for user: core Feb 12 22:21:31.959877 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 12 22:21:31.963297 ignition[1178]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Feb 12 22:21:32.442707 ignition[1178]: INFO : GET result: OK Feb 12 22:21:32.659166 ignition[1178]: DEBUG : file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Feb 12 22:21:32.662613 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 12 22:21:32.662613 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 22:21:32.662613 ignition[1178]: INFO : GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 12 22:21:32.734937 ignition[1178]: INFO : GET result: OK Feb 12 22:21:32.831283 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 22:21:32.833904 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 12 22:21:32.833904 ignition[1178]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Feb 12 22:21:33.237314 ignition[1178]: INFO : GET result: OK Feb 12 22:21:33.371214 ignition[1178]: DEBUG : file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Feb 12 22:21:33.376775 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 12 22:21:33.376775 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Feb 12 22:21:33.376775 ignition[1178]: INFO : GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubectl: attempt #1 Feb 12 22:21:33.489096 ignition[1178]: INFO : GET result: OK Feb 12 22:21:33.751214 ignition[1178]: DEBUG : file matches expected sum of: 97840854134909d75a1a2563628cc4ba632067369ce7fc8a8a1e90a387d32dd7bfd73f4f5b5a82ef842088e7470692951eb7fc869c5f297dd740f855672ee628 Feb 12 22:21:33.753982 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 12 22:21:33.753982 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 12 22:21:33.753982 ignition[1178]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 22:21:33.767025 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1178) Feb 12 22:21:33.767068 ignition[1178]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem292603383" Feb 12 22:21:33.767068 ignition[1178]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem292603383": device or resource busy Feb 12 22:21:33.767068 ignition[1178]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem292603383", trying btrfs: device or resource busy Feb 12 22:21:33.767068 ignition[1178]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem292603383" Feb 12 22:21:33.776204 ignition[1178]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem292603383" Feb 12 22:21:33.826825 ignition[1178]: INFO : op(3): [started] unmounting "/mnt/oem292603383" Feb 12 22:21:33.828459 ignition[1178]: INFO : op(3): [finished] unmounting "/mnt/oem292603383" Feb 12 22:21:33.828459 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 12 22:21:33.828459 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 22:21:33.828459 ignition[1178]: INFO : GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Feb 12 22:21:33.837495 systemd[1]: mnt-oem292603383.mount: Deactivated successfully. Feb 12 22:21:33.897303 ignition[1178]: INFO : GET result: OK Feb 12 22:21:34.139920 ignition[1178]: DEBUG : file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Feb 12 22:21:34.142736 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 22:21:34.142736 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 22:21:34.142736 ignition[1178]: INFO : GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Feb 12 22:21:34.213673 ignition[1178]: INFO : GET result: OK Feb 12 22:21:34.851981 ignition[1178]: DEBUG : file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Feb 12 22:21:34.854997 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 22:21:34.854997 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 22:21:34.854997 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 22:21:34.854997 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" Feb 12 22:21:34.854997 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 22:21:34.866778 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 12 22:21:34.866778 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 12 22:21:34.866778 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 22:21:34.866778 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 22:21:34.866778 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 22:21:34.880534 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 22:21:34.919280 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 22:21:34.922020 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 22:21:34.924083 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 22:21:34.926595 ignition[1178]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 22:21:34.935575 ignition[1178]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2470309974" Feb 12 22:21:34.938750 ignition[1178]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2470309974": device or resource busy Feb 12 22:21:34.938750 ignition[1178]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2470309974", trying btrfs: device or resource busy Feb 12 22:21:34.938750 ignition[1178]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2470309974" Feb 12 22:21:34.945436 ignition[1178]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2470309974" Feb 12 22:21:34.945436 ignition[1178]: INFO : op(6): [started] unmounting "/mnt/oem2470309974" Feb 12 22:21:34.945436 ignition[1178]: INFO : op(6): [finished] unmounting "/mnt/oem2470309974" Feb 12 22:21:34.945436 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 22:21:34.945436 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 12 22:21:34.945436 ignition[1178]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 22:21:34.962164 systemd[1]: mnt-oem2470309974.mount: Deactivated successfully. Feb 12 22:21:34.976625 ignition[1178]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2294490114" Feb 12 22:21:34.978485 ignition[1178]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2294490114": device or resource busy Feb 12 22:21:34.978485 ignition[1178]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2294490114", trying btrfs: device or resource busy Feb 12 22:21:34.978485 ignition[1178]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2294490114" Feb 12 22:21:34.978485 ignition[1178]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2294490114" Feb 12 22:21:34.978485 ignition[1178]: INFO : op(9): [started] unmounting "/mnt/oem2294490114" Feb 12 22:21:34.987662 ignition[1178]: INFO : op(9): [finished] unmounting "/mnt/oem2294490114" Feb 12 22:21:34.987662 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 12 22:21:34.987662 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 12 22:21:34.987662 ignition[1178]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 22:21:35.012283 systemd[1]: mnt-oem2294490114.mount: Deactivated successfully. Feb 12 22:21:35.035609 ignition[1178]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2473725989" Feb 12 22:21:35.037548 ignition[1178]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2473725989": device or resource busy Feb 12 22:21:35.037548 ignition[1178]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2473725989", trying btrfs: device or resource busy Feb 12 22:21:35.037548 ignition[1178]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2473725989" Feb 12 22:21:35.046543 ignition[1178]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2473725989" Feb 12 22:21:35.046543 ignition[1178]: INFO : op(c): [started] unmounting "/mnt/oem2473725989" Feb 12 22:21:35.049688 ignition[1178]: INFO : op(c): [finished] unmounting "/mnt/oem2473725989" Feb 12 22:21:35.049688 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 12 22:21:35.049688 ignition[1178]: INFO : files: op(13): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 12 22:21:35.049688 ignition[1178]: INFO : files: op(13): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 12 22:21:35.049688 ignition[1178]: INFO : files: op(14): [started] processing unit "amazon-ssm-agent.service" Feb 12 22:21:35.049688 ignition[1178]: INFO : files: op(14): op(15): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 12 22:21:35.049688 ignition[1178]: INFO : files: op(14): op(15): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 12 22:21:35.049688 ignition[1178]: INFO : files: op(14): [finished] processing unit "amazon-ssm-agent.service" Feb 12 22:21:35.049688 ignition[1178]: INFO : files: op(16): [started] processing unit "nvidia.service" Feb 12 22:21:35.049688 ignition[1178]: INFO : files: op(16): [finished] processing unit "nvidia.service" Feb 12 22:21:35.049688 ignition[1178]: INFO : files: op(17): [started] processing unit "prepare-cni-plugins.service" Feb 12 22:21:35.049688 ignition[1178]: INFO : files: op(17): op(18): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 22:21:35.049688 ignition[1178]: INFO : files: op(17): op(18): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 22:21:35.049688 ignition[1178]: INFO : files: op(17): [finished] processing unit "prepare-cni-plugins.service" Feb 12 22:21:35.049688 ignition[1178]: INFO : files: op(19): [started] processing unit "prepare-critools.service" Feb 12 22:21:35.049688 ignition[1178]: INFO : files: op(19): op(1a): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 22:21:35.049688 ignition[1178]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 22:21:35.049688 ignition[1178]: INFO : files: op(19): [finished] processing unit "prepare-critools.service" Feb 12 22:21:35.049688 ignition[1178]: INFO : files: op(1b): [started] processing unit "prepare-helm.service" Feb 12 22:21:35.111502 kernel: audit: type=1130 audit(1707776495.094:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.085175 systemd[1]: Finished ignition-files.service. Feb 12 22:21:35.116902 ignition[1178]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 22:21:35.116902 ignition[1178]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 22:21:35.116902 ignition[1178]: INFO : files: op(1b): [finished] processing unit "prepare-helm.service" Feb 12 22:21:35.116902 ignition[1178]: INFO : files: op(1d): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 22:21:35.116902 ignition[1178]: INFO : files: op(1d): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 22:21:35.116902 ignition[1178]: INFO : files: op(1e): [started] setting preset to enabled for "amazon-ssm-agent.service" Feb 12 22:21:35.116902 ignition[1178]: INFO : files: op(1e): [finished] setting preset to enabled for "amazon-ssm-agent.service" Feb 12 22:21:35.116902 ignition[1178]: INFO : files: op(1f): [started] setting preset to enabled for "nvidia.service" Feb 12 22:21:35.116902 ignition[1178]: INFO : files: op(1f): [finished] setting preset to enabled for "nvidia.service" Feb 12 22:21:35.116902 ignition[1178]: INFO : files: op(20): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 22:21:35.116902 ignition[1178]: INFO : files: op(20): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 22:21:35.116902 ignition[1178]: INFO : files: op(21): [started] setting preset to enabled for "prepare-critools.service" Feb 12 22:21:35.116902 ignition[1178]: INFO : files: op(21): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 22:21:35.116902 ignition[1178]: INFO : files: op(22): [started] setting preset to enabled for "prepare-helm.service" Feb 12 22:21:35.116902 ignition[1178]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-helm.service" Feb 12 22:21:35.116902 ignition[1178]: INFO : files: createResultFile: createFiles: op(23): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 22:21:35.116902 ignition[1178]: INFO : files: createResultFile: createFiles: op(23): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 22:21:35.116902 ignition[1178]: INFO : files: files passed Feb 12 22:21:35.116902 ignition[1178]: INFO : Ignition finished successfully Feb 12 22:21:35.182758 kernel: audit: type=1130 audit(1707776495.169:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.101748 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 22:21:35.145801 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 22:21:35.162585 systemd[1]: Starting ignition-quench.service... Feb 12 22:21:35.166753 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 22:21:35.166855 systemd[1]: Finished ignition-quench.service. Feb 12 22:21:35.262410 initrd-setup-root-after-ignition[1203]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 22:21:35.266260 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 22:21:35.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.266492 systemd[1]: Reached target ignition-complete.target. Feb 12 22:21:35.271372 systemd[1]: Starting initrd-parse-etc.service... Feb 12 22:21:35.295950 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 22:21:35.296086 systemd[1]: Finished initrd-parse-etc.service. Feb 12 22:21:35.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.304484 systemd[1]: Reached target initrd-fs.target. Feb 12 22:21:35.306339 systemd[1]: Reached target initrd.target. Feb 12 22:21:35.308257 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 22:21:35.310843 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 22:21:35.324096 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 22:21:35.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.327286 systemd[1]: Starting initrd-cleanup.service... Feb 12 22:21:35.341330 systemd[1]: Stopped target nss-lookup.target. Feb 12 22:21:35.341684 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 22:21:35.346043 systemd[1]: Stopped target timers.target. Feb 12 22:21:35.347078 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 22:21:35.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.347191 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 22:21:35.350450 systemd[1]: Stopped target initrd.target. Feb 12 22:21:35.353263 systemd[1]: Stopped target basic.target. Feb 12 22:21:35.354968 systemd[1]: Stopped target ignition-complete.target. Feb 12 22:21:35.357505 systemd[1]: Stopped target ignition-diskful.target. Feb 12 22:21:35.359509 systemd[1]: Stopped target initrd-root-device.target. Feb 12 22:21:35.361476 systemd[1]: Stopped target remote-fs.target. Feb 12 22:21:35.363111 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 22:21:35.365353 systemd[1]: Stopped target sysinit.target. Feb 12 22:21:35.367059 systemd[1]: Stopped target local-fs.target. Feb 12 22:21:35.381638 systemd[1]: Stopped target local-fs-pre.target. Feb 12 22:21:35.384026 systemd[1]: Stopped target swap.target. Feb 12 22:21:35.385597 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 22:21:35.386786 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 22:21:35.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.388623 systemd[1]: Stopped target cryptsetup.target. Feb 12 22:21:35.390788 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 22:21:35.392021 systemd[1]: Stopped dracut-initqueue.service. Feb 12 22:21:35.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.394130 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 22:21:35.394302 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 22:21:35.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.397548 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 22:21:35.398648 systemd[1]: Stopped ignition-files.service. Feb 12 22:21:35.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.401416 systemd[1]: Stopping ignition-mount.service... Feb 12 22:21:35.410134 iscsid[1026]: iscsid shutting down. Feb 12 22:21:35.411235 systemd[1]: Stopping iscsid.service... Feb 12 22:21:35.413158 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 22:21:35.414972 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 22:21:35.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.421292 ignition[1216]: INFO : Ignition 2.14.0 Feb 12 22:21:35.421292 ignition[1216]: INFO : Stage: umount Feb 12 22:21:35.421292 ignition[1216]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 22:21:35.421292 ignition[1216]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 22:21:35.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.417631 systemd[1]: Stopping sysroot-boot.service... Feb 12 22:21:35.421713 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 22:21:35.421877 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 22:21:35.423269 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 22:21:35.423377 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 22:21:35.438608 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 22:21:35.439697 systemd[1]: Stopped iscsid.service. Feb 12 22:21:35.440621 ignition[1216]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 22:21:35.443810 ignition[1216]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 22:21:35.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.444708 systemd[1]: Stopping iscsiuio.service... Feb 12 22:21:35.447710 ignition[1216]: INFO : PUT result: OK Feb 12 22:21:35.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.450499 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 22:21:35.450628 systemd[1]: Stopped iscsiuio.service. Feb 12 22:21:35.456475 ignition[1216]: INFO : umount: umount passed Feb 12 22:21:35.456475 ignition[1216]: INFO : Ignition finished successfully Feb 12 22:21:35.452108 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 22:21:35.452421 systemd[1]: Finished initrd-cleanup.service. Feb 12 22:21:35.461464 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 22:21:35.461588 systemd[1]: Stopped ignition-mount.service. Feb 12 22:21:35.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.464657 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 22:21:35.464726 systemd[1]: Stopped ignition-disks.service. Feb 12 22:21:35.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.467548 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 22:21:35.467607 systemd[1]: Stopped ignition-kargs.service. Feb 12 22:21:35.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.470767 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 12 22:21:35.470813 systemd[1]: Stopped ignition-fetch.service. Feb 12 22:21:35.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.475226 systemd[1]: Stopped target network.target. Feb 12 22:21:35.476274 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 22:21:35.476325 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 22:21:35.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.481791 systemd[1]: Stopped target paths.target. Feb 12 22:21:35.485423 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 22:21:35.487572 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 22:21:35.488698 systemd[1]: Stopped target slices.target. Feb 12 22:21:35.490638 systemd[1]: Stopped target sockets.target. Feb 12 22:21:35.490785 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 22:21:35.490927 systemd[1]: Closed iscsid.socket. Feb 12 22:21:35.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.494584 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 22:21:35.494661 systemd[1]: Closed iscsiuio.socket. Feb 12 22:21:35.496900 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 22:21:35.496991 systemd[1]: Stopped ignition-setup.service. Feb 12 22:21:35.499021 systemd[1]: Stopping systemd-networkd.service... Feb 12 22:21:35.502308 systemd[1]: Stopping systemd-resolved.service... Feb 12 22:21:35.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.505440 systemd-networkd[1021]: eth0: DHCPv6 lease lost Feb 12 22:21:35.507396 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 22:21:35.507550 systemd[1]: Stopped systemd-networkd.service. Feb 12 22:21:35.513031 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 22:21:35.514119 systemd[1]: Stopped systemd-resolved.service. Feb 12 22:21:35.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.517000 audit: BPF prog-id=9 op=UNLOAD Feb 12 22:21:35.517761 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 22:21:35.520000 audit: BPF prog-id=6 op=UNLOAD Feb 12 22:21:35.517807 systemd[1]: Closed systemd-networkd.socket. Feb 12 22:21:35.520187 systemd[1]: Stopping network-cleanup.service... Feb 12 22:21:35.536018 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 22:21:35.536316 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 22:21:35.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.539791 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 22:21:35.539870 systemd[1]: Stopped systemd-sysctl.service. Feb 12 22:21:35.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.543552 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 22:21:35.543603 systemd[1]: Stopped systemd-modules-load.service. Feb 12 22:21:35.545679 systemd[1]: Stopping systemd-udevd.service... Feb 12 22:21:35.555142 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 22:21:35.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.555292 systemd[1]: Stopped systemd-udevd.service. Feb 12 22:21:35.559458 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 22:21:35.559506 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 22:21:35.560605 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 22:21:35.561931 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 22:21:35.565045 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 22:21:35.565103 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 22:21:35.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.568837 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 22:21:35.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.568880 systemd[1]: Stopped dracut-cmdline.service. Feb 12 22:21:35.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.571318 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 22:21:35.571366 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 22:21:35.577134 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 22:21:35.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.578510 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 22:21:35.578570 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 22:21:35.580061 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 22:21:35.580162 systemd[1]: Stopped network-cleanup.service. Feb 12 22:21:35.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.598332 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 22:21:35.598485 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 22:21:35.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:35.937877 systemd[1]: mnt-oem2473725989.mount: Deactivated successfully. Feb 12 22:21:35.938056 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 22:21:35.938163 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 22:21:36.601740 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 22:21:36.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:36.601873 systemd[1]: Stopped sysroot-boot.service. Feb 12 22:21:36.612869 kernel: kauditd_printk_skb: 38 callbacks suppressed Feb 12 22:21:36.612894 kernel: audit: type=1131 audit(1707776496.601:77): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:36.602177 systemd[1]: Reached target initrd-switch-root.target. Feb 12 22:21:36.612847 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 22:21:36.612922 systemd[1]: Stopped initrd-setup-root.service. Feb 12 22:21:36.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:36.623424 kernel: audit: type=1131 audit(1707776496.617:78): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:36.618853 systemd[1]: Starting initrd-switch-root.service... Feb 12 22:21:36.634919 systemd[1]: Switching root. Feb 12 22:21:36.655468 systemd-journald[185]: Journal stopped Feb 12 22:21:52.672134 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Feb 12 22:21:52.672213 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 22:21:52.672240 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 22:21:52.672264 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 22:21:52.672282 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 22:21:52.672299 kernel: SELinux: policy capability open_perms=1 Feb 12 22:21:52.672317 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 22:21:52.672334 kernel: SELinux: policy capability always_check_network=0 Feb 12 22:21:52.672351 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 22:21:52.672369 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 22:21:52.672478 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 22:21:52.672501 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 22:21:52.672522 kernel: audit: type=1403 audit(1707776500.180:79): auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 22:21:52.672546 systemd[1]: Successfully loaded SELinux policy in 435.521ms. Feb 12 22:21:52.673492 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 86.917ms. Feb 12 22:21:52.673517 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 22:21:52.673537 systemd[1]: Detected virtualization amazon. Feb 12 22:21:52.673561 systemd[1]: Detected architecture x86-64. Feb 12 22:21:52.673578 systemd[1]: Detected first boot. Feb 12 22:21:52.673596 systemd[1]: Initializing machine ID from VM UUID. Feb 12 22:21:52.673615 kernel: audit: type=1400 audit(1707776500.967:80): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 22:21:52.673639 kernel: audit: type=1400 audit(1707776500.967:81): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 22:21:52.673655 kernel: audit: type=1334 audit(1707776500.971:82): prog-id=10 op=LOAD Feb 12 22:21:52.673672 kernel: audit: type=1334 audit(1707776500.971:83): prog-id=10 op=UNLOAD Feb 12 22:21:52.673689 kernel: audit: type=1334 audit(1707776500.975:84): prog-id=11 op=LOAD Feb 12 22:21:52.673705 kernel: audit: type=1334 audit(1707776500.975:85): prog-id=11 op=UNLOAD Feb 12 22:21:52.673721 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 22:21:52.673739 kernel: audit: type=1400 audit(1707776501.529:86): avc: denied { associate } for pid=1250 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 22:21:52.673760 systemd[1]: Populated /etc with preset unit settings. Feb 12 22:21:52.673779 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 22:21:52.673799 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 22:21:52.673819 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 22:21:52.673837 kernel: kauditd_printk_skb: 8 callbacks suppressed Feb 12 22:21:52.673854 kernel: audit: type=1334 audit(1707776512.325:88): prog-id=12 op=LOAD Feb 12 22:21:52.673870 kernel: audit: type=1334 audit(1707776512.325:89): prog-id=3 op=UNLOAD Feb 12 22:21:52.673890 kernel: audit: type=1334 audit(1707776512.327:90): prog-id=13 op=LOAD Feb 12 22:21:52.673906 kernel: audit: type=1334 audit(1707776512.329:91): prog-id=14 op=LOAD Feb 12 22:21:52.674030 kernel: audit: type=1334 audit(1707776512.329:92): prog-id=4 op=UNLOAD Feb 12 22:21:52.674048 kernel: audit: type=1334 audit(1707776512.329:93): prog-id=5 op=UNLOAD Feb 12 22:21:52.674065 kernel: audit: type=1334 audit(1707776512.331:94): prog-id=15 op=LOAD Feb 12 22:21:52.674082 kernel: audit: type=1334 audit(1707776512.331:95): prog-id=12 op=UNLOAD Feb 12 22:21:52.674099 kernel: audit: type=1334 audit(1707776512.333:96): prog-id=16 op=LOAD Feb 12 22:21:52.674120 kernel: audit: type=1334 audit(1707776512.336:97): prog-id=17 op=LOAD Feb 12 22:21:52.674138 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 22:21:52.674156 systemd[1]: Stopped initrd-switch-root.service. Feb 12 22:21:52.674175 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 22:21:52.674193 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 22:21:52.674212 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 22:21:52.674231 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 12 22:21:52.674249 systemd[1]: Created slice system-getty.slice. Feb 12 22:21:52.674267 systemd[1]: Created slice system-modprobe.slice. Feb 12 22:21:52.674288 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 22:21:52.674317 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 22:21:52.674339 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 22:21:52.674358 systemd[1]: Created slice user.slice. Feb 12 22:21:52.675840 systemd[1]: Started systemd-ask-password-console.path. Feb 12 22:21:52.675872 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 22:21:52.675893 systemd[1]: Set up automount boot.automount. Feb 12 22:21:52.675914 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 22:21:52.675934 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 22:21:52.675954 systemd[1]: Stopped target initrd-fs.target. Feb 12 22:21:52.675974 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 22:21:52.675994 systemd[1]: Reached target integritysetup.target. Feb 12 22:21:52.676013 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 22:21:52.676034 systemd[1]: Reached target remote-fs.target. Feb 12 22:21:52.676058 systemd[1]: Reached target slices.target. Feb 12 22:21:52.676078 systemd[1]: Reached target swap.target. Feb 12 22:21:52.676098 systemd[1]: Reached target torcx.target. Feb 12 22:21:52.676118 systemd[1]: Reached target veritysetup.target. Feb 12 22:21:52.676139 systemd[1]: Listening on systemd-coredump.socket. Feb 12 22:21:52.676160 systemd[1]: Listening on systemd-initctl.socket. Feb 12 22:21:52.676180 systemd[1]: Listening on systemd-networkd.socket. Feb 12 22:21:52.676205 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 22:21:52.676225 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 22:21:52.676248 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 22:21:52.676268 systemd[1]: Mounting dev-hugepages.mount... Feb 12 22:21:52.676288 systemd[1]: Mounting dev-mqueue.mount... Feb 12 22:21:52.676308 systemd[1]: Mounting media.mount... Feb 12 22:21:52.676327 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 22:21:52.676348 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 22:21:52.676463 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 22:21:52.676489 systemd[1]: Mounting tmp.mount... Feb 12 22:21:52.676512 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 22:21:52.676536 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 22:21:52.676556 systemd[1]: Starting kmod-static-nodes.service... Feb 12 22:21:52.676575 systemd[1]: Starting modprobe@configfs.service... Feb 12 22:21:52.676598 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 22:21:52.676619 systemd[1]: Starting modprobe@drm.service... Feb 12 22:21:52.676638 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 22:21:52.676657 systemd[1]: Starting modprobe@fuse.service... Feb 12 22:21:52.676676 systemd[1]: Starting modprobe@loop.service... Feb 12 22:21:52.676696 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 22:21:52.676722 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 22:21:52.676744 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 22:21:52.676763 kernel: loop: module loaded Feb 12 22:21:52.676781 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 22:21:52.676800 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 22:21:52.676819 systemd[1]: Stopped systemd-journald.service. Feb 12 22:21:52.676837 systemd[1]: Starting systemd-journald.service... Feb 12 22:21:52.676873 systemd[1]: Starting systemd-modules-load.service... Feb 12 22:21:52.676893 systemd[1]: Starting systemd-network-generator.service... Feb 12 22:21:52.676914 systemd[1]: Starting systemd-remount-fs.service... Feb 12 22:21:52.676934 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 22:21:52.676964 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 22:21:52.676983 systemd[1]: Stopped verity-setup.service. Feb 12 22:21:52.677022 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 22:21:52.677042 systemd[1]: Mounted dev-hugepages.mount. Feb 12 22:21:52.677061 systemd[1]: Mounted dev-mqueue.mount. Feb 12 22:21:52.677080 systemd[1]: Mounted media.mount. Feb 12 22:21:52.677099 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 22:21:52.677120 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 22:21:52.677140 systemd[1]: Mounted tmp.mount. Feb 12 22:21:52.677219 systemd[1]: Finished kmod-static-nodes.service. Feb 12 22:21:52.677242 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 22:21:52.677263 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 22:21:52.677282 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 22:21:52.677339 systemd[1]: Finished modprobe@drm.service. Feb 12 22:21:52.677361 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 22:21:52.677381 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 22:21:52.677419 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 22:21:52.677439 systemd[1]: Finished modprobe@configfs.service. Feb 12 22:21:52.677462 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 22:21:52.677481 systemd[1]: Finished modprobe@loop.service. Feb 12 22:21:52.677501 systemd[1]: Finished systemd-network-generator.service. Feb 12 22:21:52.677521 systemd[1]: Finished systemd-remount-fs.service. Feb 12 22:21:52.677541 systemd[1]: Reached target network-pre.target. Feb 12 22:21:52.677561 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 22:21:52.677586 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 22:21:52.677607 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 22:21:52.677630 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 22:21:52.677650 systemd[1]: Starting systemd-random-seed.service... Feb 12 22:21:52.677670 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 22:21:52.677691 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 22:21:52.677713 systemd[1]: Finished systemd-random-seed.service. Feb 12 22:21:52.677739 systemd[1]: Reached target first-boot-complete.target. Feb 12 22:21:52.677764 systemd-journald[1317]: Journal started Feb 12 22:21:52.677840 systemd-journald[1317]: Runtime Journal (/run/log/journal/ec21cbee5547c443cba93a03c2004e69) is 4.8M, max 38.7M, 33.9M free. Feb 12 22:21:40.180000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 22:21:40.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 22:21:40.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 22:21:40.971000 audit: BPF prog-id=10 op=LOAD Feb 12 22:21:40.971000 audit: BPF prog-id=10 op=UNLOAD Feb 12 22:21:40.975000 audit: BPF prog-id=11 op=LOAD Feb 12 22:21:40.975000 audit: BPF prog-id=11 op=UNLOAD Feb 12 22:21:41.529000 audit[1250]: AVC avc: denied { associate } for pid=1250 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 22:21:41.529000 audit[1250]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001078dc a1=c00002ae40 a2=c000029b00 a3=32 items=0 ppid=1233 pid=1250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:21:41.529000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 22:21:41.532000 audit[1250]: AVC avc: denied { associate } for pid=1250 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 22:21:41.532000 audit[1250]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001079b5 a2=1ed a3=0 items=2 ppid=1233 pid=1250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:21:41.532000 audit: CWD cwd="/" Feb 12 22:21:41.532000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:41.532000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:52.680496 systemd[1]: Started systemd-journald.service. Feb 12 22:21:41.532000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 22:21:52.325000 audit: BPF prog-id=12 op=LOAD Feb 12 22:21:52.325000 audit: BPF prog-id=3 op=UNLOAD Feb 12 22:21:52.327000 audit: BPF prog-id=13 op=LOAD Feb 12 22:21:52.329000 audit: BPF prog-id=14 op=LOAD Feb 12 22:21:52.329000 audit: BPF prog-id=4 op=UNLOAD Feb 12 22:21:52.329000 audit: BPF prog-id=5 op=UNLOAD Feb 12 22:21:52.331000 audit: BPF prog-id=15 op=LOAD Feb 12 22:21:52.331000 audit: BPF prog-id=12 op=UNLOAD Feb 12 22:21:52.333000 audit: BPF prog-id=16 op=LOAD Feb 12 22:21:52.336000 audit: BPF prog-id=17 op=LOAD Feb 12 22:21:52.336000 audit: BPF prog-id=13 op=UNLOAD Feb 12 22:21:52.336000 audit: BPF prog-id=14 op=UNLOAD Feb 12 22:21:52.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.348000 audit: BPF prog-id=15 op=UNLOAD Feb 12 22:21:52.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.523000 audit: BPF prog-id=18 op=LOAD Feb 12 22:21:52.523000 audit: BPF prog-id=19 op=LOAD Feb 12 22:21:52.523000 audit: BPF prog-id=20 op=LOAD Feb 12 22:21:52.523000 audit: BPF prog-id=16 op=UNLOAD Feb 12 22:21:52.523000 audit: BPF prog-id=17 op=UNLOAD Feb 12 22:21:52.555000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.683871 kernel: fuse: init (API version 7.34) Feb 12 22:21:52.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.669000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 22:21:52.669000 audit[1317]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fff2a1fe170 a2=4000 a3=7fff2a1fe20c items=0 ppid=1 pid=1317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:21:52.669000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 22:21:52.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:41.465342 /usr/lib/systemd/system-generators/torcx-generator[1250]: time="2024-02-12T22:21:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 22:21:52.323853 systemd[1]: Queued start job for default target multi-user.target. Feb 12 22:21:41.465889 /usr/lib/systemd/system-generators/torcx-generator[1250]: time="2024-02-12T22:21:41Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 22:21:52.338377 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 22:21:41.465908 /usr/lib/systemd/system-generators/torcx-generator[1250]: time="2024-02-12T22:21:41Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 22:21:52.682628 systemd[1]: Starting systemd-journal-flush.service... Feb 12 22:21:41.465978 /usr/lib/systemd/system-generators/torcx-generator[1250]: time="2024-02-12T22:21:41Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 22:21:52.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.684763 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 22:21:41.466001 /usr/lib/systemd/system-generators/torcx-generator[1250]: time="2024-02-12T22:21:41Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 22:21:52.684992 systemd[1]: Finished modprobe@fuse.service. Feb 12 22:21:41.466037 /usr/lib/systemd/system-generators/torcx-generator[1250]: time="2024-02-12T22:21:41Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 22:21:52.688182 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 22:21:41.466050 /usr/lib/systemd/system-generators/torcx-generator[1250]: time="2024-02-12T22:21:41Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 22:21:41.466259 /usr/lib/systemd/system-generators/torcx-generator[1250]: time="2024-02-12T22:21:41Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 22:21:41.466302 /usr/lib/systemd/system-generators/torcx-generator[1250]: time="2024-02-12T22:21:41Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 22:21:52.695342 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 22:21:41.466315 /usr/lib/systemd/system-generators/torcx-generator[1250]: time="2024-02-12T22:21:41Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 22:21:41.475368 /usr/lib/systemd/system-generators/torcx-generator[1250]: time="2024-02-12T22:21:41Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 22:21:41.475434 /usr/lib/systemd/system-generators/torcx-generator[1250]: time="2024-02-12T22:21:41Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 22:21:41.475456 /usr/lib/systemd/system-generators/torcx-generator[1250]: time="2024-02-12T22:21:41Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 22:21:41.475471 /usr/lib/systemd/system-generators/torcx-generator[1250]: time="2024-02-12T22:21:41Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 22:21:41.475489 /usr/lib/systemd/system-generators/torcx-generator[1250]: time="2024-02-12T22:21:41Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 22:21:41.475503 /usr/lib/systemd/system-generators/torcx-generator[1250]: time="2024-02-12T22:21:41Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 22:21:51.282086 /usr/lib/systemd/system-generators/torcx-generator[1250]: time="2024-02-12T22:21:51Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:21:51.282378 /usr/lib/systemd/system-generators/torcx-generator[1250]: time="2024-02-12T22:21:51Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:21:51.282518 /usr/lib/systemd/system-generators/torcx-generator[1250]: time="2024-02-12T22:21:51Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:21:51.282702 /usr/lib/systemd/system-generators/torcx-generator[1250]: time="2024-02-12T22:21:51Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 22:21:51.282749 /usr/lib/systemd/system-generators/torcx-generator[1250]: time="2024-02-12T22:21:51Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 22:21:51.282808 /usr/lib/systemd/system-generators/torcx-generator[1250]: time="2024-02-12T22:21:51Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 22:21:52.757618 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 22:21:52.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.760265 systemd[1]: Starting systemd-sysusers.service... Feb 12 22:21:52.761631 systemd[1]: Finished systemd-modules-load.service. Feb 12 22:21:52.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.764085 systemd[1]: Starting systemd-sysctl.service... Feb 12 22:21:52.824482 systemd-journald[1317]: Time spent on flushing to /var/log/journal/ec21cbee5547c443cba93a03c2004e69 is 50.246ms for 1238 entries. Feb 12 22:21:52.824482 systemd-journald[1317]: System Journal (/var/log/journal/ec21cbee5547c443cba93a03c2004e69) is 8.0M, max 195.6M, 187.6M free. Feb 12 22:21:52.981025 systemd-journald[1317]: Received client request to flush runtime journal. Feb 12 22:21:52.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:52.846809 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 22:21:52.981479 udevadm[1365]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 12 22:21:52.849663 systemd[1]: Starting systemd-udev-settle.service... Feb 12 22:21:52.903006 systemd[1]: Finished systemd-sysctl.service. Feb 12 22:21:52.982289 systemd[1]: Finished systemd-journal-flush.service. Feb 12 22:21:52.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:53.385537 systemd[1]: Finished systemd-sysusers.service. Feb 12 22:21:53.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:54.279908 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 22:21:54.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:54.281000 audit: BPF prog-id=21 op=LOAD Feb 12 22:21:54.281000 audit: BPF prog-id=22 op=LOAD Feb 12 22:21:54.281000 audit: BPF prog-id=7 op=UNLOAD Feb 12 22:21:54.281000 audit: BPF prog-id=8 op=UNLOAD Feb 12 22:21:54.282661 systemd[1]: Starting systemd-udevd.service... Feb 12 22:21:54.313008 systemd-udevd[1367]: Using default interface naming scheme 'v252'. Feb 12 22:21:54.539797 systemd[1]: Started systemd-udevd.service. Feb 12 22:21:54.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:54.542000 audit: BPF prog-id=23 op=LOAD Feb 12 22:21:54.543550 systemd[1]: Starting systemd-networkd.service... Feb 12 22:21:54.581480 (udev-worker)[1378]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:21:54.586056 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 22:21:54.621000 audit: BPF prog-id=24 op=LOAD Feb 12 22:21:54.622000 audit: BPF prog-id=25 op=LOAD Feb 12 22:21:54.622000 audit: BPF prog-id=26 op=LOAD Feb 12 22:21:54.623522 systemd[1]: Starting systemd-userdbd.service... Feb 12 22:21:54.660403 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 12 22:21:54.687136 kernel: ACPI: button: Power Button [PWRF] Feb 12 22:21:54.687254 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input4 Feb 12 22:21:54.687288 kernel: ACPI: button: Sleep Button [SLPF] Feb 12 22:21:54.688631 systemd[1]: Started systemd-userdbd.service. Feb 12 22:21:54.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:54.808000 audit[1380]: AVC avc: denied { confidentiality } for pid=1380 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 22:21:54.808000 audit[1380]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c719ff7680 a1=32194 a2=7fc0864d6bc5 a3=5 items=108 ppid=1367 pid=1380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:21:54.808000 audit: CWD cwd="/" Feb 12 22:21:54.808000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=1 name=(null) inode=13752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=2 name=(null) inode=13752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=3 name=(null) inode=13753 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=4 name=(null) inode=13752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.825511 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Feb 12 22:21:54.808000 audit: PATH item=5 name=(null) inode=13754 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=6 name=(null) inode=13752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=7 name=(null) inode=13755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=8 name=(null) inode=13755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=9 name=(null) inode=13756 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=10 name=(null) inode=13755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=11 name=(null) inode=13757 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=12 name=(null) inode=13755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=13 name=(null) inode=13758 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=14 name=(null) inode=13755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=15 name=(null) inode=13759 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=16 name=(null) inode=13755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=17 name=(null) inode=13760 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=18 name=(null) inode=13752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=19 name=(null) inode=13761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=20 name=(null) inode=13761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=21 name=(null) inode=13762 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=22 name=(null) inode=13761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=23 name=(null) inode=13763 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=24 name=(null) inode=13761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=25 name=(null) inode=13764 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=26 name=(null) inode=13761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=27 name=(null) inode=13765 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=28 name=(null) inode=13761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=29 name=(null) inode=13766 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=30 name=(null) inode=13752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=31 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=32 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=33 name=(null) inode=13768 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=34 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=35 name=(null) inode=13769 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=36 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=37 name=(null) inode=13770 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=38 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=39 name=(null) inode=13771 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=40 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=41 name=(null) inode=13772 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=42 name=(null) inode=13752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=43 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=44 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=45 name=(null) inode=13774 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=46 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=47 name=(null) inode=13775 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=48 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=49 name=(null) inode=13776 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=50 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=51 name=(null) inode=13777 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=52 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=53 name=(null) inode=13778 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=55 name=(null) inode=13779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=56 name=(null) inode=13779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=57 name=(null) inode=13780 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=58 name=(null) inode=13779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=59 name=(null) inode=13781 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=60 name=(null) inode=13779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=61 name=(null) inode=13782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=62 name=(null) inode=13782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=63 name=(null) inode=13783 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=64 name=(null) inode=13782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=65 name=(null) inode=13784 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=66 name=(null) inode=13782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=67 name=(null) inode=13785 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=68 name=(null) inode=13782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=69 name=(null) inode=13786 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=70 name=(null) inode=13782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=71 name=(null) inode=13787 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=72 name=(null) inode=13779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=73 name=(null) inode=13788 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=74 name=(null) inode=13788 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=75 name=(null) inode=13789 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=76 name=(null) inode=13788 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=77 name=(null) inode=13790 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=78 name=(null) inode=13788 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=79 name=(null) inode=13791 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=80 name=(null) inode=13788 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=81 name=(null) inode=13792 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=82 name=(null) inode=13788 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=83 name=(null) inode=13793 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=84 name=(null) inode=13779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=85 name=(null) inode=13794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=86 name=(null) inode=13794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=87 name=(null) inode=13795 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=88 name=(null) inode=13794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=89 name=(null) inode=13796 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=90 name=(null) inode=13794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=91 name=(null) inode=13797 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=92 name=(null) inode=13794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=93 name=(null) inode=13798 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=94 name=(null) inode=13794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=95 name=(null) inode=13799 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=96 name=(null) inode=13779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=97 name=(null) inode=13800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=98 name=(null) inode=13800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=99 name=(null) inode=13801 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=100 name=(null) inode=13800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=101 name=(null) inode=13802 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=102 name=(null) inode=13800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=103 name=(null) inode=13803 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=104 name=(null) inode=13800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=105 name=(null) inode=13804 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=106 name=(null) inode=13800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PATH item=107 name=(null) inode=13805 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:21:54.808000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 22:21:54.851415 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input5 Feb 12 22:21:54.855418 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 22:21:55.025602 systemd-networkd[1377]: lo: Link UP Feb 12 22:21:55.025614 systemd-networkd[1377]: lo: Gained carrier Feb 12 22:21:55.026171 systemd-networkd[1377]: Enumeration completed Feb 12 22:21:55.026292 systemd[1]: Started systemd-networkd.service. Feb 12 22:21:55.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:55.026306 systemd-networkd[1377]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 22:21:55.029086 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 22:21:55.039258 systemd-networkd[1377]: eth0: Link UP Feb 12 22:21:55.039406 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 22:21:55.039658 systemd-networkd[1377]: eth0: Gained carrier Feb 12 22:21:55.050552 systemd-networkd[1377]: eth0: DHCPv4 address 172.31.25.241/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 12 22:21:55.117417 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1381) Feb 12 22:21:55.201671 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 22:21:55.206874 systemd[1]: Finished systemd-udev-settle.service. Feb 12 22:21:55.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:55.209064 systemd[1]: Starting lvm2-activation-early.service... Feb 12 22:21:55.506735 lvm[1481]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 22:21:55.539971 systemd[1]: Finished lvm2-activation-early.service. Feb 12 22:21:55.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:55.541436 systemd[1]: Reached target cryptsetup.target. Feb 12 22:21:55.543772 systemd[1]: Starting lvm2-activation.service... Feb 12 22:21:55.549670 lvm[1482]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 22:21:55.570690 systemd[1]: Finished lvm2-activation.service. Feb 12 22:21:55.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:55.572150 systemd[1]: Reached target local-fs-pre.target. Feb 12 22:21:55.573629 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 22:21:55.573655 systemd[1]: Reached target local-fs.target. Feb 12 22:21:55.574566 systemd[1]: Reached target machines.target. Feb 12 22:21:55.576767 systemd[1]: Starting ldconfig.service... Feb 12 22:21:55.578258 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 22:21:55.578402 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 22:21:55.579496 systemd[1]: Starting systemd-boot-update.service... Feb 12 22:21:55.581398 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 22:21:55.589168 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 22:21:55.591780 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 22:21:55.591999 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 22:21:55.593527 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 22:21:55.596518 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1484 (bootctl) Feb 12 22:21:55.598510 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 22:21:55.634416 systemd-tmpfiles[1487]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 22:21:55.702491 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 22:21:55.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:55.727120 systemd-tmpfiles[1487]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 22:21:55.813101 systemd-tmpfiles[1487]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 22:21:55.825786 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 22:21:55.826451 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 22:21:55.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:56.084003 systemd-fsck[1492]: fsck.fat 4.2 (2021-01-31) Feb 12 22:21:56.084003 systemd-fsck[1492]: /dev/nvme0n1p1: 789 files, 115339/258078 clusters Feb 12 22:21:56.086378 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 22:21:56.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:56.089193 systemd[1]: Mounting boot.mount... Feb 12 22:21:56.099321 systemd[1]: Mounted boot.mount. Feb 12 22:21:56.124900 systemd[1]: Finished systemd-boot-update.service. Feb 12 22:21:56.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:56.240540 systemd-networkd[1377]: eth0: Gained IPv6LL Feb 12 22:21:56.245246 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 22:21:56.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:56.363764 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 22:21:56.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:56.366570 systemd[1]: Starting audit-rules.service... Feb 12 22:21:56.368613 systemd[1]: Starting clean-ca-certificates.service... Feb 12 22:21:56.371188 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 22:21:56.375000 audit: BPF prog-id=27 op=LOAD Feb 12 22:21:56.378042 systemd[1]: Starting systemd-resolved.service... Feb 12 22:21:56.379000 audit: BPF prog-id=28 op=LOAD Feb 12 22:21:56.381155 systemd[1]: Starting systemd-timesyncd.service... Feb 12 22:21:56.383656 systemd[1]: Starting systemd-update-utmp.service... Feb 12 22:21:56.408000 audit[1512]: SYSTEM_BOOT pid=1512 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 22:21:56.411200 systemd[1]: Finished systemd-update-utmp.service. Feb 12 22:21:56.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:56.467863 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 22:21:56.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:56.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:21:56.470825 systemd[1]: Finished clean-ca-certificates.service. Feb 12 22:21:56.472135 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 22:21:56.517584 systemd-resolved[1510]: Positive Trust Anchors: Feb 12 22:21:56.517988 systemd-resolved[1510]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 22:21:56.518169 systemd-resolved[1510]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 22:21:56.518619 augenrules[1526]: No rules Feb 12 22:21:56.518000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 22:21:56.518000 audit[1526]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffee9f745e0 a2=420 a3=0 items=0 ppid=1506 pid=1526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:21:56.518000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 22:21:56.519822 systemd[1]: Finished audit-rules.service. Feb 12 22:21:56.521363 systemd[1]: Started systemd-timesyncd.service. Feb 12 22:21:56.523860 systemd[1]: Reached target time-set.target. Feb 12 22:21:56.593062 systemd-resolved[1510]: Defaulting to hostname 'linux'. Feb 12 22:21:56.594918 systemd[1]: Started systemd-resolved.service. Feb 12 22:21:56.596207 systemd[1]: Reached target network.target. Feb 12 22:21:56.597177 systemd[1]: Reached target network-online.target. Feb 12 22:21:56.603196 systemd[1]: Reached target nss-lookup.target. Feb 12 22:21:57.359492 systemd-resolved[1510]: Clock change detected. Flushing caches. Feb 12 22:21:57.359692 systemd-timesyncd[1511]: Contacted time server 108.61.73.244:123 (0.flatcar.pool.ntp.org). Feb 12 22:21:57.359834 systemd-timesyncd[1511]: Initial clock synchronization to Mon 2024-02-12 22:21:57.359415 UTC. Feb 12 22:22:01.287730 ldconfig[1483]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 22:22:01.340554 systemd[1]: Finished ldconfig.service. Feb 12 22:22:01.343291 systemd[1]: Starting systemd-update-done.service... Feb 12 22:22:01.357184 systemd[1]: Finished systemd-update-done.service. Feb 12 22:22:01.358518 systemd[1]: Reached target sysinit.target. Feb 12 22:22:01.359734 systemd[1]: Started motdgen.path. Feb 12 22:22:01.360817 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 22:22:01.362728 systemd[1]: Started logrotate.timer. Feb 12 22:22:01.363814 systemd[1]: Started mdadm.timer. Feb 12 22:22:01.364647 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 22:22:01.365872 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 22:22:01.365909 systemd[1]: Reached target paths.target. Feb 12 22:22:01.366932 systemd[1]: Reached target timers.target. Feb 12 22:22:01.368284 systemd[1]: Listening on dbus.socket. Feb 12 22:22:01.370612 systemd[1]: Starting docker.socket... Feb 12 22:22:01.375285 systemd[1]: Listening on sshd.socket. Feb 12 22:22:01.376665 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 22:22:01.377266 systemd[1]: Listening on docker.socket. Feb 12 22:22:01.378610 systemd[1]: Reached target sockets.target. Feb 12 22:22:01.379555 systemd[1]: Reached target basic.target. Feb 12 22:22:01.380679 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 22:22:01.380720 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 22:22:01.381997 systemd[1]: Started amazon-ssm-agent.service. Feb 12 22:22:01.384497 systemd[1]: Starting containerd.service... Feb 12 22:22:01.387374 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 12 22:22:01.391296 systemd[1]: Starting dbus.service... Feb 12 22:22:01.393108 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 22:22:01.397041 systemd[1]: Starting extend-filesystems.service... Feb 12 22:22:01.398170 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 22:22:01.399194 systemd[1]: Starting motdgen.service... Feb 12 22:22:01.401365 systemd[1]: Started nvidia.service. Feb 12 22:22:01.403933 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 22:22:01.406774 systemd[1]: Starting prepare-critools.service... Feb 12 22:22:01.408727 systemd[1]: Starting prepare-helm.service... Feb 12 22:22:01.410733 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 22:22:01.412947 systemd[1]: Starting sshd-keygen.service... Feb 12 22:22:01.416317 systemd[1]: Starting systemd-logind.service... Feb 12 22:22:01.417342 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 22:22:01.417408 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 22:22:01.418151 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 22:22:01.418981 systemd[1]: Starting update-engine.service... Feb 12 22:22:01.422021 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 22:22:01.433759 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 22:22:01.433924 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 22:22:01.449468 jq[1550]: true Feb 12 22:22:01.449377 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 22:22:01.449776 jq[1539]: false Feb 12 22:22:01.449537 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 22:22:01.498884 tar[1552]: ./ Feb 12 22:22:01.498884 tar[1552]: ./macvlan Feb 12 22:22:01.501646 tar[1553]: crictl Feb 12 22:22:01.506348 tar[1554]: linux-amd64/helm Feb 12 22:22:01.512100 jq[1562]: true Feb 12 22:22:01.540551 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 22:22:01.540756 systemd[1]: Finished motdgen.service. Feb 12 22:22:01.553754 extend-filesystems[1540]: Found nvme0n1 Feb 12 22:22:01.555266 extend-filesystems[1540]: Found nvme0n1p1 Feb 12 22:22:01.555266 extend-filesystems[1540]: Found nvme0n1p2 Feb 12 22:22:01.555266 extend-filesystems[1540]: Found nvme0n1p3 Feb 12 22:22:01.555266 extend-filesystems[1540]: Found usr Feb 12 22:22:01.555266 extend-filesystems[1540]: Found nvme0n1p4 Feb 12 22:22:01.555266 extend-filesystems[1540]: Found nvme0n1p6 Feb 12 22:22:01.555266 extend-filesystems[1540]: Found nvme0n1p7 Feb 12 22:22:01.555266 extend-filesystems[1540]: Found nvme0n1p9 Feb 12 22:22:01.555266 extend-filesystems[1540]: Checking size of /dev/nvme0n1p9 Feb 12 22:22:01.617299 extend-filesystems[1540]: Resized partition /dev/nvme0n1p9 Feb 12 22:22:01.666779 extend-filesystems[1599]: resize2fs 1.46.5 (30-Dec-2021) Feb 12 22:22:01.668815 env[1557]: time="2024-02-12T22:22:01.668752566Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 22:22:01.765114 tar[1552]: ./static Feb 12 22:22:01.769234 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Feb 12 22:22:01.775195 dbus-daemon[1538]: [system] SELinux support is enabled Feb 12 22:22:01.778970 systemd[1]: Started dbus.service. Feb 12 22:22:01.783732 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 22:22:01.783774 systemd[1]: Reached target system-config.target. Feb 12 22:22:01.785011 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 22:22:01.785041 systemd[1]: Reached target user-config.target. Feb 12 22:22:01.833145 dbus-daemon[1538]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1377 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Feb 12 22:22:02.034491 tar[1552]: ./vlan Feb 12 22:22:02.034556 update_engine[1549]: I0212 22:22:02.009948 1549 main.cc:92] Flatcar Update Engine starting Feb 12 22:22:02.034556 update_engine[1549]: I0212 22:22:02.017242 1549 update_check_scheduler.cc:74] Next update check in 8m35s Feb 12 22:22:02.034884 env[1557]: time="2024-02-12T22:22:01.869076746Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 22:22:02.038805 systemd-logind[1548]: Watching system buttons on /dev/input/event1 (Power Button) Feb 12 22:22:02.038837 systemd-logind[1548]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 12 22:22:02.038891 systemd-logind[1548]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 22:22:02.039142 systemd-logind[1548]: New seat seat0. Feb 12 22:22:02.041059 env[1557]: time="2024-02-12T22:22:02.040283397Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:22:02.042510 env[1557]: time="2024-02-12T22:22:02.042459177Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 22:22:02.042510 env[1557]: time="2024-02-12T22:22:02.042510134Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:22:02.042818 env[1557]: time="2024-02-12T22:22:02.042786076Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 22:22:02.042900 env[1557]: time="2024-02-12T22:22:02.042822169Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 22:22:02.042900 env[1557]: time="2024-02-12T22:22:02.042841391Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 22:22:02.042982 env[1557]: time="2024-02-12T22:22:02.042868464Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 22:22:02.043945 env[1557]: time="2024-02-12T22:22:02.043898859Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:22:02.044746 env[1557]: time="2024-02-12T22:22:02.044718149Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 22:22:02.045521 env[1557]: time="2024-02-12T22:22:02.045472111Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 22:22:02.045592 env[1557]: time="2024-02-12T22:22:02.045522102Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 22:22:02.045636 env[1557]: time="2024-02-12T22:22:02.045612434Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 22:22:02.045689 env[1557]: time="2024-02-12T22:22:02.045631691Z" level=info msg="metadata content store policy set" policy=shared Feb 12 22:22:02.047876 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Feb 12 22:22:02.237487 systemd[1]: Starting systemd-hostnamed.service... Feb 12 22:22:02.239297 systemd[1]: nvidia.service: Deactivated successfully. Feb 12 22:22:02.244101 bash[1600]: Updated "/home/core/.ssh/authorized_keys" Feb 12 22:22:02.249581 amazon-ssm-agent[1535]: 2024/02/12 22:22:02 Failed to load instance info from vault. RegistrationKey does not exist. Feb 12 22:22:02.249581 amazon-ssm-agent[1535]: Initializing new seelog logger Feb 12 22:22:02.249581 amazon-ssm-agent[1535]: New Seelog Logger Creation Complete Feb 12 22:22:02.249581 amazon-ssm-agent[1535]: 2024/02/12 22:22:02 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Feb 12 22:22:02.249581 amazon-ssm-agent[1535]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Feb 12 22:22:02.249581 amazon-ssm-agent[1535]: 2024/02/12 22:22:02 processing appconfig overrides Feb 12 22:22:02.247272 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 22:22:02.253196 systemd[1]: Started update-engine.service. Feb 12 22:22:02.276136 env[1557]: time="2024-02-12T22:22:02.256640506Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 22:22:02.276136 env[1557]: time="2024-02-12T22:22:02.256701592Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 22:22:02.276136 env[1557]: time="2024-02-12T22:22:02.256724519Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 22:22:02.276136 env[1557]: time="2024-02-12T22:22:02.256777833Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 22:22:02.276136 env[1557]: time="2024-02-12T22:22:02.256803801Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 22:22:02.276136 env[1557]: time="2024-02-12T22:22:02.256827232Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 22:22:02.276136 env[1557]: time="2024-02-12T22:22:02.256853157Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 22:22:02.276136 env[1557]: time="2024-02-12T22:22:02.257031083Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 22:22:02.276136 env[1557]: time="2024-02-12T22:22:02.257072785Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 22:22:02.276136 env[1557]: time="2024-02-12T22:22:02.257095151Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 22:22:02.276136 env[1557]: time="2024-02-12T22:22:02.257116535Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 22:22:02.276136 env[1557]: time="2024-02-12T22:22:02.257138849Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 22:22:02.276136 env[1557]: time="2024-02-12T22:22:02.257290806Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 22:22:02.276136 env[1557]: time="2024-02-12T22:22:02.257403316Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 22:22:02.267744 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 22:22:02.283591 extend-filesystems[1599]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Feb 12 22:22:02.283591 extend-filesystems[1599]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 12 22:22:02.283591 extend-filesystems[1599]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Feb 12 22:22:02.292015 env[1557]: time="2024-02-12T22:22:02.257741011Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 22:22:02.292015 env[1557]: time="2024-02-12T22:22:02.257775353Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 22:22:02.292015 env[1557]: time="2024-02-12T22:22:02.257795422Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 22:22:02.292015 env[1557]: time="2024-02-12T22:22:02.257875311Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 22:22:02.292015 env[1557]: time="2024-02-12T22:22:02.257894676Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 22:22:02.292015 env[1557]: time="2024-02-12T22:22:02.257911382Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 22:22:02.292015 env[1557]: time="2024-02-12T22:22:02.257927040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 22:22:02.292015 env[1557]: time="2024-02-12T22:22:02.257942614Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 22:22:02.292015 env[1557]: time="2024-02-12T22:22:02.257959113Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 22:22:02.292015 env[1557]: time="2024-02-12T22:22:02.257975647Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 22:22:02.292015 env[1557]: time="2024-02-12T22:22:02.257994841Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 22:22:02.292015 env[1557]: time="2024-02-12T22:22:02.258016090Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 22:22:02.292015 env[1557]: time="2024-02-12T22:22:02.258267387Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 22:22:02.292015 env[1557]: time="2024-02-12T22:22:02.258288179Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 22:22:02.292015 env[1557]: time="2024-02-12T22:22:02.258305086Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 22:22:02.268008 systemd[1]: Finished extend-filesystems.service. Feb 12 22:22:02.297239 extend-filesystems[1540]: Resized filesystem in /dev/nvme0n1p9 Feb 12 22:22:02.299621 env[1557]: time="2024-02-12T22:22:02.258323499Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 22:22:02.299621 env[1557]: time="2024-02-12T22:22:02.258342907Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 22:22:02.299621 env[1557]: time="2024-02-12T22:22:02.258371094Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 22:22:02.299621 env[1557]: time="2024-02-12T22:22:02.258394843Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 22:22:02.299621 env[1557]: time="2024-02-12T22:22:02.258438945Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 22:22:02.289647 systemd[1]: Started systemd-logind.service. Feb 12 22:22:02.299106 systemd[1]: Started locksmithd.service. Feb 12 22:22:02.301016 env[1557]: time="2024-02-12T22:22:02.258718476Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 22:22:02.301016 env[1557]: time="2024-02-12T22:22:02.258796256Z" level=info msg="Connect containerd service" Feb 12 22:22:02.301016 env[1557]: time="2024-02-12T22:22:02.258842348Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 22:22:02.301016 env[1557]: time="2024-02-12T22:22:02.288012592Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 22:22:02.301016 env[1557]: time="2024-02-12T22:22:02.297958166Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 22:22:02.301016 env[1557]: time="2024-02-12T22:22:02.298039944Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 22:22:02.301016 env[1557]: time="2024-02-12T22:22:02.298221371Z" level=info msg="containerd successfully booted in 0.672915s" Feb 12 22:22:02.308460 systemd[1]: Started containerd.service. Feb 12 22:22:02.318748 env[1557]: time="2024-02-12T22:22:02.318369938Z" level=info msg="Start subscribing containerd event" Feb 12 22:22:02.318748 env[1557]: time="2024-02-12T22:22:02.318458524Z" level=info msg="Start recovering state" Feb 12 22:22:02.318748 env[1557]: time="2024-02-12T22:22:02.318558497Z" level=info msg="Start event monitor" Feb 12 22:22:02.318748 env[1557]: time="2024-02-12T22:22:02.318579374Z" level=info msg="Start snapshots syncer" Feb 12 22:22:02.318748 env[1557]: time="2024-02-12T22:22:02.318594619Z" level=info msg="Start cni network conf syncer for default" Feb 12 22:22:02.318748 env[1557]: time="2024-02-12T22:22:02.318607367Z" level=info msg="Start streaming server" Feb 12 22:22:02.422495 tar[1552]: ./portmap Feb 12 22:22:02.606243 tar[1552]: ./host-local Feb 12 22:22:02.616922 dbus-daemon[1538]: [system] Successfully activated service 'org.freedesktop.hostname1' Feb 12 22:22:02.617173 systemd[1]: Started systemd-hostnamed.service. Feb 12 22:22:02.618679 dbus-daemon[1538]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1725 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Feb 12 22:22:02.622892 systemd[1]: Starting polkit.service... Feb 12 22:22:02.642903 polkitd[1734]: Started polkitd version 121 Feb 12 22:22:02.667418 polkitd[1734]: Loading rules from directory /etc/polkit-1/rules.d Feb 12 22:22:02.670234 polkitd[1734]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 12 22:22:02.675566 polkitd[1734]: Finished loading, compiling and executing 2 rules Feb 12 22:22:02.676262 dbus-daemon[1538]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Feb 12 22:22:02.676459 systemd[1]: Started polkit.service. Feb 12 22:22:02.676959 polkitd[1734]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 12 22:22:02.706661 systemd-hostnamed[1725]: Hostname set to (transient) Feb 12 22:22:02.706833 systemd-resolved[1510]: System hostname changed to 'ip-172-31-25-241'. Feb 12 22:22:02.761699 coreos-metadata[1537]: Feb 12 22:22:02.760 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Feb 12 22:22:02.763316 coreos-metadata[1537]: Feb 12 22:22:02.763 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Feb 12 22:22:02.764312 coreos-metadata[1537]: Feb 12 22:22:02.764 INFO Fetch successful Feb 12 22:22:02.764494 coreos-metadata[1537]: Feb 12 22:22:02.764 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Feb 12 22:22:02.765836 coreos-metadata[1537]: Feb 12 22:22:02.765 INFO Fetch successful Feb 12 22:22:02.768730 unknown[1537]: wrote ssh authorized keys file for user: core Feb 12 22:22:02.784695 tar[1552]: ./vrf Feb 12 22:22:02.815932 update-ssh-keys[1741]: Updated "/home/core/.ssh/authorized_keys" Feb 12 22:22:02.816884 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 12 22:22:02.912222 tar[1552]: ./bridge Feb 12 22:22:03.014656 tar[1552]: ./tuning Feb 12 22:22:03.029936 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO Create new startup processor Feb 12 22:22:03.031650 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [LongRunningPluginsManager] registered plugins: {} Feb 12 22:22:03.031877 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO Initializing bookkeeping folders Feb 12 22:22:03.032062 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO removing the completed state files Feb 12 22:22:03.032147 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO Initializing bookkeeping folders for long running plugins Feb 12 22:22:03.032265 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Feb 12 22:22:03.032388 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO Initializing healthcheck folders for long running plugins Feb 12 22:22:03.032524 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO Initializing locations for inventory plugin Feb 12 22:22:03.032616 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO Initializing default location for custom inventory Feb 12 22:22:03.032694 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO Initializing default location for file inventory Feb 12 22:22:03.032816 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO Initializing default location for role inventory Feb 12 22:22:03.032999 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO Init the cloudwatchlogs publisher Feb 12 22:22:03.033135 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [instanceID=i-0fcc95add53cc7231] Successfully loaded platform independent plugin aws:runPowerShellScript Feb 12 22:22:03.033235 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [instanceID=i-0fcc95add53cc7231] Successfully loaded platform independent plugin aws:runDockerAction Feb 12 22:22:03.033314 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [instanceID=i-0fcc95add53cc7231] Successfully loaded platform independent plugin aws:refreshAssociation Feb 12 22:22:03.033426 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [instanceID=i-0fcc95add53cc7231] Successfully loaded platform independent plugin aws:downloadContent Feb 12 22:22:03.034315 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [instanceID=i-0fcc95add53cc7231] Successfully loaded platform independent plugin aws:runDocument Feb 12 22:22:03.034445 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [instanceID=i-0fcc95add53cc7231] Successfully loaded platform independent plugin aws:softwareInventory Feb 12 22:22:03.034634 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [instanceID=i-0fcc95add53cc7231] Successfully loaded platform independent plugin aws:updateSsmAgent Feb 12 22:22:03.034780 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [instanceID=i-0fcc95add53cc7231] Successfully loaded platform independent plugin aws:configureDocker Feb 12 22:22:03.034878 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [instanceID=i-0fcc95add53cc7231] Successfully loaded platform independent plugin aws:configurePackage Feb 12 22:22:03.034949 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [instanceID=i-0fcc95add53cc7231] Successfully loaded platform dependent plugin aws:runShellScript Feb 12 22:22:03.035390 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Feb 12 22:22:03.035665 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO OS: linux, Arch: amd64 Feb 12 22:22:03.036906 amazon-ssm-agent[1535]: datastore file /var/lib/amazon/ssm/i-0fcc95add53cc7231/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Feb 12 22:22:03.130733 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [MessagingDeliveryService] Starting document processing engine... Feb 12 22:22:03.137349 tar[1552]: ./firewall Feb 12 22:22:03.225679 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [MessagingDeliveryService] [EngineProcessor] Starting Feb 12 22:22:03.254194 tar[1552]: ./host-device Feb 12 22:22:03.319905 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Feb 12 22:22:03.354787 tar[1552]: ./sbr Feb 12 22:22:03.414456 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [MessagingDeliveryService] Starting message polling Feb 12 22:22:03.449689 tar[1552]: ./loopback Feb 12 22:22:03.509386 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [MessagingDeliveryService] Starting send replies to MDS Feb 12 22:22:03.534101 tar[1552]: ./dhcp Feb 12 22:22:03.603954 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [instanceID=i-0fcc95add53cc7231] Starting association polling Feb 12 22:22:03.699027 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Feb 12 22:22:03.736298 tar[1554]: linux-amd64/LICENSE Feb 12 22:22:03.739274 tar[1554]: linux-amd64/README.md Feb 12 22:22:03.748290 systemd[1]: Finished prepare-helm.service. Feb 12 22:22:03.755623 tar[1552]: ./ptp Feb 12 22:22:03.776766 systemd[1]: Finished prepare-critools.service. Feb 12 22:22:03.794273 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [MessagingDeliveryService] [Association] Launching response handler Feb 12 22:22:03.810220 tar[1552]: ./ipvlan Feb 12 22:22:03.856592 tar[1552]: ./bandwidth Feb 12 22:22:03.889745 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Feb 12 22:22:03.913767 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 22:22:03.985461 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Feb 12 22:22:04.081413 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Feb 12 22:22:04.177434 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [MessageGatewayService] Starting session document processing engine... Feb 12 22:22:04.273661 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [MessageGatewayService] [EngineProcessor] Starting Feb 12 22:22:04.370295 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Feb 12 22:22:04.421224 sshd_keygen[1559]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 22:22:04.445158 systemd[1]: Finished sshd-keygen.service. Feb 12 22:22:04.447800 systemd[1]: Starting issuegen.service... Feb 12 22:22:04.453329 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 22:22:04.453484 systemd[1]: Finished issuegen.service. Feb 12 22:22:04.456256 systemd[1]: Starting systemd-user-sessions.service... Feb 12 22:22:04.466976 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0fcc95add53cc7231, requestId: ff294d76-6395-4f02-9045-c9d21d729c7d Feb 12 22:22:04.468692 systemd[1]: Finished systemd-user-sessions.service. Feb 12 22:22:04.471555 systemd[1]: Started getty@tty1.service. Feb 12 22:22:04.474203 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 22:22:04.475496 systemd[1]: Reached target getty.target. Feb 12 22:22:04.476593 systemd[1]: Reached target multi-user.target. Feb 12 22:22:04.479095 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 22:22:04.488596 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 22:22:04.488768 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 22:22:04.490073 systemd[1]: Startup finished in 702ms (kernel) + 14.584s (initrd) + 24.658s (userspace) = 39.946s. Feb 12 22:22:04.563904 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [OfflineService] Starting document processing engine... Feb 12 22:22:04.660926 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [OfflineService] [EngineProcessor] Starting Feb 12 22:22:04.758475 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [OfflineService] [EngineProcessor] Initial processing Feb 12 22:22:04.855936 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [OfflineService] Starting message polling Feb 12 22:22:04.937691 locksmithd[1731]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 22:22:04.953567 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [OfflineService] Starting send replies to MDS Feb 12 22:22:05.051574 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [LongRunningPluginsManager] starting long running plugin manager Feb 12 22:22:05.149731 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Feb 12 22:22:05.248236 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [HealthCheck] HealthCheck reporting agent health. Feb 12 22:22:05.346522 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Feb 12 22:22:05.445256 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [MessageGatewayService] listening reply. Feb 12 22:22:05.544099 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [StartupProcessor] Executing startup processor tasks Feb 12 22:22:05.643128 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Feb 12 22:22:05.742454 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Feb 12 22:22:05.842046 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.2 Feb 12 22:22:05.941614 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0fcc95add53cc7231?role=subscribe&stream=input Feb 12 22:22:06.041486 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0fcc95add53cc7231?role=subscribe&stream=input Feb 12 22:22:06.141549 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [MessageGatewayService] Starting receiving message from control channel Feb 12 22:22:06.241742 amazon-ssm-agent[1535]: 2024-02-12 22:22:03 INFO [MessageGatewayService] [EngineProcessor] Initial processing Feb 12 22:22:07.052052 systemd[1]: Created slice system-sshd.slice. Feb 12 22:22:07.053892 systemd[1]: Started sshd@0-172.31.25.241:22-139.178.89.65:58662.service. Feb 12 22:22:07.599094 sshd[1767]: Accepted publickey for core from 139.178.89.65 port 58662 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:22:07.602332 sshd[1767]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:22:07.616371 systemd[1]: Created slice user-500.slice. Feb 12 22:22:07.618172 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 22:22:07.625814 systemd-logind[1548]: New session 1 of user core. Feb 12 22:22:07.634647 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 22:22:07.637021 systemd[1]: Starting user@500.service... Feb 12 22:22:07.642739 (systemd)[1770]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:22:07.804432 systemd[1770]: Queued start job for default target default.target. Feb 12 22:22:07.805201 systemd[1770]: Reached target paths.target. Feb 12 22:22:07.805236 systemd[1770]: Reached target sockets.target. Feb 12 22:22:07.805256 systemd[1770]: Reached target timers.target. Feb 12 22:22:07.805275 systemd[1770]: Reached target basic.target. Feb 12 22:22:07.805332 systemd[1770]: Reached target default.target. Feb 12 22:22:07.805370 systemd[1770]: Startup finished in 155ms. Feb 12 22:22:07.805974 systemd[1]: Started user@500.service. Feb 12 22:22:07.807196 systemd[1]: Started session-1.scope. Feb 12 22:22:07.957025 systemd[1]: Started sshd@1-172.31.25.241:22-139.178.89.65:58672.service. Feb 12 22:22:08.126524 sshd[1779]: Accepted publickey for core from 139.178.89.65 port 58672 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:22:08.128311 sshd[1779]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:22:08.135553 systemd[1]: Started session-2.scope. Feb 12 22:22:08.136163 systemd-logind[1548]: New session 2 of user core. Feb 12 22:22:08.260605 sshd[1779]: pam_unix(sshd:session): session closed for user core Feb 12 22:22:08.263837 systemd[1]: sshd@1-172.31.25.241:22-139.178.89.65:58672.service: Deactivated successfully. Feb 12 22:22:08.264746 systemd[1]: session-2.scope: Deactivated successfully. Feb 12 22:22:08.265515 systemd-logind[1548]: Session 2 logged out. Waiting for processes to exit. Feb 12 22:22:08.266725 systemd-logind[1548]: Removed session 2. Feb 12 22:22:08.284564 systemd[1]: Started sshd@2-172.31.25.241:22-139.178.89.65:46770.service. Feb 12 22:22:08.441205 sshd[1785]: Accepted publickey for core from 139.178.89.65 port 46770 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:22:08.442675 sshd[1785]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:22:08.448422 systemd[1]: Started session-3.scope. Feb 12 22:22:08.449135 systemd-logind[1548]: New session 3 of user core. Feb 12 22:22:08.567571 sshd[1785]: pam_unix(sshd:session): session closed for user core Feb 12 22:22:08.572024 systemd[1]: sshd@2-172.31.25.241:22-139.178.89.65:46770.service: Deactivated successfully. Feb 12 22:22:08.573035 systemd[1]: session-3.scope: Deactivated successfully. Feb 12 22:22:08.574044 systemd-logind[1548]: Session 3 logged out. Waiting for processes to exit. Feb 12 22:22:08.575383 systemd-logind[1548]: Removed session 3. Feb 12 22:22:08.594831 systemd[1]: Started sshd@3-172.31.25.241:22-139.178.89.65:46784.service. Feb 12 22:22:08.766392 sshd[1791]: Accepted publickey for core from 139.178.89.65 port 46784 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:22:08.768445 sshd[1791]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:22:08.775798 systemd[1]: Started session-4.scope. Feb 12 22:22:08.776474 systemd-logind[1548]: New session 4 of user core. Feb 12 22:22:08.904492 sshd[1791]: pam_unix(sshd:session): session closed for user core Feb 12 22:22:08.908711 systemd[1]: sshd@3-172.31.25.241:22-139.178.89.65:46784.service: Deactivated successfully. Feb 12 22:22:08.909764 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 22:22:08.910597 systemd-logind[1548]: Session 4 logged out. Waiting for processes to exit. Feb 12 22:22:08.911654 systemd-logind[1548]: Removed session 4. Feb 12 22:22:08.931228 systemd[1]: Started sshd@4-172.31.25.241:22-139.178.89.65:46796.service. Feb 12 22:22:09.095706 sshd[1797]: Accepted publickey for core from 139.178.89.65 port 46796 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:22:09.097289 sshd[1797]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:22:09.102033 systemd[1]: Started session-5.scope. Feb 12 22:22:09.102591 systemd-logind[1548]: New session 5 of user core. Feb 12 22:22:09.511366 sudo[1800]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 22:22:09.511654 sudo[1800]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:22:09.521160 dbus-daemon[1538]: \xd0\u001d<\xce V: received setenforce notice (enforcing=-830882352) Feb 12 22:22:09.523268 sudo[1800]: pam_unix(sudo:session): session closed for user root Feb 12 22:22:09.547345 sshd[1797]: pam_unix(sshd:session): session closed for user core Feb 12 22:22:09.554675 systemd[1]: sshd@4-172.31.25.241:22-139.178.89.65:46796.service: Deactivated successfully. Feb 12 22:22:09.555774 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 22:22:09.557709 systemd-logind[1548]: Session 5 logged out. Waiting for processes to exit. Feb 12 22:22:09.558780 systemd-logind[1548]: Removed session 5. Feb 12 22:22:09.577019 systemd[1]: Started sshd@5-172.31.25.241:22-139.178.89.65:46804.service. Feb 12 22:22:09.746174 sshd[1804]: Accepted publickey for core from 139.178.89.65 port 46804 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:22:09.747683 sshd[1804]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:22:09.753696 systemd[1]: Started session-6.scope. Feb 12 22:22:09.754369 systemd-logind[1548]: New session 6 of user core. Feb 12 22:22:09.860118 sudo[1808]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 22:22:09.860598 sudo[1808]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:22:09.865290 sudo[1808]: pam_unix(sudo:session): session closed for user root Feb 12 22:22:09.870441 sudo[1807]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 22:22:09.870715 sudo[1807]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:22:09.883146 systemd[1]: Stopping audit-rules.service... Feb 12 22:22:09.883000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 22:22:09.885852 kernel: kauditd_printk_skb: 184 callbacks suppressed Feb 12 22:22:09.885928 kernel: audit: type=1305 audit(1707776529.883:167): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 22:22:09.885959 auditctl[1811]: No rules Feb 12 22:22:09.886436 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 22:22:09.883000 audit[1811]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd0beafaf0 a2=420 a3=0 items=0 ppid=1 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:09.886622 systemd[1]: Stopped audit-rules.service. Feb 12 22:22:09.889851 systemd[1]: Starting audit-rules.service... Feb 12 22:22:09.895762 kernel: audit: type=1300 audit(1707776529.883:167): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd0beafaf0 a2=420 a3=0 items=0 ppid=1 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:09.897870 kernel: audit: type=1327 audit(1707776529.883:167): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 22:22:09.883000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 22:22:09.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:09.903874 kernel: audit: type=1131 audit(1707776529.885:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:09.918211 augenrules[1828]: No rules Feb 12 22:22:09.919168 systemd[1]: Finished audit-rules.service. Feb 12 22:22:09.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:09.920541 sudo[1807]: pam_unix(sudo:session): session closed for user root Feb 12 22:22:09.919000 audit[1807]: USER_END pid=1807 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:22:09.930037 kernel: audit: type=1130 audit(1707776529.918:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:09.930117 kernel: audit: type=1106 audit(1707776529.919:170): pid=1807 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:22:09.930146 kernel: audit: type=1104 audit(1707776529.919:171): pid=1807 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:22:09.919000 audit[1807]: CRED_DISP pid=1807 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:22:09.943597 sshd[1804]: pam_unix(sshd:session): session closed for user core Feb 12 22:22:09.944000 audit[1804]: USER_END pid=1804 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:22:09.946999 systemd[1]: sshd@5-172.31.25.241:22-139.178.89.65:46804.service: Deactivated successfully. Feb 12 22:22:09.948553 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 22:22:09.949927 systemd-logind[1548]: Session 6 logged out. Waiting for processes to exit. Feb 12 22:22:09.951316 systemd-logind[1548]: Removed session 6. Feb 12 22:22:09.944000 audit[1804]: CRED_DISP pid=1804 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:22:09.952895 kernel: audit: type=1106 audit(1707776529.944:172): pid=1804 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:22:09.952936 kernel: audit: type=1104 audit(1707776529.944:173): pid=1804 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:22:09.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.25.241:22-139.178.89.65:46804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:09.962559 kernel: audit: type=1131 audit(1707776529.944:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.25.241:22-139.178.89.65:46804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:09.970713 systemd[1]: Started sshd@6-172.31.25.241:22-139.178.89.65:46818.service. Feb 12 22:22:09.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.25.241:22-139.178.89.65:46818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:10.135000 audit[1834]: USER_ACCT pid=1834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:22:10.137172 sshd[1834]: Accepted publickey for core from 139.178.89.65 port 46818 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:22:10.138000 audit[1834]: CRED_ACQ pid=1834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:22:10.138000 audit[1834]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecf116c10 a2=3 a3=0 items=0 ppid=1 pid=1834 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:10.138000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:22:10.139667 sshd[1834]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:22:10.144986 systemd[1]: Started session-7.scope. Feb 12 22:22:10.145651 systemd-logind[1548]: New session 7 of user core. Feb 12 22:22:10.150000 audit[1834]: USER_START pid=1834 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:22:10.151000 audit[1836]: CRED_ACQ pid=1836 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:22:10.249000 audit[1837]: USER_ACCT pid=1837 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:22:10.250562 sudo[1837]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 22:22:10.249000 audit[1837]: CRED_REFR pid=1837 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:22:10.250850 sudo[1837]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 22:22:10.251000 audit[1837]: USER_START pid=1837 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:22:11.184938 systemd[1]: Starting docker.service... Feb 12 22:22:11.241405 env[1852]: time="2024-02-12T22:22:11.229415412Z" level=info msg="Starting up" Feb 12 22:22:11.241405 env[1852]: time="2024-02-12T22:22:11.230845771Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 22:22:11.241405 env[1852]: time="2024-02-12T22:22:11.230880821Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 22:22:11.241405 env[1852]: time="2024-02-12T22:22:11.230908542Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 22:22:11.241405 env[1852]: time="2024-02-12T22:22:11.230923189Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 22:22:11.241405 env[1852]: time="2024-02-12T22:22:11.233274746Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 22:22:11.241405 env[1852]: time="2024-02-12T22:22:11.233289488Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 22:22:11.241405 env[1852]: time="2024-02-12T22:22:11.233303370Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 22:22:11.241405 env[1852]: time="2024-02-12T22:22:11.233312936Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 22:22:11.243927 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1641571167-merged.mount: Deactivated successfully. Feb 12 22:22:12.178546 env[1852]: time="2024-02-12T22:22:12.178500369Z" level=info msg="Loading containers: start." Feb 12 22:22:12.411000 audit[1883]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1883 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:12.411000 audit[1883]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc3e417b80 a2=0 a3=7ffc3e417b6c items=0 ppid=1852 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:12.411000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 12 22:22:12.413000 audit[1885]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1885 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:12.413000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc0330cdd0 a2=0 a3=7ffc0330cdbc items=0 ppid=1852 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:12.413000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 12 22:22:12.416000 audit[1887]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1887 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:12.416000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffff0469e60 a2=0 a3=7ffff0469e4c items=0 ppid=1852 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:12.416000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 22:22:12.418000 audit[1889]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1889 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:12.418000 audit[1889]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd41a68830 a2=0 a3=7ffd41a6881c items=0 ppid=1852 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:12.418000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 22:22:12.434000 audit[1891]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1891 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:12.434000 audit[1891]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc9c315120 a2=0 a3=7ffc9c31510c items=0 ppid=1852 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:12.434000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 12 22:22:12.450000 audit[1896]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1896 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:12.450000 audit[1896]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff3a193e90 a2=0 a3=7fff3a193e7c items=0 ppid=1852 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:12.450000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 12 22:22:12.537000 audit[1898]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1898 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:12.537000 audit[1898]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe91763a30 a2=0 a3=7ffe91763a1c items=0 ppid=1852 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:12.537000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 12 22:22:12.541000 audit[1900]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1900 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:12.541000 audit[1900]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc1e825bf0 a2=0 a3=7ffc1e825bdc items=0 ppid=1852 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:12.541000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 12 22:22:12.543000 audit[1902]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1902 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:12.543000 audit[1902]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc9c945310 a2=0 a3=7ffc9c9452fc items=0 ppid=1852 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:12.543000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 22:22:12.553000 audit[1906]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1906 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:12.553000 audit[1906]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff80fb3f90 a2=0 a3=7fff80fb3f7c items=0 ppid=1852 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:12.553000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 22:22:12.556000 audit[1907]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1907 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:12.556000 audit[1907]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdc60b7050 a2=0 a3=7ffdc60b703c items=0 ppid=1852 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:12.556000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 22:22:12.618884 kernel: Initializing XFRM netlink socket Feb 12 22:22:12.765926 env[1852]: time="2024-02-12T22:22:12.764915048Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 12 22:22:12.767670 (udev-worker)[1863]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:22:12.814000 audit[1915]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1915 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:12.814000 audit[1915]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc78f2b0e0 a2=0 a3=7ffc78f2b0cc items=0 ppid=1852 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:12.814000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 12 22:22:12.878000 audit[1918]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1918 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:12.878000 audit[1918]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffd94ea46e0 a2=0 a3=7ffd94ea46cc items=0 ppid=1852 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:12.878000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 12 22:22:12.882000 audit[1921]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1921 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:12.882000 audit[1921]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff3ee9b300 a2=0 a3=7fff3ee9b2ec items=0 ppid=1852 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:12.882000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 12 22:22:12.884000 audit[1923]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1923 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:12.884000 audit[1923]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff3966c870 a2=0 a3=7fff3966c85c items=0 ppid=1852 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:12.884000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 12 22:22:12.886000 audit[1925]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1925 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:12.886000 audit[1925]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffdde3fdae0 a2=0 a3=7ffdde3fdacc items=0 ppid=1852 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:12.886000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 12 22:22:12.889000 audit[1927]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1927 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:12.889000 audit[1927]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd2cbc4560 a2=0 a3=7ffd2cbc454c items=0 ppid=1852 pid=1927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:12.889000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 12 22:22:12.891000 audit[1929]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1929 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:12.891000 audit[1929]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffea62a5160 a2=0 a3=7ffea62a514c items=0 ppid=1852 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:12.891000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 12 22:22:12.900000 audit[1932]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1932 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:12.900000 audit[1932]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff3425b6c0 a2=0 a3=7fff3425b6ac items=0 ppid=1852 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:12.900000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 12 22:22:12.903000 audit[1934]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1934 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:12.903000 audit[1934]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff171ada60 a2=0 a3=7fff171ada4c items=0 ppid=1852 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:12.903000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 22:22:12.905000 audit[1936]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1936 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:12.905000 audit[1936]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc8f525680 a2=0 a3=7ffc8f52566c items=0 ppid=1852 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:12.905000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 22:22:12.907000 audit[1938]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1938 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:12.907000 audit[1938]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdc5127160 a2=0 a3=7ffdc512714c items=0 ppid=1852 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:12.907000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 12 22:22:12.909314 systemd-networkd[1377]: docker0: Link UP Feb 12 22:22:12.921000 audit[1942]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1942 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:12.921000 audit[1942]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdf3244d60 a2=0 a3=7ffdf3244d4c items=0 ppid=1852 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:12.921000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 22:22:12.922000 audit[1943]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1943 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:12.922000 audit[1943]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff51afe380 a2=0 a3=7fff51afe36c items=0 ppid=1852 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:12.922000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 22:22:12.924302 env[1852]: time="2024-02-12T22:22:12.924262214Z" level=info msg="Loading containers: done." Feb 12 22:22:12.937359 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2446139367-merged.mount: Deactivated successfully. Feb 12 22:22:12.956337 env[1852]: time="2024-02-12T22:22:12.956218552Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 12 22:22:12.956562 env[1852]: time="2024-02-12T22:22:12.956523710Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 12 22:22:12.956672 env[1852]: time="2024-02-12T22:22:12.956646004Z" level=info msg="Daemon has completed initialization" Feb 12 22:22:12.977460 systemd[1]: Started docker.service. Feb 12 22:22:12.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:12.991654 env[1852]: time="2024-02-12T22:22:12.991411384Z" level=info msg="API listen on /run/docker.sock" Feb 12 22:22:13.014882 systemd[1]: Reloading. Feb 12 22:22:13.146676 /usr/lib/systemd/system-generators/torcx-generator[1993]: time="2024-02-12T22:22:13Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 22:22:13.146714 /usr/lib/systemd/system-generators/torcx-generator[1993]: time="2024-02-12T22:22:13Z" level=info msg="torcx already run" Feb 12 22:22:13.214388 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 22:22:13.214412 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 22:22:13.241633 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 22:22:13.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.347000 audit: BPF prog-id=37 op=LOAD Feb 12 22:22:13.347000 audit: BPF prog-id=28 op=UNLOAD Feb 12 22:22:13.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.350000 audit: BPF prog-id=38 op=LOAD Feb 12 22:22:13.350000 audit: BPF prog-id=23 op=UNLOAD Feb 12 22:22:13.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.352000 audit: BPF prog-id=39 op=LOAD Feb 12 22:22:13.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.352000 audit: BPF prog-id=40 op=LOAD Feb 12 22:22:13.352000 audit: BPF prog-id=21 op=UNLOAD Feb 12 22:22:13.352000 audit: BPF prog-id=22 op=UNLOAD Feb 12 22:22:13.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.354000 audit: BPF prog-id=41 op=LOAD Feb 12 22:22:13.354000 audit: BPF prog-id=24 op=UNLOAD Feb 12 22:22:13.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.354000 audit: BPF prog-id=42 op=LOAD Feb 12 22:22:13.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.354000 audit: BPF prog-id=43 op=LOAD Feb 12 22:22:13.354000 audit: BPF prog-id=25 op=UNLOAD Feb 12 22:22:13.354000 audit: BPF prog-id=26 op=UNLOAD Feb 12 22:22:13.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.355000 audit: BPF prog-id=44 op=LOAD Feb 12 22:22:13.355000 audit: BPF prog-id=27 op=UNLOAD Feb 12 22:22:13.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.358000 audit: BPF prog-id=45 op=LOAD Feb 12 22:22:13.358000 audit: BPF prog-id=29 op=UNLOAD Feb 12 22:22:13.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.358000 audit: BPF prog-id=46 op=LOAD Feb 12 22:22:13.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.360000 audit: BPF prog-id=47 op=LOAD Feb 12 22:22:13.360000 audit: BPF prog-id=30 op=UNLOAD Feb 12 22:22:13.360000 audit: BPF prog-id=31 op=UNLOAD Feb 12 22:22:13.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.362000 audit: BPF prog-id=48 op=LOAD Feb 12 22:22:13.362000 audit: BPF prog-id=35 op=UNLOAD Feb 12 22:22:13.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.362000 audit: BPF prog-id=49 op=LOAD Feb 12 22:22:13.362000 audit: BPF prog-id=32 op=UNLOAD Feb 12 22:22:13.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.363000 audit: BPF prog-id=50 op=LOAD Feb 12 22:22:13.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.363000 audit: BPF prog-id=51 op=LOAD Feb 12 22:22:13.363000 audit: BPF prog-id=33 op=UNLOAD Feb 12 22:22:13.363000 audit: BPF prog-id=34 op=UNLOAD Feb 12 22:22:13.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.364000 audit: BPF prog-id=52 op=LOAD Feb 12 22:22:13.364000 audit: BPF prog-id=18 op=UNLOAD Feb 12 22:22:13.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.364000 audit: BPF prog-id=53 op=LOAD Feb 12 22:22:13.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:13.364000 audit: BPF prog-id=54 op=LOAD Feb 12 22:22:13.364000 audit: BPF prog-id=19 op=UNLOAD Feb 12 22:22:13.364000 audit: BPF prog-id=20 op=UNLOAD Feb 12 22:22:13.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:13.381377 systemd[1]: Started kubelet.service. Feb 12 22:22:13.472391 kubelet[2042]: E0212 22:22:13.472253 2042 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 22:22:13.476224 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 22:22:13.476409 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 22:22:13.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 22:22:16.245200 env[1557]: time="2024-02-12T22:22:16.245150755Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\"" Feb 12 22:22:16.750482 amazon-ssm-agent[1535]: 2024-02-12 22:22:16 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Feb 12 22:22:17.072286 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1150268730.mount: Deactivated successfully. Feb 12 22:22:21.518368 env[1557]: time="2024-02-12T22:22:21.518308504Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:21.721786 env[1557]: time="2024-02-12T22:22:21.721735176Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:21.792346 env[1557]: time="2024-02-12T22:22:21.792297342Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:21.855176 env[1557]: time="2024-02-12T22:22:21.855122106Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:21.856325 env[1557]: time="2024-02-12T22:22:21.856281063Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f\"" Feb 12 22:22:21.868243 env[1557]: time="2024-02-12T22:22:21.868198973Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\"" Feb 12 22:22:23.538898 kernel: kauditd_printk_skb: 292 callbacks suppressed Feb 12 22:22:23.539051 kernel: audit: type=1130 audit(1707776543.528:417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:23.539093 kernel: audit: type=1131 audit(1707776543.528:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:23.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:23.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:23.529432 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 12 22:22:23.529694 systemd[1]: Stopped kubelet.service. Feb 12 22:22:23.537705 systemd[1]: Started kubelet.service. Feb 12 22:22:23.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:23.547436 kernel: audit: type=1130 audit(1707776543.536:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:23.603151 kubelet[2069]: E0212 22:22:23.603088 2069 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 22:22:23.607038 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 22:22:23.607206 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 22:22:23.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 22:22:23.612874 kernel: audit: type=1131 audit(1707776543.606:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 22:22:26.473234 env[1557]: time="2024-02-12T22:22:26.473186406Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:26.638842 env[1557]: time="2024-02-12T22:22:26.638792199Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:26.739298 env[1557]: time="2024-02-12T22:22:26.739168338Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:26.852134 env[1557]: time="2024-02-12T22:22:26.852088278Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:26.852847 env[1557]: time="2024-02-12T22:22:26.852804914Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486\"" Feb 12 22:22:26.867247 env[1557]: time="2024-02-12T22:22:26.867200618Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\"" Feb 12 22:22:30.404935 env[1557]: time="2024-02-12T22:22:30.404883121Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:30.514300 env[1557]: time="2024-02-12T22:22:30.514243281Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:30.617653 env[1557]: time="2024-02-12T22:22:30.617603074Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:30.700565 env[1557]: time="2024-02-12T22:22:30.700202822Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:30.701596 env[1557]: time="2024-02-12T22:22:30.701502720Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e\"" Feb 12 22:22:30.723564 env[1557]: time="2024-02-12T22:22:30.723525754Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 12 22:22:32.739087 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 12 22:22:32.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:32.746880 kernel: audit: type=1131 audit(1707776552.738:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:32.770640 kernel: audit: type=1334 audit(1707776552.766:422): prog-id=51 op=UNLOAD Feb 12 22:22:32.770764 kernel: audit: type=1334 audit(1707776552.766:423): prog-id=50 op=UNLOAD Feb 12 22:22:32.766000 audit: BPF prog-id=51 op=UNLOAD Feb 12 22:22:32.766000 audit: BPF prog-id=50 op=UNLOAD Feb 12 22:22:32.766000 audit: BPF prog-id=49 op=UNLOAD Feb 12 22:22:32.772987 kernel: audit: type=1334 audit(1707776552.766:424): prog-id=49 op=UNLOAD Feb 12 22:22:32.927424 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3434823081.mount: Deactivated successfully. Feb 12 22:22:33.590646 env[1557]: time="2024-02-12T22:22:33.590590909Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:33.593710 env[1557]: time="2024-02-12T22:22:33.593651232Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:33.595917 env[1557]: time="2024-02-12T22:22:33.595878036Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:33.597705 env[1557]: time="2024-02-12T22:22:33.597672932Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:33.598149 env[1557]: time="2024-02-12T22:22:33.598111181Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\"" Feb 12 22:22:33.610245 env[1557]: time="2024-02-12T22:22:33.610198908Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 12 22:22:33.779185 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 12 22:22:33.788748 kernel: audit: type=1130 audit(1707776553.778:425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:33.788839 kernel: audit: type=1131 audit(1707776553.778:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:33.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:33.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:33.779455 systemd[1]: Stopped kubelet.service. Feb 12 22:22:33.781372 systemd[1]: Started kubelet.service. Feb 12 22:22:33.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:33.795901 kernel: audit: type=1130 audit(1707776553.780:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:33.843333 kubelet[2092]: E0212 22:22:33.843196 2092 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 22:22:33.846427 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 22:22:33.846594 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 22:22:33.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 22:22:33.851887 kernel: audit: type=1131 audit(1707776553.845:428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 22:22:34.165283 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3868473181.mount: Deactivated successfully. Feb 12 22:22:34.174456 env[1557]: time="2024-02-12T22:22:34.174287626Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:34.177755 env[1557]: time="2024-02-12T22:22:34.177706707Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:34.180246 env[1557]: time="2024-02-12T22:22:34.180211166Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:34.182559 env[1557]: time="2024-02-12T22:22:34.182516412Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:34.183003 env[1557]: time="2024-02-12T22:22:34.182970544Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 12 22:22:34.199911 env[1557]: time="2024-02-12T22:22:34.199850019Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Feb 12 22:22:35.913449 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount499415064.mount: Deactivated successfully. Feb 12 22:22:44.029191 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Feb 12 22:22:44.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:44.029453 systemd[1]: Stopped kubelet.service. Feb 12 22:22:44.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:44.083949 kernel: audit: type=1130 audit(1707776564.028:429): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:44.084067 kernel: audit: type=1131 audit(1707776564.028:430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:44.084103 kernel: audit: type=1130 audit(1707776564.030:431): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:44.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:44.150842 kernel: audit: type=1131 audit(1707776564.118:432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 22:22:44.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 22:22:44.151029 kubelet[2103]: E0212 22:22:44.116766 2103 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 22:22:44.031411 systemd[1]: Started kubelet.service. Feb 12 22:22:44.118751 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 22:22:44.118956 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 22:22:45.168241 env[1557]: time="2024-02-12T22:22:45.168195442Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:45.231683 env[1557]: time="2024-02-12T22:22:45.231581513Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:45.335085 env[1557]: time="2024-02-12T22:22:45.335006513Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:45.396362 env[1557]: time="2024-02-12T22:22:45.396305149Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:45.397269 env[1557]: time="2024-02-12T22:22:45.397232906Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7\"" Feb 12 22:22:45.431923 env[1557]: time="2024-02-12T22:22:45.431789524Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Feb 12 22:22:46.777050 amazon-ssm-agent[1535]: 2024-02-12 22:22:46 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Feb 12 22:22:46.854743 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount657229549.mount: Deactivated successfully. Feb 12 22:22:47.559494 update_engine[1549]: I0212 22:22:47.559398 1549 update_attempter.cc:509] Updating boot flags... Feb 12 22:22:49.444796 env[1557]: time="2024-02-12T22:22:49.444744746Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:49.676499 env[1557]: time="2024-02-12T22:22:49.676415605Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:49.774802 env[1557]: time="2024-02-12T22:22:49.774361182Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:49.926468 env[1557]: time="2024-02-12T22:22:49.926418359Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:49.930091 env[1557]: time="2024-02-12T22:22:49.927274123Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a\"" Feb 12 22:22:53.967398 systemd[1]: Stopped kubelet.service. Feb 12 22:22:53.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:53.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:53.978436 kernel: audit: type=1130 audit(1707776573.967:433): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:53.978560 kernel: audit: type=1131 audit(1707776573.967:434): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:53.994085 systemd[1]: Reloading. Feb 12 22:22:54.079790 /usr/lib/systemd/system-generators/torcx-generator[2373]: time="2024-02-12T22:22:54Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 22:22:54.082073 /usr/lib/systemd/system-generators/torcx-generator[2373]: time="2024-02-12T22:22:54Z" level=info msg="torcx already run" Feb 12 22:22:54.203811 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 22:22:54.203835 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 22:22:54.230435 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 22:22:54.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.327791 kernel: audit: type=1400 audit(1707776574.314:435): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.327918 kernel: audit: type=1400 audit(1707776574.314:436): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.337908 kernel: audit: type=1400 audit(1707776574.314:437): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.338022 kernel: audit: type=1400 audit(1707776574.314:438): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.343511 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 22:22:54.343592 kernel: audit: type=1400 audit(1707776574.314:439): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.343628 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 22:22:54.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.350190 kernel: audit: type=1400 audit(1707776574.314:440): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.322000 audit: BPF prog-id=55 op=LOAD Feb 12 22:22:54.322000 audit: BPF prog-id=37 op=UNLOAD Feb 12 22:22:54.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.327000 audit: BPF prog-id=56 op=LOAD Feb 12 22:22:54.327000 audit: BPF prog-id=38 op=UNLOAD Feb 12 22:22:54.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.333000 audit: BPF prog-id=57 op=LOAD Feb 12 22:22:54.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.333000 audit: BPF prog-id=58 op=LOAD Feb 12 22:22:54.333000 audit: BPF prog-id=39 op=UNLOAD Feb 12 22:22:54.333000 audit: BPF prog-id=40 op=UNLOAD Feb 12 22:22:54.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.337000 audit: BPF prog-id=59 op=LOAD Feb 12 22:22:54.337000 audit: BPF prog-id=41 op=UNLOAD Feb 12 22:22:54.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.337000 audit: BPF prog-id=60 op=LOAD Feb 12 22:22:54.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.350000 audit: BPF prog-id=42 op=UNLOAD Feb 12 22:22:54.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.350000 audit: BPF prog-id=62 op=LOAD Feb 12 22:22:54.351000 audit: BPF prog-id=44 op=UNLOAD Feb 12 22:22:54.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.353000 audit: BPF prog-id=63 op=LOAD Feb 12 22:22:54.353000 audit: BPF prog-id=45 op=UNLOAD Feb 12 22:22:54.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.353000 audit: BPF prog-id=64 op=LOAD Feb 12 22:22:54.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.353000 audit: BPF prog-id=65 op=LOAD Feb 12 22:22:54.353000 audit: BPF prog-id=46 op=UNLOAD Feb 12 22:22:54.353000 audit: BPF prog-id=47 op=UNLOAD Feb 12 22:22:54.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.354000 audit: BPF prog-id=66 op=LOAD Feb 12 22:22:54.354000 audit: BPF prog-id=48 op=UNLOAD Feb 12 22:22:54.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.356000 audit: BPF prog-id=67 op=LOAD Feb 12 22:22:54.356000 audit: BPF prog-id=52 op=UNLOAD Feb 12 22:22:54.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.356000 audit: BPF prog-id=68 op=LOAD Feb 12 22:22:54.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:54.356000 audit: BPF prog-id=69 op=LOAD Feb 12 22:22:54.356000 audit: BPF prog-id=53 op=UNLOAD Feb 12 22:22:54.356000 audit: BPF prog-id=54 op=UNLOAD Feb 12 22:22:54.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:22:54.377712 systemd[1]: Started kubelet.service. Feb 12 22:22:54.436183 kubelet[2426]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 22:22:54.436183 kubelet[2426]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 22:22:54.436605 kubelet[2426]: I0212 22:22:54.436244 2426 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 22:22:54.437934 kubelet[2426]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 22:22:54.437934 kubelet[2426]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 22:22:55.229070 kubelet[2426]: I0212 22:22:55.229035 2426 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 12 22:22:55.229070 kubelet[2426]: I0212 22:22:55.229064 2426 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 22:22:55.229382 kubelet[2426]: I0212 22:22:55.229362 2426 server.go:836] "Client rotation is on, will bootstrap in background" Feb 12 22:22:55.233574 kubelet[2426]: I0212 22:22:55.233550 2426 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 22:22:55.233973 kubelet[2426]: E0212 22:22:55.233959 2426 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.25.241:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:22:55.235941 kubelet[2426]: I0212 22:22:55.235920 2426 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 22:22:55.236209 kubelet[2426]: I0212 22:22:55.236193 2426 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 22:22:55.236294 kubelet[2426]: I0212 22:22:55.236276 2426 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 22:22:55.236425 kubelet[2426]: I0212 22:22:55.236313 2426 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 22:22:55.236425 kubelet[2426]: I0212 22:22:55.236331 2426 container_manager_linux.go:308] "Creating device plugin manager" Feb 12 22:22:55.236519 kubelet[2426]: I0212 22:22:55.236449 2426 state_mem.go:36] "Initialized new in-memory state store" Feb 12 22:22:55.244734 kubelet[2426]: I0212 22:22:55.244702 2426 kubelet.go:398] "Attempting to sync node with API server" Feb 12 22:22:55.244734 kubelet[2426]: I0212 22:22:55.244732 2426 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 22:22:55.245016 kubelet[2426]: I0212 22:22:55.244762 2426 kubelet.go:297] "Adding apiserver pod source" Feb 12 22:22:55.245016 kubelet[2426]: I0212 22:22:55.244780 2426 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 22:22:55.246043 kubelet[2426]: W0212 22:22:55.245997 2426 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.25.241:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:22:55.246133 kubelet[2426]: E0212 22:22:55.246055 2426 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.25.241:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:22:55.246180 kubelet[2426]: I0212 22:22:55.246138 2426 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 22:22:55.246446 kubelet[2426]: W0212 22:22:55.246427 2426 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 22:22:55.246912 kubelet[2426]: I0212 22:22:55.246894 2426 server.go:1186] "Started kubelet" Feb 12 22:22:55.247039 kubelet[2426]: W0212 22:22:55.247001 2426 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.25.241:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-25-241&limit=500&resourceVersion=0": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:22:55.247102 kubelet[2426]: E0212 22:22:55.247053 2426 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.25.241:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-25-241&limit=500&resourceVersion=0": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:22:55.247000 audit[2426]: AVC avc: denied { mac_admin } for pid=2426 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:55.247000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:22:55.247000 audit[2426]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008ad800 a1=c0008beed0 a2=c0008ad7d0 a3=25 items=0 ppid=1 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.247000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:22:55.247000 audit[2426]: AVC avc: denied { mac_admin } for pid=2426 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:55.247000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:22:55.247000 audit[2426]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008af600 a1=c0008beee8 a2=c0008ad890 a3=25 items=0 ppid=1 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.247000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:22:55.249423 kubelet[2426]: I0212 22:22:55.248789 2426 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 22:22:55.249423 kubelet[2426]: I0212 22:22:55.248830 2426 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 22:22:55.249423 kubelet[2426]: I0212 22:22:55.249028 2426 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 22:22:55.253179 kubelet[2426]: E0212 22:22:55.253078 2426 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-241.17b33dbf3b52a899", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-241", UID:"ip-172-31-25-241", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-241"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 22, 55, 246870681, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 22, 55, 246870681, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://172.31.25.241:6443/api/v1/namespaces/default/events": dial tcp 172.31.25.241:6443: connect: connection refused'(may retry after sleeping) Feb 12 22:22:55.253901 kubelet[2426]: E0212 22:22:55.253883 2426 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 22:22:55.254013 kubelet[2426]: E0212 22:22:55.254002 2426 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 22:22:55.253000 audit[2436]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:55.253000 audit[2436]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffde7446770 a2=0 a3=7ffde744675c items=0 ppid=2426 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.253000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 22:22:55.254513 kubelet[2426]: I0212 22:22:55.254438 2426 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 22:22:55.255242 kubelet[2426]: I0212 22:22:55.255224 2426 server.go:451] "Adding debug handlers to kubelet server" Feb 12 22:22:55.256230 kubelet[2426]: I0212 22:22:55.256210 2426 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 12 22:22:55.256000 audit[2437]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:55.256000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd2d8f95d0 a2=0 a3=7ffd2d8f95bc items=0 ppid=2426 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.256000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 22:22:55.258061 kubelet[2426]: I0212 22:22:55.258002 2426 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 22:22:55.260620 kubelet[2426]: E0212 22:22:55.260594 2426 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://172.31.25.241:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-241?timeout=10s": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:22:55.259000 audit[2439]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:55.259000 audit[2439]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd4e7ce1f0 a2=0 a3=7ffd4e7ce1dc items=0 ppid=2426 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.259000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 22:22:55.262000 audit[2441]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:55.262000 audit[2441]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff055a1870 a2=0 a3=7fff055a185c items=0 ppid=2426 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.262000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 22:22:55.273000 audit[2444]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:55.273000 audit[2444]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff092fc950 a2=0 a3=7fff092fc93c items=0 ppid=2426 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.273000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 22:22:55.276000 audit[2445]: NETFILTER_CFG table=nat:31 family=2 entries=1 op=nft_register_chain pid=2445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:55.276000 audit[2445]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc6c33bb10 a2=0 a3=7ffc6c33bafc items=0 ppid=2426 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.276000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 22:22:55.283250 kubelet[2426]: W0212 22:22:55.283188 2426 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.25.241:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:22:55.283250 kubelet[2426]: E0212 22:22:55.283249 2426 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.25.241:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:22:55.300997 kubelet[2426]: I0212 22:22:55.300961 2426 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 22:22:55.300997 kubelet[2426]: I0212 22:22:55.300990 2426 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 22:22:55.301190 kubelet[2426]: I0212 22:22:55.301007 2426 state_mem.go:36] "Initialized new in-memory state store" Feb 12 22:22:55.303798 kubelet[2426]: I0212 22:22:55.303770 2426 policy_none.go:49] "None policy: Start" Feb 12 22:22:55.304375 kubelet[2426]: I0212 22:22:55.304347 2426 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 22:22:55.304477 kubelet[2426]: I0212 22:22:55.304408 2426 state_mem.go:35] "Initializing new in-memory state store" Feb 12 22:22:55.311434 systemd[1]: Created slice kubepods.slice. Feb 12 22:22:55.316262 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 22:22:55.321035 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 22:22:55.328149 kubelet[2426]: I0212 22:22:55.328121 2426 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 22:22:55.327000 audit[2426]: AVC avc: denied { mac_admin } for pid=2426 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:55.327000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:22:55.327000 audit[2426]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f2f5c0 a1=c00105a270 a2=c000f2f590 a3=25 items=0 ppid=1 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.327000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:22:55.328531 kubelet[2426]: I0212 22:22:55.328221 2426 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 22:22:55.329866 kubelet[2426]: E0212 22:22:55.329390 2426 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-25-241\" not found" Feb 12 22:22:55.329866 kubelet[2426]: I0212 22:22:55.329784 2426 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 22:22:55.344000 audit[2453]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_rule pid=2453 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:55.344000 audit[2453]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffed9fcbb60 a2=0 a3=7ffed9fcbb4c items=0 ppid=2426 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.344000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 22:22:55.350000 audit[2456]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:55.350000 audit[2456]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffff5a52430 a2=0 a3=7ffff5a5241c items=0 ppid=2426 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.350000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 22:22:55.351000 audit[2457]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:55.351000 audit[2457]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd42418240 a2=0 a3=7ffd4241822c items=0 ppid=2426 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.351000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 22:22:55.352000 audit[2458]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=2458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:55.352000 audit[2458]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd793ae900 a2=0 a3=7ffd793ae8ec items=0 ppid=2426 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.352000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 22:22:55.355000 audit[2460]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=2460 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:55.355000 audit[2460]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd81bc3240 a2=0 a3=7ffd81bc322c items=0 ppid=2426 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.355000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 22:22:55.358007 kubelet[2426]: I0212 22:22:55.357980 2426 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-25-241" Feb 12 22:22:55.358397 kubelet[2426]: E0212 22:22:55.358378 2426 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.25.241:6443/api/v1/nodes\": dial tcp 172.31.25.241:6443: connect: connection refused" node="ip-172-31-25-241" Feb 12 22:22:55.359000 audit[2462]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=2462 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:55.359000 audit[2462]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffdbe3571b0 a2=0 a3=7ffdbe35719c items=0 ppid=2426 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.359000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 22:22:55.362000 audit[2464]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=2464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:55.362000 audit[2464]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffff2936c90 a2=0 a3=7ffff2936c7c items=0 ppid=2426 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.362000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 22:22:55.364000 audit[2466]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=2466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:55.364000 audit[2466]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7fff24506080 a2=0 a3=7fff2450606c items=0 ppid=2426 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.364000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 22:22:55.367000 audit[2468]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=2468 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:55.367000 audit[2468]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffec4908c00 a2=0 a3=7ffec4908bec items=0 ppid=2426 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.367000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 22:22:55.369035 kubelet[2426]: I0212 22:22:55.368953 2426 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 22:22:55.369000 audit[2469]: NETFILTER_CFG table=mangle:41 family=10 entries=2 op=nft_register_chain pid=2469 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:22:55.369000 audit[2469]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe38a16280 a2=0 a3=7ffe38a1626c items=0 ppid=2426 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.369000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 22:22:55.369000 audit[2470]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=2470 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:55.369000 audit[2470]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc094ce2b0 a2=0 a3=7ffc094ce29c items=0 ppid=2426 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.369000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 22:22:55.370000 audit[2471]: NETFILTER_CFG table=nat:43 family=10 entries=2 op=nft_register_chain pid=2471 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:22:55.370000 audit[2471]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffedd0bbb90 a2=0 a3=7ffedd0bbb7c items=0 ppid=2426 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.370000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 22:22:55.371000 audit[2472]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2472 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:55.371000 audit[2472]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd81558440 a2=0 a3=7ffd8155842c items=0 ppid=2426 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.371000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 22:22:55.373000 audit[2474]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=2474 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:22:55.373000 audit[2474]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc01e41e00 a2=0 a3=7ffc01e41dec items=0 ppid=2426 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.373000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 22:22:55.374000 audit[2475]: NETFILTER_CFG table=nat:46 family=10 entries=1 op=nft_register_rule pid=2475 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:22:55.374000 audit[2475]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd623fa5d0 a2=0 a3=7ffd623fa5bc items=0 ppid=2426 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.374000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 22:22:55.375000 audit[2476]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=2476 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:22:55.375000 audit[2476]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd43ed5fe0 a2=0 a3=7ffd43ed5fcc items=0 ppid=2426 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.375000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 22:22:55.378000 audit[2478]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2478 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:22:55.378000 audit[2478]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffd3e883930 a2=0 a3=7ffd3e88391c items=0 ppid=2426 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.378000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 22:22:55.379000 audit[2479]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=2479 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:22:55.379000 audit[2479]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdcec77430 a2=0 a3=7ffdcec7741c items=0 ppid=2426 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.379000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 22:22:55.380000 audit[2480]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_chain pid=2480 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:22:55.380000 audit[2480]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffdb6b05d0 a2=0 a3=7fffdb6b05bc items=0 ppid=2426 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.380000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 22:22:55.382000 audit[2482]: NETFILTER_CFG table=nat:51 family=10 entries=1 op=nft_register_rule pid=2482 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:22:55.382000 audit[2482]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff736f5040 a2=0 a3=7fff736f502c items=0 ppid=2426 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.382000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 22:22:55.385000 audit[2484]: NETFILTER_CFG table=nat:52 family=10 entries=2 op=nft_register_chain pid=2484 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:22:55.385000 audit[2484]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffbc77c0e0 a2=0 a3=7fffbc77c0cc items=0 ppid=2426 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.385000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 22:22:55.387000 audit[2486]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_rule pid=2486 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:22:55.387000 audit[2486]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffc94ec6e90 a2=0 a3=7ffc94ec6e7c items=0 ppid=2426 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.387000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 22:22:55.389000 audit[2488]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=2488 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:22:55.389000 audit[2488]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7fff22587880 a2=0 a3=7fff2258786c items=0 ppid=2426 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.389000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 22:22:55.393000 audit[2490]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=2490 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:22:55.393000 audit[2490]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7fffdae58370 a2=0 a3=7fffdae5835c items=0 ppid=2426 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.393000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 22:22:55.394465 kubelet[2426]: I0212 22:22:55.394435 2426 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 22:22:55.394553 kubelet[2426]: I0212 22:22:55.394468 2426 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 12 22:22:55.394553 kubelet[2426]: I0212 22:22:55.394490 2426 kubelet.go:2113] "Starting kubelet main sync loop" Feb 12 22:22:55.394553 kubelet[2426]: E0212 22:22:55.394532 2426 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 12 22:22:55.395424 kubelet[2426]: W0212 22:22:55.395400 2426 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.25.241:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:22:55.395578 kubelet[2426]: E0212 22:22:55.395563 2426 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.25.241:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:22:55.395000 audit[2491]: NETFILTER_CFG table=mangle:56 family=10 entries=1 op=nft_register_chain pid=2491 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:22:55.395000 audit[2491]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff27167e90 a2=0 a3=7fff27167e7c items=0 ppid=2426 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.395000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 22:22:55.396000 audit[2492]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=2492 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:22:55.396000 audit[2492]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6bd27390 a2=0 a3=7ffc6bd2737c items=0 ppid=2426 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.396000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 22:22:55.397000 audit[2493]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=2493 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:22:55.397000 audit[2493]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc431635f0 a2=0 a3=7ffc431635dc items=0 ppid=2426 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:55.397000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 22:22:55.461709 kubelet[2426]: E0212 22:22:55.461666 2426 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://172.31.25.241:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-241?timeout=10s": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:22:55.497799 kubelet[2426]: I0212 22:22:55.495709 2426 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:22:55.499548 kubelet[2426]: I0212 22:22:55.499527 2426 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:22:55.503296 kubelet[2426]: I0212 22:22:55.503275 2426 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:22:55.511749 kubelet[2426]: I0212 22:22:55.511726 2426 status_manager.go:698] "Failed to get status for pod" podUID=277eb7ad6a94a616de370a6896362e0f pod="kube-system/kube-apiserver-ip-172-31-25-241" err="Get \"https://172.31.25.241:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ip-172-31-25-241\": dial tcp 172.31.25.241:6443: connect: connection refused" Feb 12 22:22:55.512195 kubelet[2426]: I0212 22:22:55.512180 2426 status_manager.go:698] "Failed to get status for pod" podUID=8332d02636b5351d52a57e7c90259a87 pod="kube-system/kube-scheduler-ip-172-31-25-241" err="Get \"https://172.31.25.241:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ip-172-31-25-241\": dial tcp 172.31.25.241:6443: connect: connection refused" Feb 12 22:22:55.512470 kubelet[2426]: I0212 22:22:55.512455 2426 status_manager.go:698] "Failed to get status for pod" podUID=be01fa745a674b2fe11afa78363e5ca8 pod="kube-system/kube-controller-manager-ip-172-31-25-241" err="Get \"https://172.31.25.241:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ip-172-31-25-241\": dial tcp 172.31.25.241:6443: connect: connection refused" Feb 12 22:22:55.515232 systemd[1]: Created slice kubepods-burstable-pod277eb7ad6a94a616de370a6896362e0f.slice. Feb 12 22:22:55.529702 systemd[1]: Created slice kubepods-burstable-pod8332d02636b5351d52a57e7c90259a87.slice. Feb 12 22:22:55.536577 systemd[1]: Created slice kubepods-burstable-podbe01fa745a674b2fe11afa78363e5ca8.slice. Feb 12 22:22:55.560982 kubelet[2426]: I0212 22:22:55.560957 2426 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-25-241" Feb 12 22:22:55.561353 kubelet[2426]: E0212 22:22:55.561329 2426 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.25.241:6443/api/v1/nodes\": dial tcp 172.31.25.241:6443: connect: connection refused" node="ip-172-31-25-241" Feb 12 22:22:55.659802 kubelet[2426]: I0212 22:22:55.659762 2426 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/277eb7ad6a94a616de370a6896362e0f-ca-certs\") pod \"kube-apiserver-ip-172-31-25-241\" (UID: \"277eb7ad6a94a616de370a6896362e0f\") " pod="kube-system/kube-apiserver-ip-172-31-25-241" Feb 12 22:22:55.659802 kubelet[2426]: I0212 22:22:55.659816 2426 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/277eb7ad6a94a616de370a6896362e0f-k8s-certs\") pod \"kube-apiserver-ip-172-31-25-241\" (UID: \"277eb7ad6a94a616de370a6896362e0f\") " pod="kube-system/kube-apiserver-ip-172-31-25-241" Feb 12 22:22:55.660054 kubelet[2426]: I0212 22:22:55.659865 2426 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/277eb7ad6a94a616de370a6896362e0f-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-25-241\" (UID: \"277eb7ad6a94a616de370a6896362e0f\") " pod="kube-system/kube-apiserver-ip-172-31-25-241" Feb 12 22:22:55.660054 kubelet[2426]: I0212 22:22:55.659896 2426 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/be01fa745a674b2fe11afa78363e5ca8-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-25-241\" (UID: \"be01fa745a674b2fe11afa78363e5ca8\") " pod="kube-system/kube-controller-manager-ip-172-31-25-241" Feb 12 22:22:55.660054 kubelet[2426]: I0212 22:22:55.659923 2426 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/be01fa745a674b2fe11afa78363e5ca8-k8s-certs\") pod \"kube-controller-manager-ip-172-31-25-241\" (UID: \"be01fa745a674b2fe11afa78363e5ca8\") " pod="kube-system/kube-controller-manager-ip-172-31-25-241" Feb 12 22:22:55.660054 kubelet[2426]: I0212 22:22:55.659950 2426 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/be01fa745a674b2fe11afa78363e5ca8-ca-certs\") pod \"kube-controller-manager-ip-172-31-25-241\" (UID: \"be01fa745a674b2fe11afa78363e5ca8\") " pod="kube-system/kube-controller-manager-ip-172-31-25-241" Feb 12 22:22:55.660054 kubelet[2426]: I0212 22:22:55.659977 2426 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/be01fa745a674b2fe11afa78363e5ca8-kubeconfig\") pod \"kube-controller-manager-ip-172-31-25-241\" (UID: \"be01fa745a674b2fe11afa78363e5ca8\") " pod="kube-system/kube-controller-manager-ip-172-31-25-241" Feb 12 22:22:55.660350 kubelet[2426]: I0212 22:22:55.660036 2426 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/be01fa745a674b2fe11afa78363e5ca8-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-25-241\" (UID: \"be01fa745a674b2fe11afa78363e5ca8\") " pod="kube-system/kube-controller-manager-ip-172-31-25-241" Feb 12 22:22:55.660350 kubelet[2426]: I0212 22:22:55.660069 2426 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8332d02636b5351d52a57e7c90259a87-kubeconfig\") pod \"kube-scheduler-ip-172-31-25-241\" (UID: \"8332d02636b5351d52a57e7c90259a87\") " pod="kube-system/kube-scheduler-ip-172-31-25-241" Feb 12 22:22:55.828446 env[1557]: time="2024-02-12T22:22:55.828401017Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-25-241,Uid:277eb7ad6a94a616de370a6896362e0f,Namespace:kube-system,Attempt:0,}" Feb 12 22:22:55.833337 env[1557]: time="2024-02-12T22:22:55.833280495Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-25-241,Uid:8332d02636b5351d52a57e7c90259a87,Namespace:kube-system,Attempt:0,}" Feb 12 22:22:55.840057 env[1557]: time="2024-02-12T22:22:55.840013354Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-25-241,Uid:be01fa745a674b2fe11afa78363e5ca8,Namespace:kube-system,Attempt:0,}" Feb 12 22:22:55.862997 kubelet[2426]: E0212 22:22:55.862941 2426 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://172.31.25.241:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-241?timeout=10s": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:22:55.964040 kubelet[2426]: I0212 22:22:55.964004 2426 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-25-241" Feb 12 22:22:55.964468 kubelet[2426]: E0212 22:22:55.964440 2426 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.25.241:6443/api/v1/nodes\": dial tcp 172.31.25.241:6443: connect: connection refused" node="ip-172-31-25-241" Feb 12 22:22:56.419122 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2601433645.mount: Deactivated successfully. Feb 12 22:22:56.430013 env[1557]: time="2024-02-12T22:22:56.429966314Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:56.431668 env[1557]: time="2024-02-12T22:22:56.431630327Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:56.436293 env[1557]: time="2024-02-12T22:22:56.436259736Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:56.438197 env[1557]: time="2024-02-12T22:22:56.438162059Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:56.439943 env[1557]: time="2024-02-12T22:22:56.439911348Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:56.441370 env[1557]: time="2024-02-12T22:22:56.441334100Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:56.442839 env[1557]: time="2024-02-12T22:22:56.442805707Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:56.444348 env[1557]: time="2024-02-12T22:22:56.444314626Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:56.447350 env[1557]: time="2024-02-12T22:22:56.447315648Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:56.448323 env[1557]: time="2024-02-12T22:22:56.448283218Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:56.452761 env[1557]: time="2024-02-12T22:22:56.452727251Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:56.456933 env[1557]: time="2024-02-12T22:22:56.456895590Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:22:56.471440 kubelet[2426]: W0212 22:22:56.471404 2426 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.25.241:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:22:56.471440 kubelet[2426]: E0212 22:22:56.471442 2426 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.25.241:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:22:56.508679 env[1557]: time="2024-02-12T22:22:56.508130257Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:22:56.508679 env[1557]: time="2024-02-12T22:22:56.508211165Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:22:56.508679 env[1557]: time="2024-02-12T22:22:56.508240541Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:22:56.508679 env[1557]: time="2024-02-12T22:22:56.508394913Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1c3ac6932c45e8989f0ee99c5347936437d7673412340046b357759ae3db39bb pid=2510 runtime=io.containerd.runc.v2 Feb 12 22:22:56.509051 env[1557]: time="2024-02-12T22:22:56.508970240Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:22:56.509124 env[1557]: time="2024-02-12T22:22:56.509067239Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:22:56.509124 env[1557]: time="2024-02-12T22:22:56.509100465Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:22:56.509301 env[1557]: time="2024-02-12T22:22:56.509261676Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f2038420b691f431800129f624e3c56b411735f950bf073ffe5c38028b375919 pid=2506 runtime=io.containerd.runc.v2 Feb 12 22:22:56.537189 kubelet[2426]: W0212 22:22:56.537147 2426 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.25.241:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:22:56.537189 kubelet[2426]: E0212 22:22:56.537193 2426 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.25.241:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:22:56.547223 systemd[1]: Started cri-containerd-1c3ac6932c45e8989f0ee99c5347936437d7673412340046b357759ae3db39bb.scope. Feb 12 22:22:56.564207 systemd[1]: Started cri-containerd-f2038420b691f431800129f624e3c56b411735f950bf073ffe5c38028b375919.scope. Feb 12 22:22:56.574305 env[1557]: time="2024-02-12T22:22:56.561426699Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:22:56.574305 env[1557]: time="2024-02-12T22:22:56.561485504Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:22:56.574305 env[1557]: time="2024-02-12T22:22:56.561500690Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:22:56.574305 env[1557]: time="2024-02-12T22:22:56.561734143Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4015aac93bf19a971dabbf8fd4ffcf268f41f8e699a5f7c0a891d885536c543d pid=2539 runtime=io.containerd.runc.v2 Feb 12 22:22:56.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.589000 audit: BPF prog-id=70 op=LOAD Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2506 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:56.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632303338343230623639316634333138303031323966363234653363 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2506 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:56.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632303338343230623639316634333138303031323966363234653363 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit: BPF prog-id=71 op=LOAD Feb 12 22:22:56.590000 audit[2540]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024ef0 items=0 ppid=2506 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:56.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632303338343230623639316634333138303031323966363234653363 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit: BPF prog-id=72 op=LOAD Feb 12 22:22:56.590000 audit[2540]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024f38 items=0 ppid=2506 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:56.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632303338343230623639316634333138303031323966363234653363 Feb 12 22:22:56.590000 audit: BPF prog-id=72 op=UNLOAD Feb 12 22:22:56.590000 audit: BPF prog-id=71 op=UNLOAD Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.590000 audit: BPF prog-id=73 op=LOAD Feb 12 22:22:56.590000 audit[2540]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025348 items=0 ppid=2506 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:56.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632303338343230623639316634333138303031323966363234653363 Feb 12 22:22:56.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.600000 audit: BPF prog-id=74 op=LOAD Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2510 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:56.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163336163363933326334356538393839663065653939633533343739 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=2510 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:56.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163336163363933326334356538393839663065653939633533343739 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit: BPF prog-id=75 op=LOAD Feb 12 22:22:56.601000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c0002fe810 items=0 ppid=2510 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:56.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163336163363933326334356538393839663065653939633533343739 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit: BPF prog-id=76 op=LOAD Feb 12 22:22:56.601000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c0002fe858 items=0 ppid=2510 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:56.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163336163363933326334356538393839663065653939633533343739 Feb 12 22:22:56.601000 audit: BPF prog-id=76 op=UNLOAD Feb 12 22:22:56.601000 audit: BPF prog-id=75 op=UNLOAD Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.601000 audit: BPF prog-id=77 op=LOAD Feb 12 22:22:56.601000 audit[2538]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c0002fec68 items=0 ppid=2510 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:56.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163336163363933326334356538393839663065653939633533343739 Feb 12 22:22:56.635409 systemd[1]: Started cri-containerd-4015aac93bf19a971dabbf8fd4ffcf268f41f8e699a5f7c0a891d885536c543d.scope. Feb 12 22:22:56.664255 kubelet[2426]: E0212 22:22:56.664195 2426 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://172.31.25.241:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-241?timeout=10s": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:22:56.671490 env[1557]: time="2024-02-12T22:22:56.671363839Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-25-241,Uid:277eb7ad6a94a616de370a6896362e0f,Namespace:kube-system,Attempt:0,} returns sandbox id \"f2038420b691f431800129f624e3c56b411735f950bf073ffe5c38028b375919\"" Feb 12 22:22:56.679174 env[1557]: time="2024-02-12T22:22:56.679131133Z" level=info msg="CreateContainer within sandbox \"f2038420b691f431800129f624e3c56b411735f950bf073ffe5c38028b375919\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 12 22:22:56.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.683000 audit: BPF prog-id=78 op=LOAD Feb 12 22:22:56.683000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.683000 audit[2579]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2539 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:56.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430313561616339336266313961393731646162626638666434666663 Feb 12 22:22:56.683000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.683000 audit[2579]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2539 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:56.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430313561616339336266313961393731646162626638666434666663 Feb 12 22:22:56.683000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.683000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.683000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.683000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.683000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.683000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.683000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.683000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.683000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.683000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.683000 audit: BPF prog-id=79 op=LOAD Feb 12 22:22:56.683000 audit[2579]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001a6db0 items=0 ppid=2539 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:56.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430313561616339336266313961393731646162626638666434666663 Feb 12 22:22:56.683000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.683000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.683000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.683000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.683000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.683000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.683000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.683000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.683000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.683000 audit: BPF prog-id=80 op=LOAD Feb 12 22:22:56.683000 audit[2579]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001a6df8 items=0 ppid=2539 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:56.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430313561616339336266313961393731646162626638666434666663 Feb 12 22:22:56.684000 audit: BPF prog-id=80 op=UNLOAD Feb 12 22:22:56.684000 audit: BPF prog-id=79 op=UNLOAD Feb 12 22:22:56.684000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.684000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.684000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.684000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.684000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.684000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.684000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.684000 audit[2579]: AVC avc: denied { perfmon } for pid=2579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.684000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.684000 audit[2579]: AVC avc: denied { bpf } for pid=2579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:56.684000 audit: BPF prog-id=81 op=LOAD Feb 12 22:22:56.684000 audit[2579]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001a7208 items=0 ppid=2539 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:56.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430313561616339336266313961393731646162626638666434666663 Feb 12 22:22:56.687775 env[1557]: time="2024-02-12T22:22:56.687736282Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-25-241,Uid:be01fa745a674b2fe11afa78363e5ca8,Namespace:kube-system,Attempt:0,} returns sandbox id \"1c3ac6932c45e8989f0ee99c5347936437d7673412340046b357759ae3db39bb\"" Feb 12 22:22:56.691876 env[1557]: time="2024-02-12T22:22:56.691825432Z" level=info msg="CreateContainer within sandbox \"1c3ac6932c45e8989f0ee99c5347936437d7673412340046b357759ae3db39bb\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 12 22:22:56.716981 kubelet[2426]: W0212 22:22:56.716773 2426 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.25.241:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-25-241&limit=500&resourceVersion=0": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:22:56.716981 kubelet[2426]: E0212 22:22:56.716951 2426 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.25.241:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-25-241&limit=500&resourceVersion=0": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:22:56.744404 env[1557]: time="2024-02-12T22:22:56.719534556Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-25-241,Uid:8332d02636b5351d52a57e7c90259a87,Namespace:kube-system,Attempt:0,} returns sandbox id \"4015aac93bf19a971dabbf8fd4ffcf268f41f8e699a5f7c0a891d885536c543d\"" Feb 12 22:22:56.744404 env[1557]: time="2024-02-12T22:22:56.722062708Z" level=info msg="CreateContainer within sandbox \"4015aac93bf19a971dabbf8fd4ffcf268f41f8e699a5f7c0a891d885536c543d\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 12 22:22:56.766772 kubelet[2426]: I0212 22:22:56.766737 2426 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-25-241" Feb 12 22:22:56.767121 kubelet[2426]: E0212 22:22:56.767082 2426 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.25.241:6443/api/v1/nodes\": dial tcp 172.31.25.241:6443: connect: connection refused" node="ip-172-31-25-241" Feb 12 22:22:56.838057 kubelet[2426]: W0212 22:22:56.838000 2426 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.25.241:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:22:56.838057 kubelet[2426]: E0212 22:22:56.838062 2426 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.25.241:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:22:57.202427 env[1557]: time="2024-02-12T22:22:57.202326859Z" level=info msg="CreateContainer within sandbox \"f2038420b691f431800129f624e3c56b411735f950bf073ffe5c38028b375919\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"6de9127b1dff79a05907d7c8798d372c642da544101415517ad8e24e32503179\"" Feb 12 22:22:57.203131 env[1557]: time="2024-02-12T22:22:57.203099479Z" level=info msg="StartContainer for \"6de9127b1dff79a05907d7c8798d372c642da544101415517ad8e24e32503179\"" Feb 12 22:22:57.203529 env[1557]: time="2024-02-12T22:22:57.203486423Z" level=info msg="CreateContainer within sandbox \"1c3ac6932c45e8989f0ee99c5347936437d7673412340046b357759ae3db39bb\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"6c3e9340cc83c5b8c64a7428e43d9ee81db959abef01680e5a127e8028b4c33c\"" Feb 12 22:22:57.208260 env[1557]: time="2024-02-12T22:22:57.208213150Z" level=info msg="CreateContainer within sandbox \"4015aac93bf19a971dabbf8fd4ffcf268f41f8e699a5f7c0a891d885536c543d\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"bbb53d2800a5daf81febcbd9851cf68bfc59e29c4b2847abe2835e7f1cbe53fc\"" Feb 12 22:22:57.209014 env[1557]: time="2024-02-12T22:22:57.208980425Z" level=info msg="StartContainer for \"6c3e9340cc83c5b8c64a7428e43d9ee81db959abef01680e5a127e8028b4c33c\"" Feb 12 22:22:57.210752 env[1557]: time="2024-02-12T22:22:57.210714855Z" level=info msg="StartContainer for \"bbb53d2800a5daf81febcbd9851cf68bfc59e29c4b2847abe2835e7f1cbe53fc\"" Feb 12 22:22:57.242238 systemd[1]: Started cri-containerd-bbb53d2800a5daf81febcbd9851cf68bfc59e29c4b2847abe2835e7f1cbe53fc.scope. Feb 12 22:22:57.263095 systemd[1]: Started cri-containerd-6de9127b1dff79a05907d7c8798d372c642da544101415517ad8e24e32503179.scope. Feb 12 22:22:57.272728 kubelet[2426]: E0212 22:22:57.272534 2426 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.25.241:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:22:57.279194 systemd[1]: Started cri-containerd-6c3e9340cc83c5b8c64a7428e43d9ee81db959abef01680e5a127e8028b4c33c.scope. Feb 12 22:22:57.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.286000 audit: BPF prog-id=82 op=LOAD Feb 12 22:22:57.287000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.287000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2539 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:57.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262623533643238303061356461663831666562636264393835316366 Feb 12 22:22:57.287000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.287000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2539 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:57.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262623533643238303061356461663831666562636264393835316366 Feb 12 22:22:57.287000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.287000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.287000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.287000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.287000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.287000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.287000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.287000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.287000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.287000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.287000 audit: BPF prog-id=83 op=LOAD Feb 12 22:22:57.287000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000400360 items=0 ppid=2539 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:57.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262623533643238303061356461663831666562636264393835316366 Feb 12 22:22:57.287000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.287000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.287000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.287000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.287000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.287000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.287000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.287000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.287000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.287000 audit: BPF prog-id=84 op=LOAD Feb 12 22:22:57.287000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0004003a8 items=0 ppid=2539 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:57.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262623533643238303061356461663831666562636264393835316366 Feb 12 22:22:57.288000 audit: BPF prog-id=84 op=UNLOAD Feb 12 22:22:57.288000 audit: BPF prog-id=83 op=UNLOAD Feb 12 22:22:57.288000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.288000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.288000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.288000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.288000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.288000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.288000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.288000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.288000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.288000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.288000 audit: BPF prog-id=85 op=LOAD Feb 12 22:22:57.288000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0004007b8 items=0 ppid=2539 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:57.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262623533643238303061356461663831666562636264393835316366 Feb 12 22:22:57.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.299000 audit: BPF prog-id=86 op=LOAD Feb 12 22:22:57.300000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.300000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2506 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:57.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664653931323762316466663739613035393037643763383739386433 Feb 12 22:22:57.300000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.300000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2506 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:57.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664653931323762316466663739613035393037643763383739386433 Feb 12 22:22:57.300000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.300000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.300000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.300000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.300000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.300000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.300000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.300000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.300000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.300000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.300000 audit: BPF prog-id=87 op=LOAD Feb 12 22:22:57.300000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000edfd0 items=0 ppid=2506 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:57.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664653931323762316466663739613035393037643763383739386433 Feb 12 22:22:57.303000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.303000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.303000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.303000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.303000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.303000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.303000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.303000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.303000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.303000 audit: BPF prog-id=88 op=LOAD Feb 12 22:22:57.303000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00036e018 items=0 ppid=2506 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:57.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664653931323762316466663739613035393037643763383739386433 Feb 12 22:22:57.304000 audit: BPF prog-id=88 op=UNLOAD Feb 12 22:22:57.304000 audit: BPF prog-id=87 op=UNLOAD Feb 12 22:22:57.304000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.304000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.304000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.304000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.304000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.304000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.304000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.304000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.304000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.304000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.304000 audit: BPF prog-id=89 op=LOAD Feb 12 22:22:57.304000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00036e428 items=0 ppid=2506 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:57.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664653931323762316466663739613035393037643763383739386433 Feb 12 22:22:57.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.324000 audit: BPF prog-id=90 op=LOAD Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2510 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:57.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663336539333430636338336335623863363461373432386534336439 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2510 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:57.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663336539333430636338336335623863363461373432386534336439 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit: BPF prog-id=91 op=LOAD Feb 12 22:22:57.325000 audit[2649]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000d7d00 items=0 ppid=2510 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:57.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663336539333430636338336335623863363461373432386534336439 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit: BPF prog-id=92 op=LOAD Feb 12 22:22:57.325000 audit[2649]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000d7d48 items=0 ppid=2510 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:57.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663336539333430636338336335623863363461373432386534336439 Feb 12 22:22:57.325000 audit: BPF prog-id=92 op=UNLOAD Feb 12 22:22:57.325000 audit: BPF prog-id=91 op=UNLOAD Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:22:57.325000 audit: BPF prog-id=93 op=LOAD Feb 12 22:22:57.325000 audit[2649]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c0158 items=0 ppid=2510 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:22:57.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663336539333430636338336335623863363461373432386534336439 Feb 12 22:22:57.442041 env[1557]: time="2024-02-12T22:22:57.441977934Z" level=info msg="StartContainer for \"6de9127b1dff79a05907d7c8798d372c642da544101415517ad8e24e32503179\" returns successfully" Feb 12 22:22:57.443696 env[1557]: time="2024-02-12T22:22:57.443661769Z" level=info msg="StartContainer for \"6c3e9340cc83c5b8c64a7428e43d9ee81db959abef01680e5a127e8028b4c33c\" returns successfully" Feb 12 22:22:57.444763 env[1557]: time="2024-02-12T22:22:57.444729230Z" level=info msg="StartContainer for \"bbb53d2800a5daf81febcbd9851cf68bfc59e29c4b2847abe2835e7f1cbe53fc\" returns successfully" Feb 12 22:22:57.450623 kubelet[2426]: I0212 22:22:57.450584 2426 status_manager.go:698] "Failed to get status for pod" podUID=be01fa745a674b2fe11afa78363e5ca8 pod="kube-system/kube-controller-manager-ip-172-31-25-241" err="Get \"https://172.31.25.241:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ip-172-31-25-241\": dial tcp 172.31.25.241:6443: connect: connection refused" Feb 12 22:22:57.454186 kubelet[2426]: I0212 22:22:57.454116 2426 status_manager.go:698] "Failed to get status for pod" podUID=277eb7ad6a94a616de370a6896362e0f pod="kube-system/kube-apiserver-ip-172-31-25-241" err="Get \"https://172.31.25.241:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ip-172-31-25-241\": dial tcp 172.31.25.241:6443: connect: connection refused" Feb 12 22:22:58.265798 kubelet[2426]: E0212 22:22:58.265641 2426 controller.go:146] failed to ensure lease exists, will retry in 3.2s, error: Get "https://172.31.25.241:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-241?timeout=10s": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:22:58.340448 kubelet[2426]: W0212 22:22:58.340410 2426 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.25.241:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-25-241&limit=500&resourceVersion=0": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:22:58.340802 kubelet[2426]: E0212 22:22:58.340787 2426 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.25.241:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-25-241&limit=500&resourceVersion=0": dial tcp 172.31.25.241:6443: connect: connection refused Feb 12 22:22:58.369905 kubelet[2426]: I0212 22:22:58.369884 2426 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-25-241" Feb 12 22:22:58.370570 kubelet[2426]: E0212 22:22:58.370554 2426 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.25.241:6443/api/v1/nodes\": dial tcp 172.31.25.241:6443: connect: connection refused" node="ip-172-31-25-241" Feb 12 22:22:58.458010 kubelet[2426]: I0212 22:22:58.457989 2426 status_manager.go:698] "Failed to get status for pod" podUID=8332d02636b5351d52a57e7c90259a87 pod="kube-system/kube-scheduler-ip-172-31-25-241" err="Get \"https://172.31.25.241:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ip-172-31-25-241\": dial tcp 172.31.25.241:6443: connect: connection refused" Feb 12 22:23:00.091000 audit[2687]: AVC avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:00.094444 kernel: kauditd_printk_skb: 632 callbacks suppressed Feb 12 22:23:00.094524 kernel: audit: type=1400 audit(1707776580.091:745): avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:00.107759 kernel: audit: type=1300 audit(1707776580.091:745): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0012a2000 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:23:00.091000 audit[2687]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0012a2000 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:23:00.091000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:23:00.120443 kernel: audit: type=1327 audit(1707776580.091:745): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:23:00.120599 kernel: audit: type=1400 audit(1707776580.091:746): avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:00.091000 audit[2687]: AVC avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:00.128272 kernel: audit: type=1300 audit(1707776580.091:746): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00129a040 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:23:00.091000 audit[2687]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00129a040 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:23:00.134739 kernel: audit: type=1327 audit(1707776580.091:746): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:23:00.091000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:23:01.002176 kernel: audit: type=1400 audit(1707776580.987:747): avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:01.002322 kernel: audit: type=1300 audit(1707776580.987:747): arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c005538000 a2=fc6 a3=0 items=0 ppid=2506 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 key=(null) Feb 12 22:23:00.987000 audit[2680]: AVC avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:00.987000 audit[2680]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c005538000 a2=fc6 a3=0 items=0 ppid=2506 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 key=(null) Feb 12 22:23:01.009606 kernel: audit: type=1327 audit(1707776580.987:747): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E323431002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 12 22:23:00.987000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E323431002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 12 22:23:00.987000 audit[2680]: AVC avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:00.987000 audit[2680]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c00295a040 a2=fc6 a3=0 items=0 ppid=2506 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 key=(null) Feb 12 22:23:00.987000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E323431002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 12 22:23:01.015902 kernel: audit: type=1400 audit(1707776580.987:748): avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:00.987000 audit[2680]: AVC avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521276 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:00.987000 audit[2680]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c0055381b0 a2=fc6 a3=0 items=0 ppid=2506 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 key=(null) Feb 12 22:23:00.987000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E323431002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 12 22:23:01.001000 audit[2680]: AVC avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521282 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:01.001000 audit[2680]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4d a1=c005538b40 a2=fc6 a3=0 items=0 ppid=2506 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 key=(null) Feb 12 22:23:01.001000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E323431002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 12 22:23:01.044000 audit[2680]: AVC avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:01.044000 audit[2680]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=84 a1=c00369cf00 a2=fc6 a3=0 items=0 ppid=2506 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 key=(null) Feb 12 22:23:01.044000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E323431002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 12 22:23:01.044000 audit[2680]: AVC avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:01.044000 audit[2680]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=84 a1=c005539710 a2=fc6 a3=0 items=0 ppid=2506 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 key=(null) Feb 12 22:23:01.044000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E323431002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 12 22:23:01.472340 kubelet[2426]: E0212 22:23:01.472308 2426 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-25-241\" not found" node="ip-172-31-25-241" Feb 12 22:23:01.546663 kubelet[2426]: E0212 22:23:01.546628 2426 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ip-172-31-25-241" not found Feb 12 22:23:01.572300 kubelet[2426]: I0212 22:23:01.572272 2426 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-25-241" Feb 12 22:23:01.583406 kubelet[2426]: I0212 22:23:01.583359 2426 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-25-241" Feb 12 22:23:01.592564 kubelet[2426]: E0212 22:23:01.592535 2426 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-241\" not found" Feb 12 22:23:01.692909 kubelet[2426]: E0212 22:23:01.692879 2426 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-241\" not found" Feb 12 22:23:01.793934 kubelet[2426]: E0212 22:23:01.793894 2426 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-241\" not found" Feb 12 22:23:01.894318 kubelet[2426]: E0212 22:23:01.894281 2426 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-241\" not found" Feb 12 22:23:01.995069 kubelet[2426]: E0212 22:23:01.995028 2426 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-241\" not found" Feb 12 22:23:02.096431 kubelet[2426]: E0212 22:23:02.096312 2426 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-241\" not found" Feb 12 22:23:02.175259 kubelet[2426]: E0212 22:23:02.175131 2426 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-241.17b33dbf3b52a899", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-241", UID:"ip-172-31-25-241", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-241"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 22, 55, 246870681, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 22, 55, 246870681, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 22:23:02.196995 kubelet[2426]: E0212 22:23:02.196918 2426 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-241\" not found" Feb 12 22:23:02.230261 kubelet[2426]: E0212 22:23:02.230140 2426 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-241.17b33dbf3bbf3e79", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-241", UID:"ip-172-31-25-241", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-241"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 22, 55, 253986937, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 22, 55, 253986937, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 22:23:02.284294 kubelet[2426]: E0212 22:23:02.284170 2426 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-241.17b33dbf3e83bd91", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-241", UID:"ip-172-31-25-241", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ip-172-31-25-241 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-241"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 22, 55, 300418961, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 22, 55, 300418961, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 22:23:02.298195 kubelet[2426]: E0212 22:23:02.298138 2426 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-241\" not found" Feb 12 22:23:02.343621 kubelet[2426]: E0212 22:23:02.343234 2426 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-241.17b33dbf3e83cf9b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-241", UID:"ip-172-31-25-241", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ip-172-31-25-241 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-241"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 22, 55, 300423579, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 22, 55, 300423579, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 22:23:02.399195 kubelet[2426]: E0212 22:23:02.398813 2426 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-241\" not found" Feb 12 22:23:02.401214 kubelet[2426]: E0212 22:23:02.400979 2426 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-241.17b33dbf3e83d9ce", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-241", UID:"ip-172-31-25-241", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ip-172-31-25-241 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-241"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 22, 55, 300426190, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 22, 55, 300426190, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 22:23:02.463614 kubelet[2426]: E0212 22:23:02.463516 2426 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-241.17b33dbf404c08e1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-241", UID:"ip-172-31-25-241", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-241"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 22, 55, 330322657, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 22, 55, 330322657, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 22:23:02.499596 kubelet[2426]: E0212 22:23:02.499526 2426 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-241\" not found" Feb 12 22:23:02.520082 kubelet[2426]: E0212 22:23:02.519958 2426 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-241.17b33dbf3e83bd91", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-241", UID:"ip-172-31-25-241", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ip-172-31-25-241 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-241"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 22, 55, 300418961, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 22, 55, 357937476, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 22:23:02.580935 kubelet[2426]: E0212 22:23:02.580826 2426 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-25-241.17b33dbf3e83cf9b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-25-241", UID:"ip-172-31-25-241", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ip-172-31-25-241 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-25-241"}, FirstTimestamp:time.Date(2024, time.February, 12, 22, 22, 55, 300423579, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 22, 22, 55, 357943935, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 22:23:02.601784 kubelet[2426]: E0212 22:23:02.601755 2426 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-241\" not found" Feb 12 22:23:02.702708 kubelet[2426]: E0212 22:23:02.702586 2426 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-241\" not found" Feb 12 22:23:02.802974 kubelet[2426]: E0212 22:23:02.802926 2426 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-241\" not found" Feb 12 22:23:02.903807 kubelet[2426]: E0212 22:23:02.903759 2426 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-241\" not found" Feb 12 22:23:03.004353 kubelet[2426]: E0212 22:23:03.004255 2426 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-241\" not found" Feb 12 22:23:03.104976 kubelet[2426]: E0212 22:23:03.104933 2426 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-241\" not found" Feb 12 22:23:03.205293 kubelet[2426]: E0212 22:23:03.205242 2426 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-241\" not found" Feb 12 22:23:03.306333 kubelet[2426]: E0212 22:23:03.306280 2426 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-241\" not found" Feb 12 22:23:03.406990 kubelet[2426]: E0212 22:23:03.406941 2426 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-241\" not found" Feb 12 22:23:03.508041 kubelet[2426]: E0212 22:23:03.508005 2426 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-241\" not found" Feb 12 22:23:03.609056 kubelet[2426]: E0212 22:23:03.608925 2426 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-241\" not found" Feb 12 22:23:03.709602 kubelet[2426]: E0212 22:23:03.709560 2426 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-241\" not found" Feb 12 22:23:03.810598 kubelet[2426]: E0212 22:23:03.810551 2426 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-241\" not found" Feb 12 22:23:03.911198 kubelet[2426]: E0212 22:23:03.911091 2426 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-241\" not found" Feb 12 22:23:03.986233 systemd[1]: Reloading. Feb 12 22:23:04.011814 kubelet[2426]: E0212 22:23:04.011683 2426 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-241\" not found" Feb 12 22:23:04.112538 kubelet[2426]: E0212 22:23:04.112456 2426 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-25-241\" not found" Feb 12 22:23:04.129174 /usr/lib/systemd/system-generators/torcx-generator[2757]: time="2024-02-12T22:23:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 22:23:04.129228 /usr/lib/systemd/system-generators/torcx-generator[2757]: time="2024-02-12T22:23:04Z" level=info msg="torcx already run" Feb 12 22:23:04.239787 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 22:23:04.239812 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 22:23:04.249293 kubelet[2426]: I0212 22:23:04.249263 2426 apiserver.go:52] "Watching apiserver" Feb 12 22:23:04.258934 kubelet[2426]: I0212 22:23:04.258901 2426 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 22:23:04.263340 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 22:23:04.326787 kubelet[2426]: I0212 22:23:04.326559 2426 reconciler.go:41] "Reconciler: start to sync state" Feb 12 22:23:04.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.392000 audit: BPF prog-id=94 op=LOAD Feb 12 22:23:04.392000 audit: BPF prog-id=55 op=UNLOAD Feb 12 22:23:04.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.396000 audit: BPF prog-id=95 op=LOAD Feb 12 22:23:04.396000 audit: BPF prog-id=56 op=UNLOAD Feb 12 22:23:04.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.396000 audit: BPF prog-id=96 op=LOAD Feb 12 22:23:04.396000 audit: BPF prog-id=86 op=UNLOAD Feb 12 22:23:04.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.398000 audit: BPF prog-id=97 op=LOAD Feb 12 22:23:04.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.398000 audit: BPF prog-id=98 op=LOAD Feb 12 22:23:04.398000 audit: BPF prog-id=57 op=UNLOAD Feb 12 22:23:04.398000 audit: BPF prog-id=58 op=UNLOAD Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit: BPF prog-id=99 op=LOAD Feb 12 22:23:04.400000 audit: BPF prog-id=59 op=UNLOAD Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit: BPF prog-id=100 op=LOAD Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.400000 audit: BPF prog-id=101 op=LOAD Feb 12 22:23:04.400000 audit: BPF prog-id=60 op=UNLOAD Feb 12 22:23:04.400000 audit: BPF prog-id=61 op=UNLOAD Feb 12 22:23:04.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.401000 audit: BPF prog-id=102 op=LOAD Feb 12 22:23:04.401000 audit: BPF prog-id=74 op=UNLOAD Feb 12 22:23:04.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.402000 audit: BPF prog-id=103 op=LOAD Feb 12 22:23:04.402000 audit: BPF prog-id=62 op=UNLOAD Feb 12 22:23:04.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.404000 audit: BPF prog-id=104 op=LOAD Feb 12 22:23:04.404000 audit: BPF prog-id=82 op=UNLOAD Feb 12 22:23:04.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.405000 audit: BPF prog-id=105 op=LOAD Feb 12 22:23:04.405000 audit: BPF prog-id=70 op=UNLOAD Feb 12 22:23:04.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.407000 audit: BPF prog-id=106 op=LOAD Feb 12 22:23:04.407000 audit: BPF prog-id=63 op=UNLOAD Feb 12 22:23:04.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.407000 audit: BPF prog-id=107 op=LOAD Feb 12 22:23:04.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.408000 audit: BPF prog-id=108 op=LOAD Feb 12 22:23:04.408000 audit: BPF prog-id=64 op=UNLOAD Feb 12 22:23:04.408000 audit: BPF prog-id=65 op=UNLOAD Feb 12 22:23:04.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.409000 audit: BPF prog-id=109 op=LOAD Feb 12 22:23:04.409000 audit: BPF prog-id=66 op=UNLOAD Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit: BPF prog-id=110 op=LOAD Feb 12 22:23:04.411000 audit: BPF prog-id=67 op=UNLOAD Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit: BPF prog-id=111 op=LOAD Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.411000 audit: BPF prog-id=112 op=LOAD Feb 12 22:23:04.411000 audit: BPF prog-id=68 op=UNLOAD Feb 12 22:23:04.411000 audit: BPF prog-id=69 op=UNLOAD Feb 12 22:23:04.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.414000 audit: BPF prog-id=113 op=LOAD Feb 12 22:23:04.414000 audit: BPF prog-id=90 op=UNLOAD Feb 12 22:23:04.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.416000 audit: BPF prog-id=114 op=LOAD Feb 12 22:23:04.416000 audit: BPF prog-id=78 op=UNLOAD Feb 12 22:23:04.446899 kubelet[2426]: I0212 22:23:04.446096 2426 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 22:23:04.446150 systemd[1]: Stopping kubelet.service... Feb 12 22:23:04.468342 systemd[1]: kubelet.service: Deactivated successfully. Feb 12 22:23:04.468591 systemd[1]: Stopped kubelet.service. Feb 12 22:23:04.468665 systemd[1]: kubelet.service: Consumed 1.158s CPU time. Feb 12 22:23:04.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:04.470832 systemd[1]: Started kubelet.service. Feb 12 22:23:04.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:04.573014 kubelet[2807]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 22:23:04.573457 kubelet[2807]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 22:23:04.573624 kubelet[2807]: I0212 22:23:04.573593 2807 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 22:23:04.574915 kubelet[2807]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 22:23:04.574996 kubelet[2807]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 22:23:04.579166 kubelet[2807]: I0212 22:23:04.579146 2807 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 12 22:23:04.579287 kubelet[2807]: I0212 22:23:04.579275 2807 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 22:23:04.579616 kubelet[2807]: I0212 22:23:04.579606 2807 server.go:836] "Client rotation is on, will bootstrap in background" Feb 12 22:23:04.581085 kubelet[2807]: I0212 22:23:04.581068 2807 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 12 22:23:04.582717 kubelet[2807]: I0212 22:23:04.582703 2807 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 22:23:04.585928 kubelet[2807]: I0212 22:23:04.585912 2807 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 22:23:04.586284 kubelet[2807]: I0212 22:23:04.586272 2807 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 22:23:04.586440 kubelet[2807]: I0212 22:23:04.586429 2807 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 22:23:04.586553 kubelet[2807]: I0212 22:23:04.586546 2807 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 22:23:04.586601 kubelet[2807]: I0212 22:23:04.586596 2807 container_manager_linux.go:308] "Creating device plugin manager" Feb 12 22:23:04.586670 kubelet[2807]: I0212 22:23:04.586664 2807 state_mem.go:36] "Initialized new in-memory state store" Feb 12 22:23:04.596148 kubelet[2807]: I0212 22:23:04.596122 2807 kubelet.go:398] "Attempting to sync node with API server" Feb 12 22:23:04.596148 kubelet[2807]: I0212 22:23:04.596147 2807 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 22:23:04.596557 kubelet[2807]: I0212 22:23:04.596172 2807 kubelet.go:297] "Adding apiserver pod source" Feb 12 22:23:04.596557 kubelet[2807]: I0212 22:23:04.596189 2807 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 22:23:04.598983 kubelet[2807]: I0212 22:23:04.598236 2807 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 22:23:04.598983 kubelet[2807]: I0212 22:23:04.598749 2807 server.go:1186] "Started kubelet" Feb 12 22:23:04.605000 audit[2807]: AVC avc: denied { mac_admin } for pid=2807 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.605000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:23:04.608027 kubelet[2807]: E0212 22:23:04.607950 2807 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 22:23:04.608215 kubelet[2807]: E0212 22:23:04.608202 2807 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 22:23:04.605000 audit[2807]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ccb020 a1=c000b54d80 a2=c000ccaff0 a3=25 items=0 ppid=1 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:04.605000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:23:04.609000 audit[2807]: AVC avc: denied { mac_admin } for pid=2807 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.609000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:23:04.609000 audit[2807]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b52d80 a1=c000b54d98 a2=c000ccb140 a3=25 items=0 ppid=1 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:04.609000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:23:04.611616 kubelet[2807]: I0212 22:23:04.611212 2807 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 22:23:04.611616 kubelet[2807]: I0212 22:23:04.611276 2807 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 22:23:04.611616 kubelet[2807]: I0212 22:23:04.611308 2807 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 22:23:04.615322 kubelet[2807]: I0212 22:23:04.615305 2807 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 22:23:04.616752 kubelet[2807]: I0212 22:23:04.616724 2807 server.go:451] "Adding debug handlers to kubelet server" Feb 12 22:23:04.624891 kubelet[2807]: I0212 22:23:04.617042 2807 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 12 22:23:04.624891 kubelet[2807]: I0212 22:23:04.617064 2807 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 22:23:04.656394 kubelet[2807]: I0212 22:23:04.656361 2807 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 22:23:04.711156 kubelet[2807]: I0212 22:23:04.711123 2807 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 22:23:04.711362 kubelet[2807]: I0212 22:23:04.711349 2807 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 12 22:23:04.711455 kubelet[2807]: I0212 22:23:04.711446 2807 kubelet.go:2113] "Starting kubelet main sync loop" Feb 12 22:23:04.711601 kubelet[2807]: E0212 22:23:04.711576 2807 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 22:23:04.720635 kubelet[2807]: I0212 22:23:04.720612 2807 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-25-241" Feb 12 22:23:04.736123 kubelet[2807]: I0212 22:23:04.736043 2807 kubelet_node_status.go:108] "Node was previously registered" node="ip-172-31-25-241" Feb 12 22:23:04.738019 kubelet[2807]: I0212 22:23:04.737996 2807 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-25-241" Feb 12 22:23:04.764134 kubelet[2807]: I0212 22:23:04.764085 2807 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 22:23:04.764134 kubelet[2807]: I0212 22:23:04.764104 2807 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 22:23:04.764134 kubelet[2807]: I0212 22:23:04.764135 2807 state_mem.go:36] "Initialized new in-memory state store" Feb 12 22:23:04.764751 kubelet[2807]: I0212 22:23:04.764291 2807 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 12 22:23:04.764751 kubelet[2807]: I0212 22:23:04.764306 2807 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 12 22:23:04.764751 kubelet[2807]: I0212 22:23:04.764314 2807 policy_none.go:49] "None policy: Start" Feb 12 22:23:04.766525 kubelet[2807]: I0212 22:23:04.766482 2807 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 22:23:04.766757 kubelet[2807]: I0212 22:23:04.766531 2807 state_mem.go:35] "Initializing new in-memory state store" Feb 12 22:23:04.766905 kubelet[2807]: I0212 22:23:04.766840 2807 state_mem.go:75] "Updated machine memory state" Feb 12 22:23:04.772781 kubelet[2807]: I0212 22:23:04.772765 2807 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 22:23:04.771000 audit[2807]: AVC avc: denied { mac_admin } for pid=2807 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:04.771000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 22:23:04.771000 audit[2807]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f2ea80 a1=c00096a570 a2=c000f2ea50 a3=25 items=0 ppid=1 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:04.771000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 22:23:04.774193 kubelet[2807]: I0212 22:23:04.773303 2807 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 22:23:04.774193 kubelet[2807]: I0212 22:23:04.773964 2807 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 22:23:04.812708 kubelet[2807]: I0212 22:23:04.812655 2807 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:23:04.812938 kubelet[2807]: I0212 22:23:04.812769 2807 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:23:04.812938 kubelet[2807]: I0212 22:23:04.812813 2807 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:23:04.821236 kubelet[2807]: E0212 22:23:04.821204 2807 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ip-172-31-25-241\" already exists" pod="kube-system/kube-scheduler-ip-172-31-25-241" Feb 12 22:23:04.922543 kubelet[2807]: I0212 22:23:04.922436 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/277eb7ad6a94a616de370a6896362e0f-k8s-certs\") pod \"kube-apiserver-ip-172-31-25-241\" (UID: \"277eb7ad6a94a616de370a6896362e0f\") " pod="kube-system/kube-apiserver-ip-172-31-25-241" Feb 12 22:23:04.922692 kubelet[2807]: I0212 22:23:04.922586 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/be01fa745a674b2fe11afa78363e5ca8-ca-certs\") pod \"kube-controller-manager-ip-172-31-25-241\" (UID: \"be01fa745a674b2fe11afa78363e5ca8\") " pod="kube-system/kube-controller-manager-ip-172-31-25-241" Feb 12 22:23:04.922692 kubelet[2807]: I0212 22:23:04.922621 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/be01fa745a674b2fe11afa78363e5ca8-k8s-certs\") pod \"kube-controller-manager-ip-172-31-25-241\" (UID: \"be01fa745a674b2fe11afa78363e5ca8\") " pod="kube-system/kube-controller-manager-ip-172-31-25-241" Feb 12 22:23:04.922692 kubelet[2807]: I0212 22:23:04.922654 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8332d02636b5351d52a57e7c90259a87-kubeconfig\") pod \"kube-scheduler-ip-172-31-25-241\" (UID: \"8332d02636b5351d52a57e7c90259a87\") " pod="kube-system/kube-scheduler-ip-172-31-25-241" Feb 12 22:23:04.922692 kubelet[2807]: I0212 22:23:04.922681 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/277eb7ad6a94a616de370a6896362e0f-ca-certs\") pod \"kube-apiserver-ip-172-31-25-241\" (UID: \"277eb7ad6a94a616de370a6896362e0f\") " pod="kube-system/kube-apiserver-ip-172-31-25-241" Feb 12 22:23:04.923031 kubelet[2807]: I0212 22:23:04.922716 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/be01fa745a674b2fe11afa78363e5ca8-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-25-241\" (UID: \"be01fa745a674b2fe11afa78363e5ca8\") " pod="kube-system/kube-controller-manager-ip-172-31-25-241" Feb 12 22:23:04.923031 kubelet[2807]: I0212 22:23:04.922749 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/be01fa745a674b2fe11afa78363e5ca8-kubeconfig\") pod \"kube-controller-manager-ip-172-31-25-241\" (UID: \"be01fa745a674b2fe11afa78363e5ca8\") " pod="kube-system/kube-controller-manager-ip-172-31-25-241" Feb 12 22:23:04.923031 kubelet[2807]: I0212 22:23:04.922791 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/be01fa745a674b2fe11afa78363e5ca8-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-25-241\" (UID: \"be01fa745a674b2fe11afa78363e5ca8\") " pod="kube-system/kube-controller-manager-ip-172-31-25-241" Feb 12 22:23:04.923031 kubelet[2807]: I0212 22:23:04.922827 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/277eb7ad6a94a616de370a6896362e0f-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-25-241\" (UID: \"277eb7ad6a94a616de370a6896362e0f\") " pod="kube-system/kube-apiserver-ip-172-31-25-241" Feb 12 22:23:05.598093 kubelet[2807]: I0212 22:23:05.598054 2807 apiserver.go:52] "Watching apiserver" Feb 12 22:23:05.720669 kubelet[2807]: I0212 22:23:05.720624 2807 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 22:23:05.729259 kubelet[2807]: I0212 22:23:05.729063 2807 reconciler.go:41] "Reconciler: start to sync state" Feb 12 22:23:06.008679 kubelet[2807]: E0212 22:23:06.008563 2807 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ip-172-31-25-241\" already exists" pod="kube-system/kube-scheduler-ip-172-31-25-241" Feb 12 22:23:06.642299 kubelet[2807]: I0212 22:23:06.642272 2807 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-25-241" podStartSLOduration=2.639795855 pod.CreationTimestamp="2024-02-12 22:23:04 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:23:06.264225549 +0000 UTC m=+1.784644793" watchObservedRunningTime="2024-02-12 22:23:06.639795855 +0000 UTC m=+2.160215095" Feb 12 22:23:07.125053 kubelet[2807]: I0212 22:23:07.125017 2807 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-25-241" podStartSLOduration=3.124966525 pod.CreationTimestamp="2024-02-12 22:23:04 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:23:06.64479564 +0000 UTC m=+2.165214883" watchObservedRunningTime="2024-02-12 22:23:07.124966525 +0000 UTC m=+2.645385769" Feb 12 22:23:07.419522 kubelet[2807]: I0212 22:23:07.419420 2807 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-25-241" podStartSLOduration=3.419363135 pod.CreationTimestamp="2024-02-12 22:23:04 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:23:07.127048825 +0000 UTC m=+2.647468068" watchObservedRunningTime="2024-02-12 22:23:07.419363135 +0000 UTC m=+2.939782391" Feb 12 22:23:10.520340 sudo[1837]: pam_unix(sudo:session): session closed for user root Feb 12 22:23:10.518000 audit[1837]: USER_END pid=1837 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:23:10.523882 kernel: kauditd_printk_skb: 272 callbacks suppressed Feb 12 22:23:10.523984 kernel: audit: type=1106 audit(1707776590.518:1002): pid=1837 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:23:10.518000 audit[1837]: CRED_DISP pid=1837 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:23:10.532065 kernel: audit: type=1104 audit(1707776590.518:1003): pid=1837 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 22:23:10.562178 sshd[1834]: pam_unix(sshd:session): session closed for user core Feb 12 22:23:10.564000 audit[1834]: USER_END pid=1834 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:23:10.564000 audit[1834]: CRED_DISP pid=1834 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:23:10.578408 kernel: audit: type=1106 audit(1707776590.564:1004): pid=1834 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:23:10.578517 kernel: audit: type=1104 audit(1707776590.564:1005): pid=1834 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:23:10.581836 systemd[1]: sshd@6-172.31.25.241:22-139.178.89.65:46818.service: Deactivated successfully. Feb 12 22:23:10.582770 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 22:23:10.582986 systemd[1]: session-7.scope: Consumed 4.559s CPU time. Feb 12 22:23:10.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.25.241:22-139.178.89.65:46818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:10.588911 kernel: audit: type=1131 audit(1707776590.580:1006): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.25.241:22-139.178.89.65:46818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:23:10.588938 systemd-logind[1548]: Session 7 logged out. Waiting for processes to exit. Feb 12 22:23:10.590291 systemd-logind[1548]: Removed session 7. Feb 12 22:23:13.765000 audit[2687]: AVC avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:13.779971 kernel: audit: type=1400 audit(1707776593.765:1007): avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:13.780083 kernel: audit: type=1400 audit(1707776593.770:1008): avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:13.770000 audit[2687]: AVC avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:13.788730 kernel: audit: type=1300 audit(1707776593.770:1008): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ff6c20 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:23:13.770000 audit[2687]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ff6c20 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:23:13.770000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:23:13.770000 audit[2687]: AVC avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:13.801958 kernel: audit: type=1327 audit(1707776593.770:1008): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:23:13.802067 kernel: audit: type=1400 audit(1707776593.770:1009): avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:13.770000 audit[2687]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ff6c60 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:23:13.770000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:23:13.770000 audit[2687]: AVC avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:23:13.770000 audit[2687]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ff6ca0 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:23:13.770000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:23:13.765000 audit[2687]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f7aa20 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:23:13.765000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:23:14.065000 audit[2687]: AVC avc: denied { watch } for pid=2687 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 22:23:14.065000 audit[2687]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001055340 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:23:14.065000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:23:17.379828 kubelet[2807]: I0212 22:23:17.379790 2807 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 12 22:23:17.380403 env[1557]: time="2024-02-12T22:23:17.380362030Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 22:23:17.380921 kubelet[2807]: I0212 22:23:17.380761 2807 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 12 22:23:18.135941 kubelet[2807]: I0212 22:23:18.135907 2807 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:23:18.142606 systemd[1]: Created slice kubepods-besteffort-poddc5ba6a6_8ddb_4e6d_a865_cb72787eae78.slice. Feb 12 22:23:18.222877 kubelet[2807]: I0212 22:23:18.222749 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/dc5ba6a6-8ddb-4e6d-a865-cb72787eae78-kube-proxy\") pod \"kube-proxy-pdpj5\" (UID: \"dc5ba6a6-8ddb-4e6d-a865-cb72787eae78\") " pod="kube-system/kube-proxy-pdpj5" Feb 12 22:23:18.222877 kubelet[2807]: I0212 22:23:18.222877 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/dc5ba6a6-8ddb-4e6d-a865-cb72787eae78-xtables-lock\") pod \"kube-proxy-pdpj5\" (UID: \"dc5ba6a6-8ddb-4e6d-a865-cb72787eae78\") " pod="kube-system/kube-proxy-pdpj5" Feb 12 22:23:18.223097 kubelet[2807]: I0212 22:23:18.222907 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/dc5ba6a6-8ddb-4e6d-a865-cb72787eae78-lib-modules\") pod \"kube-proxy-pdpj5\" (UID: \"dc5ba6a6-8ddb-4e6d-a865-cb72787eae78\") " pod="kube-system/kube-proxy-pdpj5" Feb 12 22:23:18.223097 kubelet[2807]: I0212 22:23:18.222938 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zt67f\" (UniqueName: \"kubernetes.io/projected/dc5ba6a6-8ddb-4e6d-a865-cb72787eae78-kube-api-access-zt67f\") pod \"kube-proxy-pdpj5\" (UID: \"dc5ba6a6-8ddb-4e6d-a865-cb72787eae78\") " pod="kube-system/kube-proxy-pdpj5" Feb 12 22:23:18.376280 kubelet[2807]: I0212 22:23:18.376244 2807 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:23:18.383439 systemd[1]: Created slice kubepods-besteffort-pod9bb3053d_ce0c_4653_b2ba_012832a79320.slice. Feb 12 22:23:18.425272 kubelet[2807]: I0212 22:23:18.425072 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9bb3053d-ce0c-4653-b2ba-012832a79320-var-lib-calico\") pod \"tigera-operator-cfc98749c-fqsf2\" (UID: \"9bb3053d-ce0c-4653-b2ba-012832a79320\") " pod="tigera-operator/tigera-operator-cfc98749c-fqsf2" Feb 12 22:23:18.425272 kubelet[2807]: I0212 22:23:18.425132 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9wdfd\" (UniqueName: \"kubernetes.io/projected/9bb3053d-ce0c-4653-b2ba-012832a79320-kube-api-access-9wdfd\") pod \"tigera-operator-cfc98749c-fqsf2\" (UID: \"9bb3053d-ce0c-4653-b2ba-012832a79320\") " pod="tigera-operator/tigera-operator-cfc98749c-fqsf2" Feb 12 22:23:18.451303 env[1557]: time="2024-02-12T22:23:18.451246271Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-pdpj5,Uid:dc5ba6a6-8ddb-4e6d-a865-cb72787eae78,Namespace:kube-system,Attempt:0,}" Feb 12 22:23:18.476384 env[1557]: time="2024-02-12T22:23:18.476303826Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:23:18.476603 env[1557]: time="2024-02-12T22:23:18.476346949Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:23:18.476603 env[1557]: time="2024-02-12T22:23:18.476361697Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:23:18.476603 env[1557]: time="2024-02-12T22:23:18.476524627Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a434ee155ab0df8621feae79113b743b43f6370f98db3031b7e20fa37be9445f pid=2920 runtime=io.containerd.runc.v2 Feb 12 22:23:18.505949 systemd[1]: Started cri-containerd-a434ee155ab0df8621feae79113b743b43f6370f98db3031b7e20fa37be9445f.scope. Feb 12 22:23:18.529661 kernel: kauditd_printk_skb: 10 callbacks suppressed Feb 12 22:23:18.529768 kernel: audit: type=1400 audit(1707776598.526:1012): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.538906 kernel: audit: type=1400 audit(1707776598.526:1013): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.548941 kernel: audit: type=1400 audit(1707776598.526:1014): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.559923 kernel: audit: type=1400 audit(1707776598.526:1015): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.559982 env[1557]: time="2024-02-12T22:23:18.555847131Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-pdpj5,Uid:dc5ba6a6-8ddb-4e6d-a865-cb72787eae78,Namespace:kube-system,Attempt:0,} returns sandbox id \"a434ee155ab0df8621feae79113b743b43f6370f98db3031b7e20fa37be9445f\"" Feb 12 22:23:18.559982 env[1557]: time="2024-02-12T22:23:18.559542893Z" level=info msg="CreateContainer within sandbox \"a434ee155ab0df8621feae79113b743b43f6370f98db3031b7e20fa37be9445f\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 22:23:18.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.569883 kernel: audit: type=1400 audit(1707776598.526:1016): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.575897 kernel: audit: type=1400 audit(1707776598.526:1017): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.585970 kernel: audit: type=1400 audit(1707776598.526:1018): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.586057 kernel: audit: type=1400 audit(1707776598.526:1019): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.590668 kernel: audit: type=1400 audit(1707776598.526:1020): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.527000 audit: BPF prog-id=115 op=LOAD Feb 12 22:23:18.528000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.528000 audit[2929]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2920 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:18.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134333465653135356162306466383632316665616537393131336237 Feb 12 22:23:18.528000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.528000 audit[2929]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2920 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:18.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134333465653135356162306466383632316665616537393131336237 Feb 12 22:23:18.528000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.528000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.528000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.597932 kernel: audit: type=1400 audit(1707776598.527:1021): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.528000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.528000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.528000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.528000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.528000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.528000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.528000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.528000 audit: BPF prog-id=116 op=LOAD Feb 12 22:23:18.528000 audit[2929]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002c9ea0 items=0 ppid=2920 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:18.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134333465653135356162306466383632316665616537393131336237 Feb 12 22:23:18.531000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.531000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.531000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.531000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.531000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.531000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.531000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.531000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.531000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.531000 audit: BPF prog-id=117 op=LOAD Feb 12 22:23:18.531000 audit[2929]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002c9ee8 items=0 ppid=2920 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:18.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134333465653135356162306466383632316665616537393131336237 Feb 12 22:23:18.532000 audit: BPF prog-id=117 op=UNLOAD Feb 12 22:23:18.532000 audit: BPF prog-id=116 op=UNLOAD Feb 12 22:23:18.532000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.532000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.532000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.532000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.532000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.532000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.532000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.532000 audit[2929]: AVC avc: denied { perfmon } for pid=2929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.532000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.532000 audit[2929]: AVC avc: denied { bpf } for pid=2929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.532000 audit: BPF prog-id=118 op=LOAD Feb 12 22:23:18.532000 audit[2929]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ae2f8 items=0 ppid=2920 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:18.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134333465653135356162306466383632316665616537393131336237 Feb 12 22:23:18.606952 env[1557]: time="2024-02-12T22:23:18.606908282Z" level=info msg="CreateContainer within sandbox \"a434ee155ab0df8621feae79113b743b43f6370f98db3031b7e20fa37be9445f\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"0f1a404f93d37623f91e83fd241bd247130e4b3eed59993258d01671fbfb09ff\"" Feb 12 22:23:18.608350 env[1557]: time="2024-02-12T22:23:18.608317884Z" level=info msg="StartContainer for \"0f1a404f93d37623f91e83fd241bd247130e4b3eed59993258d01671fbfb09ff\"" Feb 12 22:23:18.658824 systemd[1]: Started cri-containerd-0f1a404f93d37623f91e83fd241bd247130e4b3eed59993258d01671fbfb09ff.scope. Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit[2962]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fbd78a14998 items=0 ppid=2920 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:18.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066316134303466393364333736323366393165383366643234316264 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit: BPF prog-id=119 op=LOAD Feb 12 22:23:18.680000 audit[2962]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a2208 items=0 ppid=2920 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:18.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066316134303466393364333736323366393165383366643234316264 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit: BPF prog-id=120 op=LOAD Feb 12 22:23:18.680000 audit[2962]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000a2258 items=0 ppid=2920 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:18.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066316134303466393364333736323366393165383366643234316264 Feb 12 22:23:18.680000 audit: BPF prog-id=120 op=UNLOAD Feb 12 22:23:18.680000 audit: BPF prog-id=119 op=UNLOAD Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.680000 audit: BPF prog-id=121 op=LOAD Feb 12 22:23:18.680000 audit[2962]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000a22e8 items=0 ppid=2920 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:18.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066316134303466393364333736323366393165383366643234316264 Feb 12 22:23:18.690160 env[1557]: time="2024-02-12T22:23:18.690122631Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-fqsf2,Uid:9bb3053d-ce0c-4653-b2ba-012832a79320,Namespace:tigera-operator,Attempt:0,}" Feb 12 22:23:18.705330 env[1557]: time="2024-02-12T22:23:18.705284778Z" level=info msg="StartContainer for \"0f1a404f93d37623f91e83fd241bd247130e4b3eed59993258d01671fbfb09ff\" returns successfully" Feb 12 22:23:18.722829 env[1557]: time="2024-02-12T22:23:18.722747549Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:23:18.722829 env[1557]: time="2024-02-12T22:23:18.722799527Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:23:18.723118 env[1557]: time="2024-02-12T22:23:18.723056419Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:23:18.723648 env[1557]: time="2024-02-12T22:23:18.723406515Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e36653d8c5d552a24f1d608f0c55b698fdd3f07242642365c4d5ed8aa04ba629 pid=2993 runtime=io.containerd.runc.v2 Feb 12 22:23:18.749651 systemd[1]: Started cri-containerd-e36653d8c5d552a24f1d608f0c55b698fdd3f07242642365c4d5ed8aa04ba629.scope. Feb 12 22:23:18.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.778000 audit: BPF prog-id=122 op=LOAD Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2993 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:18.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533363635336438633564353532613234663164363038663063353562 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2993 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:18.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533363635336438633564353532613234663164363038663063353562 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit: BPF prog-id=123 op=LOAD Feb 12 22:23:18.779000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001c7f40 items=0 ppid=2993 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:18.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533363635336438633564353532613234663164363038663063353562 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit: BPF prog-id=124 op=LOAD Feb 12 22:23:18.779000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0001c7f88 items=0 ppid=2993 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:18.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533363635336438633564353532613234663164363038663063353562 Feb 12 22:23:18.779000 audit: BPF prog-id=124 op=UNLOAD Feb 12 22:23:18.779000 audit: BPF prog-id=123 op=UNLOAD Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:18.779000 audit: BPF prog-id=125 op=LOAD Feb 12 22:23:18.779000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0001ec398 items=0 ppid=2993 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:18.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533363635336438633564353532613234663164363038663063353562 Feb 12 22:23:18.835484 env[1557]: time="2024-02-12T22:23:18.835429104Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-fqsf2,Uid:9bb3053d-ce0c-4653-b2ba-012832a79320,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"e36653d8c5d552a24f1d608f0c55b698fdd3f07242642365c4d5ed8aa04ba629\"" Feb 12 22:23:18.844621 env[1557]: time="2024-02-12T22:23:18.844590674Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 12 22:23:19.238000 audit[3053]: NETFILTER_CFG table=mangle:59 family=10 entries=1 op=nft_register_chain pid=3053 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:19.238000 audit[3053]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcbf2d1950 a2=0 a3=7ffcbf2d193c items=0 ppid=2972 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.238000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 22:23:19.242000 audit[3054]: NETFILTER_CFG table=nat:60 family=10 entries=1 op=nft_register_chain pid=3054 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:19.242000 audit[3054]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff24f4e890 a2=0 a3=7fff24f4e87c items=0 ppid=2972 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.242000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 22:23:19.245000 audit[3055]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_chain pid=3055 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:19.245000 audit[3055]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff0487ab00 a2=0 a3=7fff0487aaec items=0 ppid=2972 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.245000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 22:23:19.246000 audit[3056]: NETFILTER_CFG table=mangle:62 family=2 entries=1 op=nft_register_chain pid=3056 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:19.246000 audit[3056]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd49220ae0 a2=0 a3=7ffd49220acc items=0 ppid=2972 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.246000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 22:23:19.248000 audit[3057]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_chain pid=3057 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:19.248000 audit[3057]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc75f333d0 a2=0 a3=7ffc75f333bc items=0 ppid=2972 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.248000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 22:23:19.251000 audit[3058]: NETFILTER_CFG table=filter:64 family=2 entries=1 op=nft_register_chain pid=3058 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:19.251000 audit[3058]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc798eb960 a2=0 a3=7ffc798eb94c items=0 ppid=2972 pid=3058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.251000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 22:23:19.353920 systemd[1]: run-containerd-runc-k8s.io-a434ee155ab0df8621feae79113b743b43f6370f98db3031b7e20fa37be9445f-runc.OdC6Aq.mount: Deactivated successfully. Feb 12 22:23:19.357000 audit[3059]: NETFILTER_CFG table=filter:65 family=2 entries=1 op=nft_register_chain pid=3059 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:19.357000 audit[3059]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc17d274d0 a2=0 a3=7ffc17d274bc items=0 ppid=2972 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.357000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 22:23:19.362000 audit[3061]: NETFILTER_CFG table=filter:66 family=2 entries=1 op=nft_register_rule pid=3061 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:19.362000 audit[3061]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc21a40b10 a2=0 a3=7ffc21a40afc items=0 ppid=2972 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.362000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 22:23:19.367000 audit[3064]: NETFILTER_CFG table=filter:67 family=2 entries=1 op=nft_register_rule pid=3064 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:19.367000 audit[3064]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffeb235cf90 a2=0 a3=7ffeb235cf7c items=0 ppid=2972 pid=3064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.367000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 22:23:19.368000 audit[3065]: NETFILTER_CFG table=filter:68 family=2 entries=1 op=nft_register_chain pid=3065 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:19.368000 audit[3065]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc2d7f710 a2=0 a3=7ffcc2d7f6fc items=0 ppid=2972 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.368000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 22:23:19.371000 audit[3067]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_rule pid=3067 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:19.371000 audit[3067]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffedd007a20 a2=0 a3=7ffedd007a0c items=0 ppid=2972 pid=3067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.371000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 22:23:19.373000 audit[3068]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_chain pid=3068 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:19.373000 audit[3068]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe81d49ab0 a2=0 a3=7ffe81d49a9c items=0 ppid=2972 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.373000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 22:23:19.376000 audit[3070]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_rule pid=3070 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:19.376000 audit[3070]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffea6bd2150 a2=0 a3=7ffea6bd213c items=0 ppid=2972 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.376000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 22:23:19.380000 audit[3073]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_rule pid=3073 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:19.380000 audit[3073]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe77faa650 a2=0 a3=7ffe77faa63c items=0 ppid=2972 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.380000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 22:23:19.382000 audit[3074]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_chain pid=3074 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:19.382000 audit[3074]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffe3ceab0 a2=0 a3=7ffffe3cea9c items=0 ppid=2972 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.382000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 22:23:19.385000 audit[3076]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_rule pid=3076 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:19.385000 audit[3076]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc2bc6c8b0 a2=0 a3=7ffc2bc6c89c items=0 ppid=2972 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.385000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 22:23:19.387000 audit[3077]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_chain pid=3077 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:19.387000 audit[3077]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd0f0e2fc0 a2=0 a3=7ffd0f0e2fac items=0 ppid=2972 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.387000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 22:23:19.390000 audit[3079]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_rule pid=3079 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:19.390000 audit[3079]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd61dffe60 a2=0 a3=7ffd61dffe4c items=0 ppid=2972 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.390000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 22:23:19.395000 audit[3082]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_rule pid=3082 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:19.395000 audit[3082]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe7f5ab0c0 a2=0 a3=7ffe7f5ab0ac items=0 ppid=2972 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.395000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 22:23:19.399000 audit[3085]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_rule pid=3085 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:19.399000 audit[3085]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc3cc7d6a0 a2=0 a3=7ffc3cc7d68c items=0 ppid=2972 pid=3085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.399000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 22:23:19.401000 audit[3086]: NETFILTER_CFG table=nat:79 family=2 entries=1 op=nft_register_chain pid=3086 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:19.401000 audit[3086]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff6be157b0 a2=0 a3=7fff6be1579c items=0 ppid=2972 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.401000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 22:23:19.405000 audit[3088]: NETFILTER_CFG table=nat:80 family=2 entries=1 op=nft_register_rule pid=3088 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:19.405000 audit[3088]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd83dde3a0 a2=0 a3=7ffd83dde38c items=0 ppid=2972 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.405000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 22:23:19.410000 audit[3091]: NETFILTER_CFG table=nat:81 family=2 entries=1 op=nft_register_rule pid=3091 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 22:23:19.410000 audit[3091]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd3db43690 a2=0 a3=7ffd3db4367c items=0 ppid=2972 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.410000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 22:23:19.452000 audit[3095]: NETFILTER_CFG table=filter:82 family=2 entries=6 op=nft_register_rule pid=3095 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:23:19.452000 audit[3095]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffc1f750ef0 a2=0 a3=7ffc1f750edc items=0 ppid=2972 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.452000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:23:19.524000 audit[3095]: NETFILTER_CFG table=nat:83 family=2 entries=17 op=nft_register_chain pid=3095 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:23:19.524000 audit[3095]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffc1f750ef0 a2=0 a3=7ffc1f750edc items=0 ppid=2972 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.524000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:23:19.528000 audit[3099]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3099 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:19.528000 audit[3099]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff4aa58fe0 a2=0 a3=7fff4aa58fcc items=0 ppid=2972 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.528000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 22:23:19.531000 audit[3101]: NETFILTER_CFG table=filter:85 family=10 entries=2 op=nft_register_chain pid=3101 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:19.531000 audit[3101]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff1e3512a0 a2=0 a3=7fff1e35128c items=0 ppid=2972 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.531000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 22:23:19.535000 audit[3104]: NETFILTER_CFG table=filter:86 family=10 entries=2 op=nft_register_chain pid=3104 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:19.535000 audit[3104]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc6be64d00 a2=0 a3=7ffc6be64cec items=0 ppid=2972 pid=3104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.535000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 22:23:19.537000 audit[3105]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=3105 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:19.537000 audit[3105]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc69d7c3a0 a2=0 a3=7ffc69d7c38c items=0 ppid=2972 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.537000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 22:23:19.540000 audit[3107]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=3107 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:19.540000 audit[3107]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd2bc73040 a2=0 a3=7ffd2bc7302c items=0 ppid=2972 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.540000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 22:23:19.541000 audit[3108]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_chain pid=3108 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:19.541000 audit[3108]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe83b2c270 a2=0 a3=7ffe83b2c25c items=0 ppid=2972 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.541000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 22:23:19.544000 audit[3110]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=3110 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:19.544000 audit[3110]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd95b04a30 a2=0 a3=7ffd95b04a1c items=0 ppid=2972 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.544000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 22:23:19.549000 audit[3113]: NETFILTER_CFG table=filter:91 family=10 entries=2 op=nft_register_chain pid=3113 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:19.549000 audit[3113]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc0f0e36e0 a2=0 a3=7ffc0f0e36cc items=0 ppid=2972 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.549000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 22:23:19.551000 audit[3114]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_chain pid=3114 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:19.551000 audit[3114]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd84f79960 a2=0 a3=7ffd84f7994c items=0 ppid=2972 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.551000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 22:23:19.557000 audit[3116]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_rule pid=3116 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:19.557000 audit[3116]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcf509f560 a2=0 a3=7ffcf509f54c items=0 ppid=2972 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.557000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 22:23:19.559000 audit[3117]: NETFILTER_CFG table=filter:94 family=10 entries=1 op=nft_register_chain pid=3117 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:19.559000 audit[3117]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0fb0d4b0 a2=0 a3=7ffe0fb0d49c items=0 ppid=2972 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.559000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 22:23:19.566000 audit[3119]: NETFILTER_CFG table=filter:95 family=10 entries=1 op=nft_register_rule pid=3119 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:19.566000 audit[3119]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe6bbb3560 a2=0 a3=7ffe6bbb354c items=0 ppid=2972 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.566000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 22:23:19.571000 audit[3122]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_rule pid=3122 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:19.571000 audit[3122]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeeb3950a0 a2=0 a3=7ffeeb39508c items=0 ppid=2972 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.571000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 22:23:19.578000 audit[3125]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_rule pid=3125 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:19.578000 audit[3125]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc37c65c30 a2=0 a3=7ffc37c65c1c items=0 ppid=2972 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.578000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 22:23:19.579000 audit[3126]: NETFILTER_CFG table=nat:98 family=10 entries=1 op=nft_register_chain pid=3126 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:19.579000 audit[3126]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe83d62e50 a2=0 a3=7ffe83d62e3c items=0 ppid=2972 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.579000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 22:23:19.582000 audit[3128]: NETFILTER_CFG table=nat:99 family=10 entries=2 op=nft_register_chain pid=3128 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:19.582000 audit[3128]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc5992ffc0 a2=0 a3=7ffc5992ffac items=0 ppid=2972 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.582000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 22:23:19.587000 audit[3131]: NETFILTER_CFG table=nat:100 family=10 entries=2 op=nft_register_chain pid=3131 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 22:23:19.587000 audit[3131]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe62827b70 a2=0 a3=7ffe62827b5c items=0 ppid=2972 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.587000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 22:23:19.596000 audit[3135]: NETFILTER_CFG table=filter:101 family=10 entries=3 op=nft_register_rule pid=3135 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 22:23:19.596000 audit[3135]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fffe045a6f0 a2=0 a3=7fffe045a6dc items=0 ppid=2972 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.596000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:23:19.596000 audit[3135]: NETFILTER_CFG table=nat:102 family=10 entries=10 op=nft_register_chain pid=3135 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 22:23:19.596000 audit[3135]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7fffe045a6f0 a2=0 a3=7fffe045a6dc items=0 ppid=2972 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:19.596000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:23:20.063578 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1366854582.mount: Deactivated successfully. Feb 12 22:23:22.303617 env[1557]: time="2024-02-12T22:23:22.303564215Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:23:22.306965 env[1557]: time="2024-02-12T22:23:22.306922457Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:23:22.309213 env[1557]: time="2024-02-12T22:23:22.309181906Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:23:22.311403 env[1557]: time="2024-02-12T22:23:22.311369811Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:23:22.312133 env[1557]: time="2024-02-12T22:23:22.312094255Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 12 22:23:22.315500 env[1557]: time="2024-02-12T22:23:22.315461179Z" level=info msg="CreateContainer within sandbox \"e36653d8c5d552a24f1d608f0c55b698fdd3f07242642365c4d5ed8aa04ba629\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 12 22:23:22.335053 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3891628267.mount: Deactivated successfully. Feb 12 22:23:22.342115 env[1557]: time="2024-02-12T22:23:22.342054390Z" level=info msg="CreateContainer within sandbox \"e36653d8c5d552a24f1d608f0c55b698fdd3f07242642365c4d5ed8aa04ba629\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"57e1171bc95941a6d3e1f22f69cf8967f780b09657000e86605a6addb364fd47\"" Feb 12 22:23:22.344842 env[1557]: time="2024-02-12T22:23:22.342785581Z" level=info msg="StartContainer for \"57e1171bc95941a6d3e1f22f69cf8967f780b09657000e86605a6addb364fd47\"" Feb 12 22:23:22.364012 systemd[1]: Started cri-containerd-57e1171bc95941a6d3e1f22f69cf8967f780b09657000e86605a6addb364fd47.scope. Feb 12 22:23:22.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.384000 audit: BPF prog-id=126 op=LOAD Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2993 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:22.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537653131373162633935393431613664336531663232663639636638 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2993 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:22.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537653131373162633935393431613664336531663232663639636638 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit: BPF prog-id=127 op=LOAD Feb 12 22:23:22.385000 audit[3143]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c8120 items=0 ppid=2993 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:22.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537653131373162633935393431613664336531663232663639636638 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit: BPF prog-id=128 op=LOAD Feb 12 22:23:22.385000 audit[3143]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c8168 items=0 ppid=2993 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:22.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537653131373162633935393431613664336531663232663639636638 Feb 12 22:23:22.385000 audit: BPF prog-id=128 op=UNLOAD Feb 12 22:23:22.385000 audit: BPF prog-id=127 op=UNLOAD Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { perfmon } for pid=3143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit[3143]: AVC avc: denied { bpf } for pid=3143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:22.385000 audit: BPF prog-id=129 op=LOAD Feb 12 22:23:22.385000 audit[3143]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c8578 items=0 ppid=2993 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:22.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537653131373162633935393431613664336531663232663639636638 Feb 12 22:23:22.408313 env[1557]: time="2024-02-12T22:23:22.408265306Z" level=info msg="StartContainer for \"57e1171bc95941a6d3e1f22f69cf8967f780b09657000e86605a6addb364fd47\" returns successfully" Feb 12 22:23:22.822500 kubelet[2807]: I0212 22:23:22.822468 2807 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-pdpj5" podStartSLOduration=4.822422424 pod.CreationTimestamp="2024-02-12 22:23:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:23:18.818735224 +0000 UTC m=+14.339154466" watchObservedRunningTime="2024-02-12 22:23:22.822422424 +0000 UTC m=+18.342841668" Feb 12 22:23:24.594888 kernel: kauditd_printk_skb: 336 callbacks suppressed Feb 12 22:23:24.595054 kernel: audit: type=1325 audit(1707776604.589:1116): table=filter:103 family=2 entries=13 op=nft_register_rule pid=3203 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:23:24.589000 audit[3203]: NETFILTER_CFG table=filter:103 family=2 entries=13 op=nft_register_rule pid=3203 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:23:24.589000 audit[3203]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7fffbfdff560 a2=0 a3=7fffbfdff54c items=0 ppid=2972 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:24.604888 kernel: audit: type=1300 audit(1707776604.589:1116): arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7fffbfdff560 a2=0 a3=7fffbfdff54c items=0 ppid=2972 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:24.609077 kernel: audit: type=1327 audit(1707776604.589:1116): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:23:24.589000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:23:24.608000 audit[3203]: NETFILTER_CFG table=nat:104 family=2 entries=20 op=nft_register_rule pid=3203 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:23:24.613880 kernel: audit: type=1325 audit(1707776604.608:1117): table=nat:104 family=2 entries=20 op=nft_register_rule pid=3203 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:23:24.608000 audit[3203]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fffbfdff560 a2=0 a3=7fffbfdff54c items=0 ppid=2972 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:24.624237 kernel: audit: type=1300 audit(1707776604.608:1117): arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fffbfdff560 a2=0 a3=7fffbfdff54c items=0 ppid=2972 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:24.624560 kernel: audit: type=1327 audit(1707776604.608:1117): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:23:24.608000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:23:24.689000 audit[3229]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=3229 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:23:24.695886 kernel: audit: type=1325 audit(1707776604.689:1118): table=filter:105 family=2 entries=14 op=nft_register_rule pid=3229 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:23:24.689000 audit[3229]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffe890b9ea0 a2=0 a3=7ffe890b9e8c items=0 ppid=2972 pid=3229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:24.703882 kernel: audit: type=1300 audit(1707776604.689:1118): arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffe890b9ea0 a2=0 a3=7ffe890b9e8c items=0 ppid=2972 pid=3229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:24.689000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:23:24.708896 kernel: audit: type=1327 audit(1707776604.689:1118): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:23:24.706000 audit[3229]: NETFILTER_CFG table=nat:106 family=2 entries=20 op=nft_register_rule pid=3229 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:23:24.712526 kubelet[2807]: I0212 22:23:24.711911 2807 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-cfc98749c-fqsf2" podStartSLOduration=-9.22337203014299e+09 pod.CreationTimestamp="2024-02-12 22:23:18 +0000 UTC" firstStartedPulling="2024-02-12 22:23:18.838503903 +0000 UTC m=+14.358923123" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:23:22.825315719 +0000 UTC m=+18.345734962" watchObservedRunningTime="2024-02-12 22:23:24.711786432 +0000 UTC m=+20.232205671" Feb 12 22:23:24.713080 kernel: audit: type=1325 audit(1707776604.706:1119): table=nat:106 family=2 entries=20 op=nft_register_rule pid=3229 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:23:24.706000 audit[3229]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe890b9ea0 a2=0 a3=7ffe890b9e8c items=0 ppid=2972 pid=3229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:24.706000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:23:24.722233 kubelet[2807]: I0212 22:23:24.722195 2807 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:23:24.730011 systemd[1]: Created slice kubepods-besteffort-podb4fe4338_b00a_428d_90ed_b94e4892d56a.slice. Feb 12 22:23:24.732797 kubelet[2807]: W0212 22:23:24.732754 2807 reflector.go:424] object-"calico-system"/"typha-certs": failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:ip-172-31-25-241" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ip-172-31-25-241' and this object Feb 12 22:23:24.732935 kubelet[2807]: E0212 22:23:24.732824 2807 reflector.go:140] object-"calico-system"/"typha-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:ip-172-31-25-241" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ip-172-31-25-241' and this object Feb 12 22:23:24.732935 kubelet[2807]: W0212 22:23:24.732925 2807 reflector.go:424] object-"calico-system"/"tigera-ca-bundle": failed to list *v1.ConfigMap: configmaps "tigera-ca-bundle" is forbidden: User "system:node:ip-172-31-25-241" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ip-172-31-25-241' and this object Feb 12 22:23:24.733069 kubelet[2807]: E0212 22:23:24.732941 2807 reflector.go:140] object-"calico-system"/"tigera-ca-bundle": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "tigera-ca-bundle" is forbidden: User "system:node:ip-172-31-25-241" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ip-172-31-25-241' and this object Feb 12 22:23:24.733069 kubelet[2807]: W0212 22:23:24.733026 2807 reflector.go:424] object-"calico-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ip-172-31-25-241" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ip-172-31-25-241' and this object Feb 12 22:23:24.733069 kubelet[2807]: E0212 22:23:24.733057 2807 reflector.go:140] object-"calico-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ip-172-31-25-241" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ip-172-31-25-241' and this object Feb 12 22:23:24.770649 kubelet[2807]: I0212 22:23:24.770606 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rkrhg\" (UniqueName: \"kubernetes.io/projected/b4fe4338-b00a-428d-90ed-b94e4892d56a-kube-api-access-rkrhg\") pod \"calico-typha-987968857-vx2zn\" (UID: \"b4fe4338-b00a-428d-90ed-b94e4892d56a\") " pod="calico-system/calico-typha-987968857-vx2zn" Feb 12 22:23:24.771014 kubelet[2807]: I0212 22:23:24.770997 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/b4fe4338-b00a-428d-90ed-b94e4892d56a-typha-certs\") pod \"calico-typha-987968857-vx2zn\" (UID: \"b4fe4338-b00a-428d-90ed-b94e4892d56a\") " pod="calico-system/calico-typha-987968857-vx2zn" Feb 12 22:23:24.771321 kubelet[2807]: I0212 22:23:24.771290 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b4fe4338-b00a-428d-90ed-b94e4892d56a-tigera-ca-bundle\") pod \"calico-typha-987968857-vx2zn\" (UID: \"b4fe4338-b00a-428d-90ed-b94e4892d56a\") " pod="calico-system/calico-typha-987968857-vx2zn" Feb 12 22:23:24.868123 kubelet[2807]: I0212 22:23:24.867907 2807 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:23:24.876697 systemd[1]: Created slice kubepods-besteffort-pod6b43e1ad_4613_4ae1_a4cc_048014faf9f1.slice. Feb 12 22:23:24.972354 kubelet[2807]: I0212 22:23:24.972286 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6b43e1ad-4613-4ae1-a4cc-048014faf9f1-var-lib-calico\") pod \"calico-node-m8n47\" (UID: \"6b43e1ad-4613-4ae1-a4cc-048014faf9f1\") " pod="calico-system/calico-node-m8n47" Feb 12 22:23:24.972555 kubelet[2807]: I0212 22:23:24.972389 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6b43e1ad-4613-4ae1-a4cc-048014faf9f1-tigera-ca-bundle\") pod \"calico-node-m8n47\" (UID: \"6b43e1ad-4613-4ae1-a4cc-048014faf9f1\") " pod="calico-system/calico-node-m8n47" Feb 12 22:23:24.972555 kubelet[2807]: I0212 22:23:24.972445 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6b43e1ad-4613-4ae1-a4cc-048014faf9f1-lib-modules\") pod \"calico-node-m8n47\" (UID: \"6b43e1ad-4613-4ae1-a4cc-048014faf9f1\") " pod="calico-system/calico-node-m8n47" Feb 12 22:23:24.972555 kubelet[2807]: I0212 22:23:24.972473 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/6b43e1ad-4613-4ae1-a4cc-048014faf9f1-cni-log-dir\") pod \"calico-node-m8n47\" (UID: \"6b43e1ad-4613-4ae1-a4cc-048014faf9f1\") " pod="calico-system/calico-node-m8n47" Feb 12 22:23:24.972555 kubelet[2807]: I0212 22:23:24.972525 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/6b43e1ad-4613-4ae1-a4cc-048014faf9f1-flexvol-driver-host\") pod \"calico-node-m8n47\" (UID: \"6b43e1ad-4613-4ae1-a4cc-048014faf9f1\") " pod="calico-system/calico-node-m8n47" Feb 12 22:23:24.972772 kubelet[2807]: I0212 22:23:24.972592 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/6b43e1ad-4613-4ae1-a4cc-048014faf9f1-var-run-calico\") pod \"calico-node-m8n47\" (UID: \"6b43e1ad-4613-4ae1-a4cc-048014faf9f1\") " pod="calico-system/calico-node-m8n47" Feb 12 22:23:24.972772 kubelet[2807]: I0212 22:23:24.972623 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/6b43e1ad-4613-4ae1-a4cc-048014faf9f1-cni-bin-dir\") pod \"calico-node-m8n47\" (UID: \"6b43e1ad-4613-4ae1-a4cc-048014faf9f1\") " pod="calico-system/calico-node-m8n47" Feb 12 22:23:24.972772 kubelet[2807]: I0212 22:23:24.972740 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mhhtm\" (UniqueName: \"kubernetes.io/projected/6b43e1ad-4613-4ae1-a4cc-048014faf9f1-kube-api-access-mhhtm\") pod \"calico-node-m8n47\" (UID: \"6b43e1ad-4613-4ae1-a4cc-048014faf9f1\") " pod="calico-system/calico-node-m8n47" Feb 12 22:23:24.972926 kubelet[2807]: I0212 22:23:24.972800 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/6b43e1ad-4613-4ae1-a4cc-048014faf9f1-node-certs\") pod \"calico-node-m8n47\" (UID: \"6b43e1ad-4613-4ae1-a4cc-048014faf9f1\") " pod="calico-system/calico-node-m8n47" Feb 12 22:23:24.972926 kubelet[2807]: I0212 22:23:24.972832 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/6b43e1ad-4613-4ae1-a4cc-048014faf9f1-cni-net-dir\") pod \"calico-node-m8n47\" (UID: \"6b43e1ad-4613-4ae1-a4cc-048014faf9f1\") " pod="calico-system/calico-node-m8n47" Feb 12 22:23:24.973108 kubelet[2807]: I0212 22:23:24.972949 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6b43e1ad-4613-4ae1-a4cc-048014faf9f1-xtables-lock\") pod \"calico-node-m8n47\" (UID: \"6b43e1ad-4613-4ae1-a4cc-048014faf9f1\") " pod="calico-system/calico-node-m8n47" Feb 12 22:23:24.973108 kubelet[2807]: I0212 22:23:24.972983 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/6b43e1ad-4613-4ae1-a4cc-048014faf9f1-policysync\") pod \"calico-node-m8n47\" (UID: \"6b43e1ad-4613-4ae1-a4cc-048014faf9f1\") " pod="calico-system/calico-node-m8n47" Feb 12 22:23:24.989485 kubelet[2807]: I0212 22:23:24.989304 2807 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:23:24.989791 kubelet[2807]: E0212 22:23:24.989771 2807 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4qkdf" podUID=2196ea8e-c0da-421e-83bb-4ead3cb0e76b Feb 12 22:23:25.073729 kubelet[2807]: I0212 22:23:25.073695 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/2196ea8e-c0da-421e-83bb-4ead3cb0e76b-varrun\") pod \"csi-node-driver-4qkdf\" (UID: \"2196ea8e-c0da-421e-83bb-4ead3cb0e76b\") " pod="calico-system/csi-node-driver-4qkdf" Feb 12 22:23:25.074001 kubelet[2807]: I0212 22:23:25.073749 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/2196ea8e-c0da-421e-83bb-4ead3cb0e76b-registration-dir\") pod \"csi-node-driver-4qkdf\" (UID: \"2196ea8e-c0da-421e-83bb-4ead3cb0e76b\") " pod="calico-system/csi-node-driver-4qkdf" Feb 12 22:23:25.074001 kubelet[2807]: I0212 22:23:25.073778 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dw5m7\" (UniqueName: \"kubernetes.io/projected/2196ea8e-c0da-421e-83bb-4ead3cb0e76b-kube-api-access-dw5m7\") pod \"csi-node-driver-4qkdf\" (UID: \"2196ea8e-c0da-421e-83bb-4ead3cb0e76b\") " pod="calico-system/csi-node-driver-4qkdf" Feb 12 22:23:25.074001 kubelet[2807]: I0212 22:23:25.073973 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/2196ea8e-c0da-421e-83bb-4ead3cb0e76b-socket-dir\") pod \"csi-node-driver-4qkdf\" (UID: \"2196ea8e-c0da-421e-83bb-4ead3cb0e76b\") " pod="calico-system/csi-node-driver-4qkdf" Feb 12 22:23:25.074164 kubelet[2807]: I0212 22:23:25.074057 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/2196ea8e-c0da-421e-83bb-4ead3cb0e76b-kubelet-dir\") pod \"csi-node-driver-4qkdf\" (UID: \"2196ea8e-c0da-421e-83bb-4ead3cb0e76b\") " pod="calico-system/csi-node-driver-4qkdf" Feb 12 22:23:25.137798 kubelet[2807]: E0212 22:23:25.137716 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.138115 kubelet[2807]: W0212 22:23:25.138093 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.138228 kubelet[2807]: E0212 22:23:25.138216 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.175611 kubelet[2807]: E0212 22:23:25.175585 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.177351 kubelet[2807]: W0212 22:23:25.177326 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.177514 kubelet[2807]: E0212 22:23:25.177502 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.178286 kubelet[2807]: E0212 22:23:25.178271 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.178403 kubelet[2807]: W0212 22:23:25.178391 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.178483 kubelet[2807]: E0212 22:23:25.178475 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.178771 kubelet[2807]: E0212 22:23:25.178759 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.180516 kubelet[2807]: W0212 22:23:25.180495 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.180692 kubelet[2807]: E0212 22:23:25.180682 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.182506 kubelet[2807]: E0212 22:23:25.182493 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.182629 kubelet[2807]: W0212 22:23:25.182617 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.182735 kubelet[2807]: E0212 22:23:25.182727 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.184646 kubelet[2807]: E0212 22:23:25.184633 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.186140 kubelet[2807]: W0212 22:23:25.186121 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.186351 kubelet[2807]: E0212 22:23:25.186334 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.186521 kubelet[2807]: E0212 22:23:25.186512 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.187091 kubelet[2807]: W0212 22:23:25.187075 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.187292 kubelet[2807]: E0212 22:23:25.187277 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.187418 kubelet[2807]: E0212 22:23:25.187409 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.187495 kubelet[2807]: W0212 22:23:25.187486 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.187655 kubelet[2807]: E0212 22:23:25.187641 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.187791 kubelet[2807]: E0212 22:23:25.187783 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.187880 kubelet[2807]: W0212 22:23:25.187868 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.188124 kubelet[2807]: E0212 22:23:25.188110 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.188452 kubelet[2807]: E0212 22:23:25.188441 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.188540 kubelet[2807]: W0212 22:23:25.188530 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.189810 kubelet[2807]: E0212 22:23:25.189797 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.189923 kubelet[2807]: W0212 22:23:25.189911 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.192886 kubelet[2807]: E0212 22:23:25.191388 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.192886 kubelet[2807]: E0212 22:23:25.191418 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.193165 kubelet[2807]: E0212 22:23:25.193153 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.193246 kubelet[2807]: W0212 22:23:25.193236 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.193332 kubelet[2807]: E0212 22:23:25.193324 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.194044 kubelet[2807]: E0212 22:23:25.194029 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.194163 kubelet[2807]: W0212 22:23:25.194150 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.194327 kubelet[2807]: E0212 22:23:25.194317 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.195968 kubelet[2807]: E0212 22:23:25.195955 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.196075 kubelet[2807]: W0212 22:23:25.196063 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.196234 kubelet[2807]: E0212 22:23:25.196224 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.196515 kubelet[2807]: E0212 22:23:25.196503 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.196669 kubelet[2807]: W0212 22:23:25.196656 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.196819 kubelet[2807]: E0212 22:23:25.196811 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.197144 kubelet[2807]: E0212 22:23:25.197134 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.197233 kubelet[2807]: W0212 22:23:25.197223 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.197370 kubelet[2807]: E0212 22:23:25.197362 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.197601 kubelet[2807]: E0212 22:23:25.197592 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.197684 kubelet[2807]: W0212 22:23:25.197674 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.197831 kubelet[2807]: E0212 22:23:25.197818 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.198356 kubelet[2807]: E0212 22:23:25.198342 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.198464 kubelet[2807]: W0212 22:23:25.198452 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.198570 kubelet[2807]: E0212 22:23:25.198553 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.199933 kubelet[2807]: E0212 22:23:25.199920 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.200038 kubelet[2807]: W0212 22:23:25.200027 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.200136 kubelet[2807]: E0212 22:23:25.200122 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.200662 kubelet[2807]: E0212 22:23:25.200649 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.200759 kubelet[2807]: W0212 22:23:25.200748 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.200955 kubelet[2807]: E0212 22:23:25.200945 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.201197 kubelet[2807]: E0212 22:23:25.201188 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.201299 kubelet[2807]: W0212 22:23:25.201289 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.201433 kubelet[2807]: E0212 22:23:25.201425 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.202337 kubelet[2807]: E0212 22:23:25.202322 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.202451 kubelet[2807]: W0212 22:23:25.202438 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.202645 kubelet[2807]: E0212 22:23:25.202630 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.203057 kubelet[2807]: E0212 22:23:25.203046 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.203152 kubelet[2807]: W0212 22:23:25.203141 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.203289 kubelet[2807]: E0212 22:23:25.203281 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.203665 kubelet[2807]: E0212 22:23:25.203654 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.203883 kubelet[2807]: W0212 22:23:25.203850 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.204045 kubelet[2807]: E0212 22:23:25.204036 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.204285 kubelet[2807]: E0212 22:23:25.204276 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.204374 kubelet[2807]: W0212 22:23:25.204363 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.204577 kubelet[2807]: E0212 22:23:25.204566 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.205787 kubelet[2807]: E0212 22:23:25.205774 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.207949 kubelet[2807]: W0212 22:23:25.207928 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.208072 kubelet[2807]: E0212 22:23:25.208062 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.208755 kubelet[2807]: E0212 22:23:25.208345 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.208910 kubelet[2807]: W0212 22:23:25.208894 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.208998 kubelet[2807]: E0212 22:23:25.208989 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.209274 kubelet[2807]: E0212 22:23:25.209264 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.209357 kubelet[2807]: W0212 22:23:25.209347 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.209547 kubelet[2807]: E0212 22:23:25.209535 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.209902 kubelet[2807]: E0212 22:23:25.209887 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.209986 kubelet[2807]: W0212 22:23:25.209976 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.210065 kubelet[2807]: E0212 22:23:25.210057 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.210353 kubelet[2807]: E0212 22:23:25.210343 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.210430 kubelet[2807]: W0212 22:23:25.210420 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.210502 kubelet[2807]: E0212 22:23:25.210495 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.241147 kubelet[2807]: E0212 22:23:25.241124 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.241357 kubelet[2807]: W0212 22:23:25.241340 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.241452 kubelet[2807]: E0212 22:23:25.241434 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.305404 kubelet[2807]: E0212 22:23:25.305373 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.305404 kubelet[2807]: W0212 22:23:25.305394 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.305404 kubelet[2807]: E0212 22:23:25.305414 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.305903 kubelet[2807]: E0212 22:23:25.305885 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.305903 kubelet[2807]: W0212 22:23:25.305902 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.305992 kubelet[2807]: E0212 22:23:25.305914 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.306113 kubelet[2807]: E0212 22:23:25.306101 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.306113 kubelet[2807]: W0212 22:23:25.306112 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.306178 kubelet[2807]: E0212 22:23:25.306122 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.306273 kubelet[2807]: E0212 22:23:25.306262 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.306273 kubelet[2807]: W0212 22:23:25.306272 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.306385 kubelet[2807]: E0212 22:23:25.306281 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.306415 kubelet[2807]: E0212 22:23:25.306411 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.306454 kubelet[2807]: W0212 22:23:25.306418 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.306454 kubelet[2807]: E0212 22:23:25.306426 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.306674 kubelet[2807]: E0212 22:23:25.306553 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.306708 kubelet[2807]: W0212 22:23:25.306680 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.306708 kubelet[2807]: E0212 22:23:25.306695 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.407482 kubelet[2807]: E0212 22:23:25.407374 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.407482 kubelet[2807]: W0212 22:23:25.407397 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.407482 kubelet[2807]: E0212 22:23:25.407424 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.409987 kubelet[2807]: E0212 22:23:25.409963 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.410142 kubelet[2807]: W0212 22:23:25.410125 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.410231 kubelet[2807]: E0212 22:23:25.410219 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.410553 kubelet[2807]: E0212 22:23:25.410541 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.410814 kubelet[2807]: W0212 22:23:25.410730 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.410929 kubelet[2807]: E0212 22:23:25.410918 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.411367 kubelet[2807]: E0212 22:23:25.411354 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.411472 kubelet[2807]: W0212 22:23:25.411459 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.411550 kubelet[2807]: E0212 22:23:25.411541 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.411828 kubelet[2807]: E0212 22:23:25.411816 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.411931 kubelet[2807]: W0212 22:23:25.411919 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.412036 kubelet[2807]: E0212 22:23:25.412027 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.412406 kubelet[2807]: E0212 22:23:25.412396 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.412478 kubelet[2807]: W0212 22:23:25.412470 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.412533 kubelet[2807]: E0212 22:23:25.412527 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.513073 kubelet[2807]: E0212 22:23:25.513037 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.513073 kubelet[2807]: W0212 22:23:25.513058 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.513073 kubelet[2807]: E0212 22:23:25.513083 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.513564 kubelet[2807]: E0212 22:23:25.513542 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.513564 kubelet[2807]: W0212 22:23:25.513558 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.513695 kubelet[2807]: E0212 22:23:25.513577 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.513940 kubelet[2807]: E0212 22:23:25.513922 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.513940 kubelet[2807]: W0212 22:23:25.513935 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.514076 kubelet[2807]: E0212 22:23:25.513953 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.514289 kubelet[2807]: E0212 22:23:25.514273 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.514289 kubelet[2807]: W0212 22:23:25.514286 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.514447 kubelet[2807]: E0212 22:23:25.514302 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.515169 kubelet[2807]: E0212 22:23:25.515153 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.515169 kubelet[2807]: W0212 22:23:25.515168 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.515302 kubelet[2807]: E0212 22:23:25.515185 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.515593 kubelet[2807]: E0212 22:23:25.515561 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.515593 kubelet[2807]: W0212 22:23:25.515583 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.515702 kubelet[2807]: E0212 22:23:25.515600 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.617497 kubelet[2807]: E0212 22:23:25.617470 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.617907 kubelet[2807]: W0212 22:23:25.617885 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.618027 kubelet[2807]: E0212 22:23:25.618015 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.618480 kubelet[2807]: E0212 22:23:25.618465 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.618602 kubelet[2807]: W0212 22:23:25.618588 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.618746 kubelet[2807]: E0212 22:23:25.618733 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.619112 kubelet[2807]: E0212 22:23:25.619097 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.619238 kubelet[2807]: W0212 22:23:25.619218 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.619388 kubelet[2807]: E0212 22:23:25.619376 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.619746 kubelet[2807]: E0212 22:23:25.619734 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.619956 kubelet[2807]: W0212 22:23:25.619941 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.620040 kubelet[2807]: E0212 22:23:25.620031 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.620327 kubelet[2807]: E0212 22:23:25.620316 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.620503 kubelet[2807]: W0212 22:23:25.620490 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.620577 kubelet[2807]: E0212 22:23:25.620570 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.620842 kubelet[2807]: E0212 22:23:25.620833 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.621031 kubelet[2807]: W0212 22:23:25.621017 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.621118 kubelet[2807]: E0212 22:23:25.621110 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.725025 kubelet[2807]: E0212 22:23:25.724923 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.725025 kubelet[2807]: W0212 22:23:25.724945 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.725025 kubelet[2807]: E0212 22:23:25.724969 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.736212 kubelet[2807]: E0212 22:23:25.736180 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.736212 kubelet[2807]: W0212 22:23:25.736207 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.736447 kubelet[2807]: E0212 22:23:25.736237 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.736537 kubelet[2807]: E0212 22:23:25.736517 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.736624 kubelet[2807]: W0212 22:23:25.736535 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.736624 kubelet[2807]: E0212 22:23:25.736574 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.736942 kubelet[2807]: E0212 22:23:25.736847 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.737108 kubelet[2807]: W0212 22:23:25.736943 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.737108 kubelet[2807]: E0212 22:23:25.736964 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.737523 kubelet[2807]: E0212 22:23:25.737503 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.737640 kubelet[2807]: W0212 22:23:25.737523 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.737640 kubelet[2807]: E0212 22:23:25.737554 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.738198 kubelet[2807]: E0212 22:23:25.738178 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.738198 kubelet[2807]: W0212 22:23:25.738196 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.738415 kubelet[2807]: E0212 22:23:25.738214 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.820000 audit[3318]: NETFILTER_CFG table=filter:107 family=2 entries=14 op=nft_register_rule pid=3318 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:23:25.820000 audit[3318]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffebe692870 a2=0 a3=7ffebe69285c items=0 ppid=2972 pid=3318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:25.820000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:23:25.822000 audit[3318]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=3318 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:23:25.822000 audit[3318]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffebe692870 a2=0 a3=7ffebe69285c items=0 ppid=2972 pid=3318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:25.822000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:23:25.839649 kubelet[2807]: E0212 22:23:25.839618 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.839649 kubelet[2807]: W0212 22:23:25.839642 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.839915 kubelet[2807]: E0212 22:23:25.839669 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.839982 kubelet[2807]: E0212 22:23:25.839936 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.839982 kubelet[2807]: W0212 22:23:25.839948 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.839982 kubelet[2807]: E0212 22:23:25.839965 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.840280 kubelet[2807]: E0212 22:23:25.840256 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.840280 kubelet[2807]: W0212 22:23:25.840272 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.840427 kubelet[2807]: E0212 22:23:25.840290 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.840522 kubelet[2807]: E0212 22:23:25.840502 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.840522 kubelet[2807]: W0212 22:23:25.840516 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.840750 kubelet[2807]: E0212 22:23:25.840532 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.840803 kubelet[2807]: E0212 22:23:25.840760 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.840803 kubelet[2807]: W0212 22:23:25.840769 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.840803 kubelet[2807]: E0212 22:23:25.840785 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.841393 kubelet[2807]: E0212 22:23:25.841373 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.841393 kubelet[2807]: W0212 22:23:25.841393 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.841539 kubelet[2807]: E0212 22:23:25.841410 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.880030 kubelet[2807]: E0212 22:23:25.879993 2807 configmap.go:199] Couldn't get configMap calico-system/tigera-ca-bundle: failed to sync configmap cache: timed out waiting for the condition Feb 12 22:23:25.880190 kubelet[2807]: E0212 22:23:25.880118 2807 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/b4fe4338-b00a-428d-90ed-b94e4892d56a-tigera-ca-bundle podName:b4fe4338-b00a-428d-90ed-b94e4892d56a nodeName:}" failed. No retries permitted until 2024-02-12 22:23:26.380082676 +0000 UTC m=+21.900501913 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "tigera-ca-bundle" (UniqueName: "kubernetes.io/configmap/b4fe4338-b00a-428d-90ed-b94e4892d56a-tigera-ca-bundle") pod "calico-typha-987968857-vx2zn" (UID: "b4fe4338-b00a-428d-90ed-b94e4892d56a") : failed to sync configmap cache: timed out waiting for the condition Feb 12 22:23:25.881783 kubelet[2807]: E0212 22:23:25.881738 2807 secret.go:194] Couldn't get secret calico-system/typha-certs: failed to sync secret cache: timed out waiting for the condition Feb 12 22:23:25.881931 kubelet[2807]: E0212 22:23:25.881836 2807 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/b4fe4338-b00a-428d-90ed-b94e4892d56a-typha-certs podName:b4fe4338-b00a-428d-90ed-b94e4892d56a nodeName:}" failed. No retries permitted until 2024-02-12 22:23:26.38181428 +0000 UTC m=+21.902233520 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "typha-certs" (UniqueName: "kubernetes.io/secret/b4fe4338-b00a-428d-90ed-b94e4892d56a-typha-certs") pod "calico-typha-987968857-vx2zn" (UID: "b4fe4338-b00a-428d-90ed-b94e4892d56a") : failed to sync secret cache: timed out waiting for the condition Feb 12 22:23:25.942431 kubelet[2807]: E0212 22:23:25.942407 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.942589 kubelet[2807]: W0212 22:23:25.942573 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.942685 kubelet[2807]: E0212 22:23:25.942673 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.943112 kubelet[2807]: E0212 22:23:25.943098 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.943201 kubelet[2807]: W0212 22:23:25.943190 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.943275 kubelet[2807]: E0212 22:23:25.943267 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.943596 kubelet[2807]: E0212 22:23:25.943584 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.943680 kubelet[2807]: W0212 22:23:25.943671 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.943797 kubelet[2807]: E0212 22:23:25.943788 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.944255 kubelet[2807]: E0212 22:23:25.944191 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.944336 kubelet[2807]: W0212 22:23:25.944325 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.944394 kubelet[2807]: E0212 22:23:25.944387 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.944686 kubelet[2807]: E0212 22:23:25.944676 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.944780 kubelet[2807]: W0212 22:23:25.944752 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.944832 kubelet[2807]: E0212 22:23:25.944826 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:25.945143 kubelet[2807]: E0212 22:23:25.945133 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:25.945233 kubelet[2807]: W0212 22:23:25.945221 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:25.945309 kubelet[2807]: E0212 22:23:25.945300 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.046588 kubelet[2807]: E0212 22:23:26.046562 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.046950 kubelet[2807]: W0212 22:23:26.046927 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.047069 kubelet[2807]: E0212 22:23:26.047058 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.047422 kubelet[2807]: E0212 22:23:26.047409 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.047525 kubelet[2807]: W0212 22:23:26.047513 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.047599 kubelet[2807]: E0212 22:23:26.047592 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.047883 kubelet[2807]: E0212 22:23:26.047872 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.047968 kubelet[2807]: W0212 22:23:26.047957 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.048036 kubelet[2807]: E0212 22:23:26.048029 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.048375 kubelet[2807]: E0212 22:23:26.048364 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.048458 kubelet[2807]: W0212 22:23:26.048448 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.048532 kubelet[2807]: E0212 22:23:26.048525 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.048773 kubelet[2807]: E0212 22:23:26.048766 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.048842 kubelet[2807]: W0212 22:23:26.048834 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.048943 kubelet[2807]: E0212 22:23:26.048935 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.049190 kubelet[2807]: E0212 22:23:26.049183 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.049276 kubelet[2807]: W0212 22:23:26.049267 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.049349 kubelet[2807]: E0212 22:23:26.049342 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.075513 kubelet[2807]: E0212 22:23:26.075484 2807 configmap.go:199] Couldn't get configMap calico-system/tigera-ca-bundle: failed to sync configmap cache: timed out waiting for the condition Feb 12 22:23:26.075813 kubelet[2807]: E0212 22:23:26.075799 2807 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/6b43e1ad-4613-4ae1-a4cc-048014faf9f1-tigera-ca-bundle podName:6b43e1ad-4613-4ae1-a4cc-048014faf9f1 nodeName:}" failed. No retries permitted until 2024-02-12 22:23:26.575763874 +0000 UTC m=+22.096183134 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "tigera-ca-bundle" (UniqueName: "kubernetes.io/configmap/6b43e1ad-4613-4ae1-a4cc-048014faf9f1-tigera-ca-bundle") pod "calico-node-m8n47" (UID: "6b43e1ad-4613-4ae1-a4cc-048014faf9f1") : failed to sync configmap cache: timed out waiting for the condition Feb 12 22:23:26.151006 kubelet[2807]: E0212 22:23:26.150975 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.151006 kubelet[2807]: W0212 22:23:26.151001 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.151308 kubelet[2807]: E0212 22:23:26.151028 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.151374 kubelet[2807]: E0212 22:23:26.151345 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.151374 kubelet[2807]: W0212 22:23:26.151357 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.151463 kubelet[2807]: E0212 22:23:26.151376 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.151619 kubelet[2807]: E0212 22:23:26.151596 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.151619 kubelet[2807]: W0212 22:23:26.151611 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.151735 kubelet[2807]: E0212 22:23:26.151627 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.151842 kubelet[2807]: E0212 22:23:26.151827 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.151914 kubelet[2807]: W0212 22:23:26.151842 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.151914 kubelet[2807]: E0212 22:23:26.151867 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.152091 kubelet[2807]: E0212 22:23:26.152077 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.152142 kubelet[2807]: W0212 22:23:26.152091 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.152142 kubelet[2807]: E0212 22:23:26.152107 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.152407 kubelet[2807]: E0212 22:23:26.152392 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.152471 kubelet[2807]: W0212 22:23:26.152408 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.152471 kubelet[2807]: E0212 22:23:26.152424 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.253618 kubelet[2807]: E0212 22:23:26.253590 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.253618 kubelet[2807]: W0212 22:23:26.253615 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.253829 kubelet[2807]: E0212 22:23:26.253640 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.253930 kubelet[2807]: E0212 22:23:26.253902 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.253930 kubelet[2807]: W0212 22:23:26.253913 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.253930 kubelet[2807]: E0212 22:23:26.253931 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.254223 kubelet[2807]: E0212 22:23:26.254207 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.254223 kubelet[2807]: W0212 22:23:26.254224 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.254331 kubelet[2807]: E0212 22:23:26.254241 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.254459 kubelet[2807]: E0212 22:23:26.254443 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.254513 kubelet[2807]: W0212 22:23:26.254460 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.254513 kubelet[2807]: E0212 22:23:26.254475 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.254685 kubelet[2807]: E0212 22:23:26.254668 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.254741 kubelet[2807]: W0212 22:23:26.254685 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.254741 kubelet[2807]: E0212 22:23:26.254700 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.254925 kubelet[2807]: E0212 22:23:26.254910 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.254999 kubelet[2807]: W0212 22:23:26.254926 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.254999 kubelet[2807]: E0212 22:23:26.254940 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.356532 kubelet[2807]: E0212 22:23:26.356250 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.356532 kubelet[2807]: W0212 22:23:26.356275 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.356532 kubelet[2807]: E0212 22:23:26.356487 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.356825 kubelet[2807]: E0212 22:23:26.356796 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.356825 kubelet[2807]: W0212 22:23:26.356807 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.356825 kubelet[2807]: E0212 22:23:26.356826 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.360705 kubelet[2807]: E0212 22:23:26.360681 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.360705 kubelet[2807]: W0212 22:23:26.360703 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.360873 kubelet[2807]: E0212 22:23:26.360724 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.361188 kubelet[2807]: E0212 22:23:26.361171 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.361277 kubelet[2807]: W0212 22:23:26.361189 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.361277 kubelet[2807]: E0212 22:23:26.361207 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.361611 kubelet[2807]: E0212 22:23:26.361595 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.361722 kubelet[2807]: W0212 22:23:26.361613 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.361722 kubelet[2807]: E0212 22:23:26.361669 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.362686 kubelet[2807]: E0212 22:23:26.362667 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.362686 kubelet[2807]: W0212 22:23:26.362681 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.362803 kubelet[2807]: E0212 22:23:26.362699 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.463825 kubelet[2807]: E0212 22:23:26.463794 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.463825 kubelet[2807]: W0212 22:23:26.463815 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.463825 kubelet[2807]: E0212 22:23:26.463839 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.464324 kubelet[2807]: E0212 22:23:26.464308 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.464403 kubelet[2807]: W0212 22:23:26.464326 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.464403 kubelet[2807]: E0212 22:23:26.464344 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.464626 kubelet[2807]: E0212 22:23:26.464607 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.464626 kubelet[2807]: W0212 22:23:26.464620 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.464745 kubelet[2807]: E0212 22:23:26.464642 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.464954 kubelet[2807]: E0212 22:23:26.464930 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.464954 kubelet[2807]: W0212 22:23:26.464949 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.465091 kubelet[2807]: E0212 22:23:26.464969 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.465260 kubelet[2807]: E0212 22:23:26.465241 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.465260 kubelet[2807]: W0212 22:23:26.465255 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.465387 kubelet[2807]: E0212 22:23:26.465275 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.465592 kubelet[2807]: E0212 22:23:26.465574 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.465592 kubelet[2807]: W0212 22:23:26.465589 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.465753 kubelet[2807]: E0212 22:23:26.465609 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.465943 kubelet[2807]: E0212 22:23:26.465921 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.465943 kubelet[2807]: W0212 22:23:26.465934 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.466048 kubelet[2807]: E0212 22:23:26.465955 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.466256 kubelet[2807]: E0212 22:23:26.466237 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.466256 kubelet[2807]: W0212 22:23:26.466250 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.466881 kubelet[2807]: E0212 22:23:26.466830 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.467060 kubelet[2807]: E0212 22:23:26.467042 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.467060 kubelet[2807]: W0212 22:23:26.467055 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.467164 kubelet[2807]: E0212 22:23:26.467076 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.467345 kubelet[2807]: E0212 22:23:26.467327 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.467345 kubelet[2807]: W0212 22:23:26.467339 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.467452 kubelet[2807]: E0212 22:23:26.467368 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.467616 kubelet[2807]: E0212 22:23:26.467599 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.467616 kubelet[2807]: W0212 22:23:26.467613 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.467724 kubelet[2807]: E0212 22:23:26.467640 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.467926 kubelet[2807]: E0212 22:23:26.467907 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.467926 kubelet[2807]: W0212 22:23:26.467922 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.468037 kubelet[2807]: E0212 22:23:26.467950 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.468219 kubelet[2807]: E0212 22:23:26.468202 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.468219 kubelet[2807]: W0212 22:23:26.468215 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.468340 kubelet[2807]: E0212 22:23:26.468247 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.468592 kubelet[2807]: E0212 22:23:26.468574 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.468592 kubelet[2807]: W0212 22:23:26.468587 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.468680 kubelet[2807]: E0212 22:23:26.468602 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.531326 kubelet[2807]: E0212 22:23:26.531304 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.531544 kubelet[2807]: W0212 22:23:26.531528 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.531671 kubelet[2807]: E0212 22:23:26.531660 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.544621 kubelet[2807]: E0212 22:23:26.541644 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.544621 kubelet[2807]: W0212 22:23:26.541665 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.544621 kubelet[2807]: E0212 22:23:26.541689 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.562259 kubelet[2807]: E0212 22:23:26.558396 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.562259 kubelet[2807]: W0212 22:23:26.558415 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.562259 kubelet[2807]: E0212 22:23:26.558440 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.566630 kubelet[2807]: E0212 22:23:26.566605 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.566818 kubelet[2807]: W0212 22:23:26.566803 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.566924 kubelet[2807]: E0212 22:23:26.566914 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.567930 kubelet[2807]: E0212 22:23:26.567903 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.568085 kubelet[2807]: W0212 22:23:26.568068 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.568286 kubelet[2807]: E0212 22:23:26.568274 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.568675 kubelet[2807]: E0212 22:23:26.568662 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.568805 kubelet[2807]: W0212 22:23:26.568791 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.568933 kubelet[2807]: E0212 22:23:26.568922 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.670550 kubelet[2807]: E0212 22:23:26.670452 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.670550 kubelet[2807]: W0212 22:23:26.670477 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.670550 kubelet[2807]: E0212 22:23:26.670502 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.670959 kubelet[2807]: E0212 22:23:26.670885 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.670959 kubelet[2807]: W0212 22:23:26.670895 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.670959 kubelet[2807]: E0212 22:23:26.670919 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.674508 kubelet[2807]: E0212 22:23:26.674485 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.674508 kubelet[2807]: W0212 22:23:26.674506 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.674917 kubelet[2807]: E0212 22:23:26.674567 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.675019 kubelet[2807]: E0212 22:23:26.675001 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.675072 kubelet[2807]: W0212 22:23:26.675018 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.675072 kubelet[2807]: E0212 22:23:26.675038 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.675256 kubelet[2807]: E0212 22:23:26.675242 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.675333 kubelet[2807]: W0212 22:23:26.675256 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.675333 kubelet[2807]: E0212 22:23:26.675274 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.675547 kubelet[2807]: E0212 22:23:26.675532 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.675621 kubelet[2807]: W0212 22:23:26.675548 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.675621 kubelet[2807]: E0212 22:23:26.675565 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.675933 kubelet[2807]: E0212 22:23:26.675910 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.675933 kubelet[2807]: W0212 22:23:26.675926 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.675933 kubelet[2807]: E0212 22:23:26.675953 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.712940 kubelet[2807]: E0212 22:23:26.712901 2807 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4qkdf" podUID=2196ea8e-c0da-421e-83bb-4ead3cb0e76b Feb 12 22:23:26.737715 kubelet[2807]: E0212 22:23:26.737684 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.737715 kubelet[2807]: W0212 22:23:26.737705 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.737715 kubelet[2807]: E0212 22:23:26.737730 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.740452 kubelet[2807]: E0212 22:23:26.740429 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.740452 kubelet[2807]: W0212 22:23:26.740450 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.740781 kubelet[2807]: E0212 22:23:26.740472 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.775699 kubelet[2807]: E0212 22:23:26.775675 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.775965 kubelet[2807]: W0212 22:23:26.775945 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.776122 kubelet[2807]: E0212 22:23:26.776110 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.876884 kubelet[2807]: E0212 22:23:26.876846 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.876884 kubelet[2807]: W0212 22:23:26.876881 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.877083 kubelet[2807]: E0212 22:23:26.876905 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.963527 kubelet[2807]: E0212 22:23:26.962053 2807 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 22:23:26.963708 kubelet[2807]: W0212 22:23:26.963688 2807 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 22:23:26.963793 kubelet[2807]: E0212 22:23:26.963784 2807 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 22:23:26.980693 env[1557]: time="2024-02-12T22:23:26.980649290Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-m8n47,Uid:6b43e1ad-4613-4ae1-a4cc-048014faf9f1,Namespace:calico-system,Attempt:0,}" Feb 12 22:23:27.090873 env[1557]: time="2024-02-12T22:23:27.090787321Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:23:27.091038 env[1557]: time="2024-02-12T22:23:27.090831241Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:23:27.091038 env[1557]: time="2024-02-12T22:23:27.090841903Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:23:27.091038 env[1557]: time="2024-02-12T22:23:27.091007729Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/626afd0e64daf003f1dcd28331e927a929cfecd40b6a2c14a9eb7c27eb67d067 pid=3400 runtime=io.containerd.runc.v2 Feb 12 22:23:27.103937 systemd[1]: Started cri-containerd-626afd0e64daf003f1dcd28331e927a929cfecd40b6a2c14a9eb7c27eb67d067.scope. Feb 12 22:23:27.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.131000 audit: BPF prog-id=130 op=LOAD Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3400 pid=3409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:27.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632366166643065363464616630303366316463643238333331653932 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3400 pid=3409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:27.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632366166643065363464616630303366316463643238333331653932 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit: BPF prog-id=131 op=LOAD Feb 12 22:23:27.132000 audit[3409]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001e3730 items=0 ppid=3400 pid=3409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:27.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632366166643065363464616630303366316463643238333331653932 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit: BPF prog-id=132 op=LOAD Feb 12 22:23:27.132000 audit[3409]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001e3778 items=0 ppid=3400 pid=3409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:27.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632366166643065363464616630303366316463643238333331653932 Feb 12 22:23:27.132000 audit: BPF prog-id=132 op=UNLOAD Feb 12 22:23:27.132000 audit: BPF prog-id=131 op=UNLOAD Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.132000 audit: BPF prog-id=133 op=LOAD Feb 12 22:23:27.132000 audit[3409]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001e3b88 items=0 ppid=3400 pid=3409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:27.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632366166643065363464616630303366316463643238333331653932 Feb 12 22:23:27.140595 env[1557]: time="2024-02-12T22:23:27.140563870Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-987968857-vx2zn,Uid:b4fe4338-b00a-428d-90ed-b94e4892d56a,Namespace:calico-system,Attempt:0,}" Feb 12 22:23:27.150561 env[1557]: time="2024-02-12T22:23:27.150528166Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-m8n47,Uid:6b43e1ad-4613-4ae1-a4cc-048014faf9f1,Namespace:calico-system,Attempt:0,} returns sandbox id \"626afd0e64daf003f1dcd28331e927a929cfecd40b6a2c14a9eb7c27eb67d067\"" Feb 12 22:23:27.153057 env[1557]: time="2024-02-12T22:23:27.151964761Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 22:23:27.174417 env[1557]: time="2024-02-12T22:23:27.174321271Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:23:27.174558 env[1557]: time="2024-02-12T22:23:27.174425094Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:23:27.174558 env[1557]: time="2024-02-12T22:23:27.174446495Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:23:27.174618 env[1557]: time="2024-02-12T22:23:27.174569683Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f4e0ff7f5418b2212ca80c1df9316ea25418a2332dd5cd4754064ed943d05db3 pid=3440 runtime=io.containerd.runc.v2 Feb 12 22:23:27.212230 systemd[1]: Started cri-containerd-f4e0ff7f5418b2212ca80c1df9316ea25418a2332dd5cd4754064ed943d05db3.scope. Feb 12 22:23:27.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.230000 audit: BPF prog-id=134 op=LOAD Feb 12 22:23:27.230000 audit[3450]: AVC avc: denied { bpf } for pid=3450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.230000 audit[3450]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3440 pid=3450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:27.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634653066663766353431386232323132636138306331646639333136 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit[3450]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3440 pid=3450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:27.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634653066663766353431386232323132636138306331646639333136 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { bpf } for pid=3450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { bpf } for pid=3450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { bpf } for pid=3450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { bpf } for pid=3450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { bpf } for pid=3450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit: BPF prog-id=135 op=LOAD Feb 12 22:23:27.231000 audit[3450]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003830c0 items=0 ppid=3440 pid=3450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:27.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634653066663766353431386232323132636138306331646639333136 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { bpf } for pid=3450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { bpf } for pid=3450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { bpf } for pid=3450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { bpf } for pid=3450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit: BPF prog-id=136 op=LOAD Feb 12 22:23:27.231000 audit[3450]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000383108 items=0 ppid=3440 pid=3450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:27.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634653066663766353431386232323132636138306331646639333136 Feb 12 22:23:27.231000 audit: BPF prog-id=136 op=UNLOAD Feb 12 22:23:27.231000 audit: BPF prog-id=135 op=UNLOAD Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { bpf } for pid=3450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { bpf } for pid=3450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { bpf } for pid=3450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { perfmon } for pid=3450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { bpf } for pid=3450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit[3450]: AVC avc: denied { bpf } for pid=3450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:27.231000 audit: BPF prog-id=137 op=LOAD Feb 12 22:23:27.231000 audit[3450]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000383518 items=0 ppid=3440 pid=3450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:27.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634653066663766353431386232323132636138306331646639333136 Feb 12 22:23:27.273852 env[1557]: time="2024-02-12T22:23:27.273525220Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-987968857-vx2zn,Uid:b4fe4338-b00a-428d-90ed-b94e4892d56a,Namespace:calico-system,Attempt:0,} returns sandbox id \"f4e0ff7f5418b2212ca80c1df9316ea25418a2332dd5cd4754064ed943d05db3\"" Feb 12 22:23:28.713492 kubelet[2807]: E0212 22:23:28.713169 2807 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4qkdf" podUID=2196ea8e-c0da-421e-83bb-4ead3cb0e76b Feb 12 22:23:30.587070 env[1557]: time="2024-02-12T22:23:30.587018074Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:23:30.590548 env[1557]: time="2024-02-12T22:23:30.590502329Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:23:30.594032 env[1557]: time="2024-02-12T22:23:30.593990389Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:23:30.597755 env[1557]: time="2024-02-12T22:23:30.597718766Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:23:30.598850 env[1557]: time="2024-02-12T22:23:30.598739618Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 12 22:23:30.601287 env[1557]: time="2024-02-12T22:23:30.601255285Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 12 22:23:30.603532 env[1557]: time="2024-02-12T22:23:30.603494443Z" level=info msg="CreateContainer within sandbox \"626afd0e64daf003f1dcd28331e927a929cfecd40b6a2c14a9eb7c27eb67d067\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 22:23:30.627087 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1436111494.mount: Deactivated successfully. Feb 12 22:23:30.712885 kubelet[2807]: E0212 22:23:30.712724 2807 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4qkdf" podUID=2196ea8e-c0da-421e-83bb-4ead3cb0e76b Feb 12 22:23:30.718709 env[1557]: time="2024-02-12T22:23:30.718649149Z" level=info msg="CreateContainer within sandbox \"626afd0e64daf003f1dcd28331e927a929cfecd40b6a2c14a9eb7c27eb67d067\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"bb0590a791c59bc24c592a5d1a62cf7084c95e8f828ce66512fddd70293b445d\"" Feb 12 22:23:30.719527 env[1557]: time="2024-02-12T22:23:30.719384025Z" level=info msg="StartContainer for \"bb0590a791c59bc24c592a5d1a62cf7084c95e8f828ce66512fddd70293b445d\"" Feb 12 22:23:30.761691 systemd[1]: Started cri-containerd-bb0590a791c59bc24c592a5d1a62cf7084c95e8f828ce66512fddd70293b445d.scope. Feb 12 22:23:30.796002 kernel: kauditd_printk_skb: 122 callbacks suppressed Feb 12 22:23:30.796199 kernel: audit: type=1400 audit(1707776610.781:1158): avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.796256 kernel: audit: type=1300 audit(1707776610.781:1158): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f90282eaa88 items=0 ppid=3400 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:30.781000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.781000 audit[3481]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f90282eaa88 items=0 ppid=3400 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:30.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262303539306137393163353962633234633539326135643161363263 Feb 12 22:23:30.810634 kernel: audit: type=1327 audit(1707776610.781:1158): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262303539306137393163353962633234633539326135643161363263 Feb 12 22:23:30.781000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.818609 kernel: audit: type=1400 audit(1707776610.781:1159): avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.818727 kernel: audit: type=1400 audit(1707776610.781:1159): avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.781000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.828249 kernel: audit: type=1400 audit(1707776610.781:1159): avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.781000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.781000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.833932 kernel: audit: type=1400 audit(1707776610.781:1159): avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.834072 kernel: audit: type=1400 audit(1707776610.781:1159): avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.781000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.781000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.846062 kernel: audit: type=1400 audit(1707776610.781:1159): avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.781000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.859989 env[1557]: time="2024-02-12T22:23:30.855552555Z" level=info msg="StartContainer for \"bb0590a791c59bc24c592a5d1a62cf7084c95e8f828ce66512fddd70293b445d\" returns successfully" Feb 12 22:23:30.781000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.781000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.781000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.781000 audit: BPF prog-id=138 op=LOAD Feb 12 22:23:30.781000 audit[3481]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000358388 items=0 ppid=3400 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:30.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262303539306137393163353962633234633539326135643161363263 Feb 12 22:23:30.787000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.863881 kernel: audit: type=1400 audit(1707776610.781:1159): avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.787000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.787000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.787000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.787000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.787000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.787000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.787000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.787000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.787000 audit: BPF prog-id=139 op=LOAD Feb 12 22:23:30.787000 audit[3481]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003583d8 items=0 ppid=3400 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:30.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262303539306137393163353962633234633539326135643161363263 Feb 12 22:23:30.794000 audit: BPF prog-id=139 op=UNLOAD Feb 12 22:23:30.794000 audit: BPF prog-id=138 op=UNLOAD Feb 12 22:23:30.794000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.794000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.794000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.794000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.794000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.794000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.794000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.794000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.794000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.794000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:30.794000 audit: BPF prog-id=140 op=LOAD Feb 12 22:23:30.794000 audit[3481]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000358468 items=0 ppid=3400 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:30.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262303539306137393163353962633234633539326135643161363263 Feb 12 22:23:30.876397 systemd[1]: cri-containerd-bb0590a791c59bc24c592a5d1a62cf7084c95e8f828ce66512fddd70293b445d.scope: Deactivated successfully. Feb 12 22:23:30.877000 audit: BPF prog-id=140 op=UNLOAD Feb 12 22:23:30.904554 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-bb0590a791c59bc24c592a5d1a62cf7084c95e8f828ce66512fddd70293b445d-rootfs.mount: Deactivated successfully. Feb 12 22:23:31.166696 env[1557]: time="2024-02-12T22:23:31.166579805Z" level=info msg="shim disconnected" id=bb0590a791c59bc24c592a5d1a62cf7084c95e8f828ce66512fddd70293b445d Feb 12 22:23:31.167006 env[1557]: time="2024-02-12T22:23:31.166980214Z" level=warning msg="cleaning up after shim disconnected" id=bb0590a791c59bc24c592a5d1a62cf7084c95e8f828ce66512fddd70293b445d namespace=k8s.io Feb 12 22:23:31.167113 env[1557]: time="2024-02-12T22:23:31.167095934Z" level=info msg="cleaning up dead shim" Feb 12 22:23:31.179209 env[1557]: time="2024-02-12T22:23:31.179163198Z" level=warning msg="cleanup warnings time=\"2024-02-12T22:23:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3519 runtime=io.containerd.runc.v2\n" Feb 12 22:23:32.175535 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount888113187.mount: Deactivated successfully. Feb 12 22:23:32.712977 kubelet[2807]: E0212 22:23:32.712579 2807 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4qkdf" podUID=2196ea8e-c0da-421e-83bb-4ead3cb0e76b Feb 12 22:23:34.715566 kubelet[2807]: E0212 22:23:34.715529 2807 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4qkdf" podUID=2196ea8e-c0da-421e-83bb-4ead3cb0e76b Feb 12 22:23:35.084781 env[1557]: time="2024-02-12T22:23:35.084736203Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:23:35.087965 env[1557]: time="2024-02-12T22:23:35.087926873Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:23:35.090827 env[1557]: time="2024-02-12T22:23:35.090786973Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:23:35.093351 env[1557]: time="2024-02-12T22:23:35.093297563Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:23:35.094574 env[1557]: time="2024-02-12T22:23:35.094537337Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 12 22:23:35.097529 env[1557]: time="2024-02-12T22:23:35.096233994Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 22:23:35.112063 env[1557]: time="2024-02-12T22:23:35.112020292Z" level=info msg="CreateContainer within sandbox \"f4e0ff7f5418b2212ca80c1df9316ea25418a2332dd5cd4754064ed943d05db3\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 12 22:23:35.128599 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4077566727.mount: Deactivated successfully. Feb 12 22:23:35.137880 env[1557]: time="2024-02-12T22:23:35.137814486Z" level=info msg="CreateContainer within sandbox \"f4e0ff7f5418b2212ca80c1df9316ea25418a2332dd5cd4754064ed943d05db3\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"b145c34168e31bc54055f6e5e18230aded4e37d4c7c84b03c43c34379022f50b\"" Feb 12 22:23:35.141082 env[1557]: time="2024-02-12T22:23:35.138900104Z" level=info msg="StartContainer for \"b145c34168e31bc54055f6e5e18230aded4e37d4c7c84b03c43c34379022f50b\"" Feb 12 22:23:35.171522 systemd[1]: Started cri-containerd-b145c34168e31bc54055f6e5e18230aded4e37d4c7c84b03c43c34379022f50b.scope. Feb 12 22:23:35.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.197000 audit: BPF prog-id=141 op=LOAD Feb 12 22:23:35.198000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.198000 audit[3544]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3440 pid=3544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:35.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231343563333431363865333162633534303535663665356531383233 Feb 12 22:23:35.199000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.199000 audit[3544]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3440 pid=3544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:35.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231343563333431363865333162633534303535663665356531383233 Feb 12 22:23:35.199000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.199000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.199000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.199000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.199000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.199000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.199000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.199000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.199000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.199000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.199000 audit: BPF prog-id=142 op=LOAD Feb 12 22:23:35.199000 audit[3544]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000398b20 items=0 ppid=3440 pid=3544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:35.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231343563333431363865333162633534303535663665356531383233 Feb 12 22:23:35.200000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.200000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.200000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.200000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.200000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.200000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.200000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.200000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.200000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.200000 audit: BPF prog-id=143 op=LOAD Feb 12 22:23:35.200000 audit[3544]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000398b68 items=0 ppid=3440 pid=3544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:35.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231343563333431363865333162633534303535663665356531383233 Feb 12 22:23:35.201000 audit: BPF prog-id=143 op=UNLOAD Feb 12 22:23:35.201000 audit: BPF prog-id=142 op=UNLOAD Feb 12 22:23:35.201000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.201000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.201000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.201000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.201000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.201000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.201000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.201000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.201000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.201000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:35.201000 audit: BPF prog-id=144 op=LOAD Feb 12 22:23:35.201000 audit[3544]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000398f78 items=0 ppid=3440 pid=3544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:35.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231343563333431363865333162633534303535663665356531383233 Feb 12 22:23:35.342764 env[1557]: time="2024-02-12T22:23:35.342659247Z" level=info msg="StartContainer for \"b145c34168e31bc54055f6e5e18230aded4e37d4c7c84b03c43c34379022f50b\" returns successfully" Feb 12 22:23:36.653410 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4144640541.mount: Deactivated successfully. Feb 12 22:23:36.712618 kubelet[2807]: E0212 22:23:36.712127 2807 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4qkdf" podUID=2196ea8e-c0da-421e-83bb-4ead3cb0e76b Feb 12 22:23:36.882692 kubelet[2807]: I0212 22:23:36.880562 2807 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 22:23:37.389901 kubelet[2807]: I0212 22:23:37.389154 2807 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-987968857-vx2zn" podStartSLOduration=-9.22337202346567e+09 pod.CreationTimestamp="2024-02-12 22:23:24 +0000 UTC" firstStartedPulling="2024-02-12 22:23:27.274968934 +0000 UTC m=+22.795388168" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:23:35.886493013 +0000 UTC m=+31.406912254" watchObservedRunningTime="2024-02-12 22:23:37.389105982 +0000 UTC m=+32.909525225" Feb 12 22:23:37.496369 kernel: kauditd_printk_skb: 91 callbacks suppressed Feb 12 22:23:37.496517 kernel: audit: type=1325 audit(1707776617.489:1183): table=filter:109 family=2 entries=13 op=nft_register_rule pid=3600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:23:37.489000 audit[3600]: NETFILTER_CFG table=filter:109 family=2 entries=13 op=nft_register_rule pid=3600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:23:37.504366 kernel: audit: type=1300 audit(1707776617.489:1183): arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7fffc002a150 a2=0 a3=7fffc002a13c items=0 ppid=2972 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:37.489000 audit[3600]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7fffc002a150 a2=0 a3=7fffc002a13c items=0 ppid=2972 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:37.489000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:23:37.508936 kernel: audit: type=1327 audit(1707776617.489:1183): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:23:37.489000 audit[3600]: NETFILTER_CFG table=nat:110 family=2 entries=27 op=nft_register_chain pid=3600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:23:37.521506 kernel: audit: type=1325 audit(1707776617.489:1184): table=nat:110 family=2 entries=27 op=nft_register_chain pid=3600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:23:37.521638 kernel: audit: type=1300 audit(1707776617.489:1184): arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7fffc002a150 a2=0 a3=7fffc002a13c items=0 ppid=2972 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:37.489000 audit[3600]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7fffc002a150 a2=0 a3=7fffc002a13c items=0 ppid=2972 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:37.489000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:23:37.525948 kernel: audit: type=1327 audit(1707776617.489:1184): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:23:38.713486 kubelet[2807]: E0212 22:23:38.711847 2807 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4qkdf" podUID=2196ea8e-c0da-421e-83bb-4ead3cb0e76b Feb 12 22:23:40.713168 kubelet[2807]: E0212 22:23:40.713133 2807 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4qkdf" podUID=2196ea8e-c0da-421e-83bb-4ead3cb0e76b Feb 12 22:23:42.713677 kubelet[2807]: E0212 22:23:42.713641 2807 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4qkdf" podUID=2196ea8e-c0da-421e-83bb-4ead3cb0e76b Feb 12 22:23:44.604647 env[1557]: time="2024-02-12T22:23:44.604596510Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:23:44.607722 env[1557]: time="2024-02-12T22:23:44.607629124Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:23:44.610484 env[1557]: time="2024-02-12T22:23:44.610445405Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:23:44.612681 env[1557]: time="2024-02-12T22:23:44.612627925Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:23:44.613631 env[1557]: time="2024-02-12T22:23:44.613594194Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 12 22:23:44.617827 env[1557]: time="2024-02-12T22:23:44.617789605Z" level=info msg="CreateContainer within sandbox \"626afd0e64daf003f1dcd28331e927a929cfecd40b6a2c14a9eb7c27eb67d067\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 22:23:44.638747 env[1557]: time="2024-02-12T22:23:44.638680045Z" level=info msg="CreateContainer within sandbox \"626afd0e64daf003f1dcd28331e927a929cfecd40b6a2c14a9eb7c27eb67d067\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"a83da1f6092c72cf07a8deda06ecb8800ac39f14123f9db61d4ba6a1bba0a447\"" Feb 12 22:23:44.641271 env[1557]: time="2024-02-12T22:23:44.639559019Z" level=info msg="StartContainer for \"a83da1f6092c72cf07a8deda06ecb8800ac39f14123f9db61d4ba6a1bba0a447\"" Feb 12 22:23:44.682592 systemd[1]: Started cri-containerd-a83da1f6092c72cf07a8deda06ecb8800ac39f14123f9db61d4ba6a1bba0a447.scope. Feb 12 22:23:44.703000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.703000 audit[3608]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fb95819e1b8 items=0 ppid=3400 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:44.716846 kernel: audit: type=1400 audit(1707776624.703:1185): avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.716958 kernel: audit: type=1300 audit(1707776624.703:1185): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fb95819e1b8 items=0 ppid=3400 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:44.716998 kernel: audit: type=1327 audit(1707776624.703:1185): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138336461316636303932633732636630376138646564613036656362 Feb 12 22:23:44.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138336461316636303932633732636630376138646564613036656362 Feb 12 22:23:44.718828 kubelet[2807]: E0212 22:23:44.718806 2807 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4qkdf" podUID=2196ea8e-c0da-421e-83bb-4ead3cb0e76b Feb 12 22:23:44.727823 kernel: audit: type=1400 audit(1707776624.703:1186): avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.728140 kernel: audit: type=1400 audit(1707776624.703:1186): avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.703000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.703000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.703000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.741882 kernel: audit: type=1400 audit(1707776624.703:1186): avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.741988 kernel: audit: type=1400 audit(1707776624.703:1186): avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.703000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.703000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.752914 kernel: audit: type=1400 audit(1707776624.703:1186): avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.760917 kernel: audit: type=1400 audit(1707776624.703:1186): avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.822938 kernel: audit: type=1400 audit(1707776624.703:1186): avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.703000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.703000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.703000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.703000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.703000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.703000 audit: BPF prog-id=145 op=LOAD Feb 12 22:23:44.703000 audit[3608]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000265eb8 items=0 ppid=3400 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:44.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138336461316636303932633732636630376138646564613036656362 Feb 12 22:23:44.707000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.707000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.707000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.707000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.707000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.707000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.707000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.707000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.707000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.707000 audit: BPF prog-id=146 op=LOAD Feb 12 22:23:44.707000 audit[3608]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000265f08 items=0 ppid=3400 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:44.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138336461316636303932633732636630376138646564613036656362 Feb 12 22:23:44.707000 audit: BPF prog-id=146 op=UNLOAD Feb 12 22:23:44.707000 audit: BPF prog-id=145 op=UNLOAD Feb 12 22:23:44.707000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.707000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.707000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.707000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.707000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.707000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.707000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.707000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.707000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.707000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:44.707000 audit: BPF prog-id=147 op=LOAD Feb 12 22:23:44.707000 audit[3608]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000265f98 items=0 ppid=3400 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:44.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138336461316636303932633732636630376138646564613036656362 Feb 12 22:23:44.829431 env[1557]: time="2024-02-12T22:23:44.829377988Z" level=info msg="StartContainer for \"a83da1f6092c72cf07a8deda06ecb8800ac39f14123f9db61d4ba6a1bba0a447\" returns successfully" Feb 12 22:23:45.834322 env[1557]: time="2024-02-12T22:23:45.834190116Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 22:23:45.837983 systemd[1]: cri-containerd-a83da1f6092c72cf07a8deda06ecb8800ac39f14123f9db61d4ba6a1bba0a447.scope: Deactivated successfully. Feb 12 22:23:45.841000 audit: BPF prog-id=147 op=UNLOAD Feb 12 22:23:45.864588 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a83da1f6092c72cf07a8deda06ecb8800ac39f14123f9db61d4ba6a1bba0a447-rootfs.mount: Deactivated successfully. Feb 12 22:23:45.892244 kubelet[2807]: I0212 22:23:45.891825 2807 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 22:23:45.924775 kubelet[2807]: I0212 22:23:45.924731 2807 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:23:45.928602 kubelet[2807]: I0212 22:23:45.928561 2807 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:23:45.938276 systemd[1]: Created slice kubepods-burstable-pode0db5db6_2308_44b2_a5bb_86a966d03452.slice. Feb 12 22:23:45.948174 systemd[1]: Created slice kubepods-burstable-pod9653bac9_fb07_4fb8_9d87_e5c643305cb2.slice. Feb 12 22:23:45.960243 env[1557]: time="2024-02-12T22:23:45.960189356Z" level=info msg="shim disconnected" id=a83da1f6092c72cf07a8deda06ecb8800ac39f14123f9db61d4ba6a1bba0a447 Feb 12 22:23:45.960451 env[1557]: time="2024-02-12T22:23:45.960244796Z" level=warning msg="cleaning up after shim disconnected" id=a83da1f6092c72cf07a8deda06ecb8800ac39f14123f9db61d4ba6a1bba0a447 namespace=k8s.io Feb 12 22:23:45.960451 env[1557]: time="2024-02-12T22:23:45.960258948Z" level=info msg="cleaning up dead shim" Feb 12 22:23:45.978175 env[1557]: time="2024-02-12T22:23:45.978124236Z" level=warning msg="cleanup warnings time=\"2024-02-12T22:23:45Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3653 runtime=io.containerd.runc.v2\n" Feb 12 22:23:45.981093 kubelet[2807]: I0212 22:23:45.981063 2807 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:23:45.987937 systemd[1]: Created slice kubepods-besteffort-pod33f002e0_5134_437b_9e2c_765a200b98f8.slice. Feb 12 22:23:46.027490 kubelet[2807]: I0212 22:23:46.027461 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/9653bac9-fb07-4fb8-9d87-e5c643305cb2-config-volume\") pod \"coredns-787d4945fb-sb959\" (UID: \"9653bac9-fb07-4fb8-9d87-e5c643305cb2\") " pod="kube-system/coredns-787d4945fb-sb959" Feb 12 22:23:46.028083 kubelet[2807]: I0212 22:23:46.027700 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/e0db5db6-2308-44b2-a5bb-86a966d03452-config-volume\") pod \"coredns-787d4945fb-hq5pq\" (UID: \"e0db5db6-2308-44b2-a5bb-86a966d03452\") " pod="kube-system/coredns-787d4945fb-hq5pq" Feb 12 22:23:46.028083 kubelet[2807]: I0212 22:23:46.027760 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r5wqr\" (UniqueName: \"kubernetes.io/projected/e0db5db6-2308-44b2-a5bb-86a966d03452-kube-api-access-r5wqr\") pod \"coredns-787d4945fb-hq5pq\" (UID: \"e0db5db6-2308-44b2-a5bb-86a966d03452\") " pod="kube-system/coredns-787d4945fb-hq5pq" Feb 12 22:23:46.028083 kubelet[2807]: I0212 22:23:46.027784 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2vj49\" (UniqueName: \"kubernetes.io/projected/9653bac9-fb07-4fb8-9d87-e5c643305cb2-kube-api-access-2vj49\") pod \"coredns-787d4945fb-sb959\" (UID: \"9653bac9-fb07-4fb8-9d87-e5c643305cb2\") " pod="kube-system/coredns-787d4945fb-sb959" Feb 12 22:23:46.128362 kubelet[2807]: I0212 22:23:46.128238 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/33f002e0-5134-437b-9e2c-765a200b98f8-tigera-ca-bundle\") pod \"calico-kube-controllers-55565955d8-929dl\" (UID: \"33f002e0-5134-437b-9e2c-765a200b98f8\") " pod="calico-system/calico-kube-controllers-55565955d8-929dl" Feb 12 22:23:46.128508 kubelet[2807]: I0212 22:23:46.128383 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tkv6h\" (UniqueName: \"kubernetes.io/projected/33f002e0-5134-437b-9e2c-765a200b98f8-kube-api-access-tkv6h\") pod \"calico-kube-controllers-55565955d8-929dl\" (UID: \"33f002e0-5134-437b-9e2c-765a200b98f8\") " pod="calico-system/calico-kube-controllers-55565955d8-929dl" Feb 12 22:23:46.247364 env[1557]: time="2024-02-12T22:23:46.247321697Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-hq5pq,Uid:e0db5db6-2308-44b2-a5bb-86a966d03452,Namespace:kube-system,Attempt:0,}" Feb 12 22:23:46.253106 env[1557]: time="2024-02-12T22:23:46.253009942Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-sb959,Uid:9653bac9-fb07-4fb8-9d87-e5c643305cb2,Namespace:kube-system,Attempt:0,}" Feb 12 22:23:46.366100 env[1557]: time="2024-02-12T22:23:46.365987015Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55565955d8-929dl,Uid:33f002e0-5134-437b-9e2c-765a200b98f8,Namespace:calico-system,Attempt:0,}" Feb 12 22:23:46.544098 env[1557]: time="2024-02-12T22:23:46.544021065Z" level=error msg="Failed to destroy network for sandbox \"614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:23:46.558840 env[1557]: time="2024-02-12T22:23:46.558734571Z" level=error msg="encountered an error cleaning up failed sandbox \"614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:23:46.559105 env[1557]: time="2024-02-12T22:23:46.558920709Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-hq5pq,Uid:e0db5db6-2308-44b2-a5bb-86a966d03452,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:23:46.561158 kubelet[2807]: E0212 22:23:46.560538 2807 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:23:46.561158 kubelet[2807]: E0212 22:23:46.560618 2807 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-hq5pq" Feb 12 22:23:46.561158 kubelet[2807]: E0212 22:23:46.560652 2807 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-hq5pq" Feb 12 22:23:46.561427 kubelet[2807]: E0212 22:23:46.560836 2807 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-hq5pq_kube-system(e0db5db6-2308-44b2-a5bb-86a966d03452)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-hq5pq_kube-system(e0db5db6-2308-44b2-a5bb-86a966d03452)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-hq5pq" podUID=e0db5db6-2308-44b2-a5bb-86a966d03452 Feb 12 22:23:46.572237 env[1557]: time="2024-02-12T22:23:46.572174672Z" level=error msg="Failed to destroy network for sandbox \"e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:23:46.572643 env[1557]: time="2024-02-12T22:23:46.572584507Z" level=error msg="encountered an error cleaning up failed sandbox \"e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:23:46.572757 env[1557]: time="2024-02-12T22:23:46.572670652Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55565955d8-929dl,Uid:33f002e0-5134-437b-9e2c-765a200b98f8,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:23:46.573916 kubelet[2807]: E0212 22:23:46.573105 2807 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:23:46.573916 kubelet[2807]: E0212 22:23:46.573210 2807 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-55565955d8-929dl" Feb 12 22:23:46.573916 kubelet[2807]: E0212 22:23:46.573241 2807 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-55565955d8-929dl" Feb 12 22:23:46.574385 kubelet[2807]: E0212 22:23:46.573373 2807 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-55565955d8-929dl_calico-system(33f002e0-5134-437b-9e2c-765a200b98f8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-55565955d8-929dl_calico-system(33f002e0-5134-437b-9e2c-765a200b98f8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55565955d8-929dl" podUID=33f002e0-5134-437b-9e2c-765a200b98f8 Feb 12 22:23:46.592114 env[1557]: time="2024-02-12T22:23:46.592026962Z" level=error msg="Failed to destroy network for sandbox \"1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:23:46.593270 env[1557]: time="2024-02-12T22:23:46.593221466Z" level=error msg="encountered an error cleaning up failed sandbox \"1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:23:46.593386 env[1557]: time="2024-02-12T22:23:46.593289419Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-sb959,Uid:9653bac9-fb07-4fb8-9d87-e5c643305cb2,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:23:46.593644 kubelet[2807]: E0212 22:23:46.593622 2807 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:23:46.593751 kubelet[2807]: E0212 22:23:46.593682 2807 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-sb959" Feb 12 22:23:46.593751 kubelet[2807]: E0212 22:23:46.593714 2807 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-sb959" Feb 12 22:23:46.593848 kubelet[2807]: E0212 22:23:46.593785 2807 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-sb959_kube-system(9653bac9-fb07-4fb8-9d87-e5c643305cb2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-sb959_kube-system(9653bac9-fb07-4fb8-9d87-e5c643305cb2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-sb959" podUID=9653bac9-fb07-4fb8-9d87-e5c643305cb2 Feb 12 22:23:46.720066 systemd[1]: Created slice kubepods-besteffort-pod2196ea8e_c0da_421e_83bb_4ead3cb0e76b.slice. Feb 12 22:23:46.723278 env[1557]: time="2024-02-12T22:23:46.723238540Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-4qkdf,Uid:2196ea8e-c0da-421e-83bb-4ead3cb0e76b,Namespace:calico-system,Attempt:0,}" Feb 12 22:23:46.806312 env[1557]: time="2024-02-12T22:23:46.804498506Z" level=error msg="Failed to destroy network for sandbox \"997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:23:46.806312 env[1557]: time="2024-02-12T22:23:46.804913631Z" level=error msg="encountered an error cleaning up failed sandbox \"997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:23:46.806312 env[1557]: time="2024-02-12T22:23:46.804991245Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-4qkdf,Uid:2196ea8e-c0da-421e-83bb-4ead3cb0e76b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:23:46.806679 kubelet[2807]: E0212 22:23:46.805917 2807 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:23:46.806679 kubelet[2807]: E0212 22:23:46.805970 2807 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-4qkdf" Feb 12 22:23:46.806679 kubelet[2807]: E0212 22:23:46.805994 2807 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-4qkdf" Feb 12 22:23:46.806847 kubelet[2807]: E0212 22:23:46.806061 2807 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-4qkdf_calico-system(2196ea8e-c0da-421e-83bb-4ead3cb0e76b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-4qkdf_calico-system(2196ea8e-c0da-421e-83bb-4ead3cb0e76b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-4qkdf" podUID=2196ea8e-c0da-421e-83bb-4ead3cb0e76b Feb 12 22:23:46.869447 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc-shm.mount: Deactivated successfully. Feb 12 22:23:46.911828 kubelet[2807]: I0212 22:23:46.911716 2807 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" Feb 12 22:23:46.919035 env[1557]: time="2024-02-12T22:23:46.918880105Z" level=info msg="StopPodSandbox for \"997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296\"" Feb 12 22:23:46.923494 env[1557]: time="2024-02-12T22:23:46.921281527Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 22:23:46.930937 kubelet[2807]: I0212 22:23:46.930747 2807 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" Feb 12 22:23:46.932112 env[1557]: time="2024-02-12T22:23:46.932076510Z" level=info msg="StopPodSandbox for \"614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc\"" Feb 12 22:23:46.942945 kubelet[2807]: I0212 22:23:46.941953 2807 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" Feb 12 22:23:46.944002 env[1557]: time="2024-02-12T22:23:46.943960021Z" level=info msg="StopPodSandbox for \"1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf\"" Feb 12 22:23:46.948227 kubelet[2807]: I0212 22:23:46.947467 2807 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" Feb 12 22:23:46.952885 env[1557]: time="2024-02-12T22:23:46.951074994Z" level=info msg="StopPodSandbox for \"e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f\"" Feb 12 22:23:47.033226 env[1557]: time="2024-02-12T22:23:47.033120997Z" level=error msg="StopPodSandbox for \"e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f\" failed" error="failed to destroy network for sandbox \"e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:23:47.034054 kubelet[2807]: E0212 22:23:47.033730 2807 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" Feb 12 22:23:47.034054 kubelet[2807]: E0212 22:23:47.033888 2807 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f} Feb 12 22:23:47.034054 kubelet[2807]: E0212 22:23:47.033940 2807 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"33f002e0-5134-437b-9e2c-765a200b98f8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 22:23:47.034054 kubelet[2807]: E0212 22:23:47.034002 2807 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"33f002e0-5134-437b-9e2c-765a200b98f8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55565955d8-929dl" podUID=33f002e0-5134-437b-9e2c-765a200b98f8 Feb 12 22:23:47.047674 env[1557]: time="2024-02-12T22:23:47.047612207Z" level=error msg="StopPodSandbox for \"997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296\" failed" error="failed to destroy network for sandbox \"997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:23:47.048385 kubelet[2807]: E0212 22:23:47.048152 2807 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" Feb 12 22:23:47.048385 kubelet[2807]: E0212 22:23:47.048211 2807 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296} Feb 12 22:23:47.048385 kubelet[2807]: E0212 22:23:47.048275 2807 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2196ea8e-c0da-421e-83bb-4ead3cb0e76b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 22:23:47.048385 kubelet[2807]: E0212 22:23:47.048338 2807 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2196ea8e-c0da-421e-83bb-4ead3cb0e76b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-4qkdf" podUID=2196ea8e-c0da-421e-83bb-4ead3cb0e76b Feb 12 22:23:47.060916 env[1557]: time="2024-02-12T22:23:47.060726042Z" level=error msg="StopPodSandbox for \"614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc\" failed" error="failed to destroy network for sandbox \"614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:23:47.062291 kubelet[2807]: E0212 22:23:47.061866 2807 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" Feb 12 22:23:47.062291 kubelet[2807]: E0212 22:23:47.062117 2807 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc} Feb 12 22:23:47.062291 kubelet[2807]: E0212 22:23:47.062200 2807 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e0db5db6-2308-44b2-a5bb-86a966d03452\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 22:23:47.062291 kubelet[2807]: E0212 22:23:47.062240 2807 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e0db5db6-2308-44b2-a5bb-86a966d03452\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-hq5pq" podUID=e0db5db6-2308-44b2-a5bb-86a966d03452 Feb 12 22:23:47.068883 env[1557]: time="2024-02-12T22:23:47.068802337Z" level=error msg="StopPodSandbox for \"1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf\" failed" error="failed to destroy network for sandbox \"1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 22:23:47.074294 kubelet[2807]: E0212 22:23:47.070069 2807 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" Feb 12 22:23:47.074294 kubelet[2807]: E0212 22:23:47.070123 2807 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf} Feb 12 22:23:47.074294 kubelet[2807]: E0212 22:23:47.070173 2807 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9653bac9-fb07-4fb8-9d87-e5c643305cb2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 22:23:47.074294 kubelet[2807]: E0212 22:23:47.070225 2807 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9653bac9-fb07-4fb8-9d87-e5c643305cb2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-sb959" podUID=9653bac9-fb07-4fb8-9d87-e5c643305cb2 Feb 12 22:23:54.699274 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount758860255.mount: Deactivated successfully. Feb 12 22:23:54.880290 env[1557]: time="2024-02-12T22:23:54.880207868Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:23:54.887575 env[1557]: time="2024-02-12T22:23:54.887526802Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:23:54.890929 env[1557]: time="2024-02-12T22:23:54.890807345Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:23:54.894337 env[1557]: time="2024-02-12T22:23:54.894246006Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:23:54.894755 env[1557]: time="2024-02-12T22:23:54.894714471Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 12 22:23:54.959332 env[1557]: time="2024-02-12T22:23:54.959187227Z" level=info msg="CreateContainer within sandbox \"626afd0e64daf003f1dcd28331e927a929cfecd40b6a2c14a9eb7c27eb67d067\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 22:23:54.984357 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3248422995.mount: Deactivated successfully. Feb 12 22:23:54.994142 env[1557]: time="2024-02-12T22:23:54.994087338Z" level=info msg="CreateContainer within sandbox \"626afd0e64daf003f1dcd28331e927a929cfecd40b6a2c14a9eb7c27eb67d067\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"ec8ddc908cbc0a0d5a988d9c572ae3f5a079090f14b1b75a7a0d5ae410a92e8e\"" Feb 12 22:23:54.995086 env[1557]: time="2024-02-12T22:23:54.995050509Z" level=info msg="StartContainer for \"ec8ddc908cbc0a0d5a988d9c572ae3f5a079090f14b1b75a7a0d5ae410a92e8e\"" Feb 12 22:23:55.052088 systemd[1]: Started cri-containerd-ec8ddc908cbc0a0d5a988d9c572ae3f5a079090f14b1b75a7a0d5ae410a92e8e.scope. Feb 12 22:23:55.087814 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 22:23:55.095013 kernel: audit: type=1400 audit(1707776635.080:1192): avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.102386 kernel: audit: type=1300 audit(1707776635.080:1192): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fb37c78dc28 items=0 ppid=3400 pid=3884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:55.107013 kernel: audit: type=1327 audit(1707776635.080:1192): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563386464633930386362633061306435613938386439633537326165 Feb 12 22:23:55.107095 kernel: audit: type=1400 audit(1707776635.080:1193): avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.107798 kernel: audit: type=1400 audit(1707776635.080:1193): avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.111488 kernel: audit: type=1400 audit(1707776635.080:1193): avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.080000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.115730 kernel: audit: type=1400 audit(1707776635.080:1193): avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.080000 audit[3884]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fb37c78dc28 items=0 ppid=3400 pid=3884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:55.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563386464633930386362633061306435613938386439633537326165 Feb 12 22:23:55.080000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.080000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.080000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.080000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.080000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.127956 kernel: audit: type=1400 audit(1707776635.080:1193): avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.080000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.136952 kernel: audit: type=1400 audit(1707776635.080:1193): avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.137071 kernel: audit: type=1400 audit(1707776635.080:1193): avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.080000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.080000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.080000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.080000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.080000 audit: BPF prog-id=148 op=LOAD Feb 12 22:23:55.080000 audit[3884]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001beb48 items=0 ppid=3400 pid=3884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:55.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563386464633930386362633061306435613938386439633537326165 Feb 12 22:23:55.086000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.086000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.086000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.086000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.086000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.086000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.086000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.086000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.086000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.086000 audit: BPF prog-id=149 op=LOAD Feb 12 22:23:55.086000 audit[3884]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0001beb98 items=0 ppid=3400 pid=3884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:55.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563386464633930386362633061306435613938386439633537326165 Feb 12 22:23:55.087000 audit: BPF prog-id=149 op=UNLOAD Feb 12 22:23:55.087000 audit: BPF prog-id=148 op=UNLOAD Feb 12 22:23:55.087000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.087000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.087000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.087000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.087000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.087000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.087000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.087000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.087000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.087000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:55.087000 audit: BPF prog-id=150 op=LOAD Feb 12 22:23:55.087000 audit[3884]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0001bec28 items=0 ppid=3400 pid=3884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:55.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563386464633930386362633061306435613938386439633537326165 Feb 12 22:23:55.143971 env[1557]: time="2024-02-12T22:23:55.143924002Z" level=info msg="StartContainer for \"ec8ddc908cbc0a0d5a988d9c572ae3f5a079090f14b1b75a7a0d5ae410a92e8e\" returns successfully" Feb 12 22:23:55.490987 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 22:23:55.491150 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 22:23:56.032425 systemd[1]: run-containerd-runc-k8s.io-ec8ddc908cbc0a0d5a988d9c572ae3f5a079090f14b1b75a7a0d5ae410a92e8e-runc.KLoqkj.mount: Deactivated successfully. Feb 12 22:23:56.067135 kubelet[2807]: I0212 22:23:56.067090 2807 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-m8n47" podStartSLOduration=-9.223372004795073e+09 pod.CreationTimestamp="2024-02-12 22:23:24 +0000 UTC" firstStartedPulling="2024-02-12 22:23:27.151724322 +0000 UTC m=+22.672143555" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:23:56.05511804 +0000 UTC m=+51.575537280" watchObservedRunningTime="2024-02-12 22:23:56.05970351 +0000 UTC m=+51.580122753" Feb 12 22:23:57.035718 systemd[1]: run-containerd-runc-k8s.io-ec8ddc908cbc0a0d5a988d9c572ae3f5a079090f14b1b75a7a0d5ae410a92e8e-runc.ppy9B9.mount: Deactivated successfully. Feb 12 22:23:57.277000 audit[4034]: AVC avc: denied { write } for pid=4034 comm="tee" name="fd" dev="proc" ino=26280 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:23:57.277000 audit[4034]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffebeb3b983 a2=241 a3=1b6 items=1 ppid=3996 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:57.277000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 22:23:57.277000 audit: PATH item=0 name="/dev/fd/63" inode=26781 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:57.277000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:23:57.310000 audit[4029]: AVC avc: denied { write } for pid=4029 comm="tee" name="fd" dev="proc" ino=26794 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:23:57.310000 audit[4029]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdf7dac981 a2=241 a3=1b6 items=1 ppid=3998 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:57.310000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 22:23:57.310000 audit: PATH item=0 name="/dev/fd/63" inode=26778 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:57.310000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:23:57.319000 audit[4032]: AVC avc: denied { write } for pid=4032 comm="tee" name="fd" dev="proc" ino=26797 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:23:57.319000 audit[4032]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf0b78972 a2=241 a3=1b6 items=1 ppid=4000 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:57.319000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 22:23:57.319000 audit: PATH item=0 name="/dev/fd/63" inode=26275 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:57.319000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:23:57.332000 audit[4049]: AVC avc: denied { write } for pid=4049 comm="tee" name="fd" dev="proc" ino=26297 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:23:57.352000 audit[4057]: AVC avc: denied { write } for pid=4057 comm="tee" name="fd" dev="proc" ino=26303 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:23:57.332000 audit[4049]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff384c9971 a2=241 a3=1b6 items=1 ppid=3993 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:57.332000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 22:23:57.332000 audit: PATH item=0 name="/dev/fd/63" inode=26796 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:57.385000 audit[4055]: AVC avc: denied { write } for pid=4055 comm="tee" name="fd" dev="proc" ino=26807 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:23:57.385000 audit[4055]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc13032981 a2=241 a3=1b6 items=1 ppid=3991 pid=4055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:57.385000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 22:23:57.385000 audit: PATH item=0 name="/dev/fd/63" inode=26294 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:57.385000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:23:57.352000 audit[4057]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff08ead981 a2=241 a3=1b6 items=1 ppid=4001 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:57.352000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 22:23:57.352000 audit: PATH item=0 name="/dev/fd/63" inode=26801 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:57.352000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:23:57.332000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:23:57.439000 audit[4065]: AVC avc: denied { write } for pid=4065 comm="tee" name="fd" dev="proc" ino=26812 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 22:23:57.439000 audit[4065]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffefe217982 a2=241 a3=1b6 items=1 ppid=3995 pid=4065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:57.439000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 22:23:57.439000 audit: PATH item=0 name="/dev/fd/63" inode=26300 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:57.439000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 22:23:57.712710 env[1557]: time="2024-02-12T22:23:57.712587569Z" level=info msg="StopPodSandbox for \"e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f\"" Feb 12 22:23:58.039177 env[1557]: 2024-02-12 22:23:57.834 [INFO][4087] k8s.go 578: Cleaning up netns ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" Feb 12 22:23:58.039177 env[1557]: 2024-02-12 22:23:57.834 [INFO][4087] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" iface="eth0" netns="/var/run/netns/cni-a1289e5b-b468-bd76-e74b-141640e5413f" Feb 12 22:23:58.039177 env[1557]: 2024-02-12 22:23:57.835 [INFO][4087] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" iface="eth0" netns="/var/run/netns/cni-a1289e5b-b468-bd76-e74b-141640e5413f" Feb 12 22:23:58.039177 env[1557]: 2024-02-12 22:23:57.836 [INFO][4087] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" iface="eth0" netns="/var/run/netns/cni-a1289e5b-b468-bd76-e74b-141640e5413f" Feb 12 22:23:58.039177 env[1557]: 2024-02-12 22:23:57.836 [INFO][4087] k8s.go 585: Releasing IP address(es) ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" Feb 12 22:23:58.039177 env[1557]: 2024-02-12 22:23:57.836 [INFO][4087] utils.go 188: Calico CNI releasing IP address ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" Feb 12 22:23:58.039177 env[1557]: 2024-02-12 22:23:58.011 [INFO][4098] ipam_plugin.go 415: Releasing address using handleID ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" HandleID="k8s-pod-network.e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" Workload="ip--172--31--25--241-k8s-calico--kube--controllers--55565955d8--929dl-eth0" Feb 12 22:23:58.039177 env[1557]: 2024-02-12 22:23:58.013 [INFO][4098] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:23:58.039177 env[1557]: 2024-02-12 22:23:58.013 [INFO][4098] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:23:58.039177 env[1557]: 2024-02-12 22:23:58.028 [WARNING][4098] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" HandleID="k8s-pod-network.e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" Workload="ip--172--31--25--241-k8s-calico--kube--controllers--55565955d8--929dl-eth0" Feb 12 22:23:58.039177 env[1557]: 2024-02-12 22:23:58.028 [INFO][4098] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" HandleID="k8s-pod-network.e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" Workload="ip--172--31--25--241-k8s-calico--kube--controllers--55565955d8--929dl-eth0" Feb 12 22:23:58.039177 env[1557]: 2024-02-12 22:23:58.031 [INFO][4098] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:23:58.039177 env[1557]: 2024-02-12 22:23:58.033 [INFO][4087] k8s.go 591: Teardown processing complete. ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" Feb 12 22:23:58.038931 systemd[1]: run-netns-cni\x2da1289e5b\x2db468\x2dbd76\x2de74b\x2d141640e5413f.mount: Deactivated successfully. Feb 12 22:23:58.041306 env[1557]: time="2024-02-12T22:23:58.039492284Z" level=info msg="TearDown network for sandbox \"e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f\" successfully" Feb 12 22:23:58.041306 env[1557]: time="2024-02-12T22:23:58.039536830Z" level=info msg="StopPodSandbox for \"e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f\" returns successfully" Feb 12 22:23:58.041306 env[1557]: time="2024-02-12T22:23:58.040321760Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55565955d8-929dl,Uid:33f002e0-5134-437b-9e2c-765a200b98f8,Namespace:calico-system,Attempt:1,}" Feb 12 22:23:58.566068 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali919e017736e: link becomes ready Feb 12 22:23:58.574396 (udev-worker)[4181]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:23:58.574961 systemd-networkd[1377]: cali919e017736e: Link UP Feb 12 22:23:58.575233 systemd-networkd[1377]: cali919e017736e: Gained carrier Feb 12 22:23:58.578689 (udev-worker)[4178]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:23:58.579309 (udev-worker)[4179]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit: BPF prog-id=151 op=LOAD Feb 12 22:23:58.582000 audit[4182]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd5217c310 a2=70 a3=7f354814a000 items=0 ppid=4002 pid=4182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:58.582000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:23:58.582000 audit: BPF prog-id=151 op=UNLOAD Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit: BPF prog-id=152 op=LOAD Feb 12 22:23:58.582000 audit[4182]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd5217c310 a2=70 a3=6e items=0 ppid=4002 pid=4182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:58.582000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:23:58.582000 audit: BPF prog-id=152 op=UNLOAD Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit[4182]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd5217c2c0 a2=70 a3=7ffd5217c310 items=0 ppid=4002 pid=4182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:58.582000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit: BPF prog-id=153 op=LOAD Feb 12 22:23:58.582000 audit[4182]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd5217c2a0 a2=70 a3=7ffd5217c310 items=0 ppid=4002 pid=4182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:58.582000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:23:58.582000 audit: BPF prog-id=153 op=UNLOAD Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit[4182]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd5217c380 a2=70 a3=0 items=0 ppid=4002 pid=4182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:58.582000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:23:58.582000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.582000 audit[4182]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd5217c370 a2=70 a3=0 items=0 ppid=4002 pid=4182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:58.582000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:23:58.583000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.583000 audit[4182]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffd5217c3b0 a2=70 a3=0 items=0 ppid=4002 pid=4182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:58.583000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:23:58.586000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.586000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.586000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.586000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.586000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.586000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.586000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.586000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.586000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.586000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.586000 audit: BPF prog-id=154 op=LOAD Feb 12 22:23:58.586000 audit[4182]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd5217c2d0 a2=70 a3=ffffffff items=0 ppid=4002 pid=4182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:58.586000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 22:23:58.597988 env[1557]: 2024-02-12 22:23:58.280 [INFO][4142] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--25--241-k8s-calico--kube--controllers--55565955d8--929dl-eth0 calico-kube-controllers-55565955d8- calico-system 33f002e0-5134-437b-9e2c-765a200b98f8 704 0 2024-02-12 22:23:25 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:55565955d8 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-25-241 calico-kube-controllers-55565955d8-929dl eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali919e017736e [] []}} ContainerID="2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b" Namespace="calico-system" Pod="calico-kube-controllers-55565955d8-929dl" WorkloadEndpoint="ip--172--31--25--241-k8s-calico--kube--controllers--55565955d8--929dl-" Feb 12 22:23:58.597988 env[1557]: 2024-02-12 22:23:58.282 [INFO][4142] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b" Namespace="calico-system" Pod="calico-kube-controllers-55565955d8-929dl" WorkloadEndpoint="ip--172--31--25--241-k8s-calico--kube--controllers--55565955d8--929dl-eth0" Feb 12 22:23:58.597988 env[1557]: 2024-02-12 22:23:58.375 [INFO][4160] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b" HandleID="k8s-pod-network.2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b" Workload="ip--172--31--25--241-k8s-calico--kube--controllers--55565955d8--929dl-eth0" Feb 12 22:23:58.597988 env[1557]: 2024-02-12 22:23:58.396 [INFO][4160] ipam_plugin.go 268: Auto assigning IP ContainerID="2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b" HandleID="k8s-pod-network.2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b" Workload="ip--172--31--25--241-k8s-calico--kube--controllers--55565955d8--929dl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002a1410), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-25-241", "pod":"calico-kube-controllers-55565955d8-929dl", "timestamp":"2024-02-12 22:23:58.375134118 +0000 UTC"}, Hostname:"ip-172-31-25-241", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:23:58.597988 env[1557]: 2024-02-12 22:23:58.396 [INFO][4160] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:23:58.597988 env[1557]: 2024-02-12 22:23:58.396 [INFO][4160] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:23:58.597988 env[1557]: 2024-02-12 22:23:58.396 [INFO][4160] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-25-241' Feb 12 22:23:58.597988 env[1557]: 2024-02-12 22:23:58.399 [INFO][4160] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b" host="ip-172-31-25-241" Feb 12 22:23:58.597988 env[1557]: 2024-02-12 22:23:58.409 [INFO][4160] ipam.go 372: Looking up existing affinities for host host="ip-172-31-25-241" Feb 12 22:23:58.597988 env[1557]: 2024-02-12 22:23:58.415 [INFO][4160] ipam.go 489: Trying affinity for 192.168.33.64/26 host="ip-172-31-25-241" Feb 12 22:23:58.597988 env[1557]: 2024-02-12 22:23:58.418 [INFO][4160] ipam.go 155: Attempting to load block cidr=192.168.33.64/26 host="ip-172-31-25-241" Feb 12 22:23:58.597988 env[1557]: 2024-02-12 22:23:58.422 [INFO][4160] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.33.64/26 host="ip-172-31-25-241" Feb 12 22:23:58.597988 env[1557]: 2024-02-12 22:23:58.422 [INFO][4160] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.33.64/26 handle="k8s-pod-network.2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b" host="ip-172-31-25-241" Feb 12 22:23:58.597988 env[1557]: 2024-02-12 22:23:58.424 [INFO][4160] ipam.go 1682: Creating new handle: k8s-pod-network.2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b Feb 12 22:23:58.597988 env[1557]: 2024-02-12 22:23:58.435 [INFO][4160] ipam.go 1203: Writing block in order to claim IPs block=192.168.33.64/26 handle="k8s-pod-network.2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b" host="ip-172-31-25-241" Feb 12 22:23:58.597988 env[1557]: 2024-02-12 22:23:58.443 [INFO][4160] ipam.go 1216: Successfully claimed IPs: [192.168.33.65/26] block=192.168.33.64/26 handle="k8s-pod-network.2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b" host="ip-172-31-25-241" Feb 12 22:23:58.597988 env[1557]: 2024-02-12 22:23:58.443 [INFO][4160] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.33.65/26] handle="k8s-pod-network.2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b" host="ip-172-31-25-241" Feb 12 22:23:58.597988 env[1557]: 2024-02-12 22:23:58.443 [INFO][4160] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:23:58.597988 env[1557]: 2024-02-12 22:23:58.443 [INFO][4160] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.33.65/26] IPv6=[] ContainerID="2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b" HandleID="k8s-pod-network.2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b" Workload="ip--172--31--25--241-k8s-calico--kube--controllers--55565955d8--929dl-eth0" Feb 12 22:23:58.600000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.600000 audit[4188]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffebb1b7b10 a2=70 a3=fff80800 items=0 ppid=4002 pid=4188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:58.600000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 22:23:58.600000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.600000 audit[4188]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffebb1b79e0 a2=70 a3=3 items=0 ppid=4002 pid=4188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:58.600000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 22:23:58.604080 env[1557]: 2024-02-12 22:23:58.448 [INFO][4142] k8s.go 385: Populated endpoint ContainerID="2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b" Namespace="calico-system" Pod="calico-kube-controllers-55565955d8-929dl" WorkloadEndpoint="ip--172--31--25--241-k8s-calico--kube--controllers--55565955d8--929dl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--241-k8s-calico--kube--controllers--55565955d8--929dl-eth0", GenerateName:"calico-kube-controllers-55565955d8-", Namespace:"calico-system", SelfLink:"", UID:"33f002e0-5134-437b-9e2c-765a200b98f8", ResourceVersion:"704", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 23, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55565955d8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-241", ContainerID:"", Pod:"calico-kube-controllers-55565955d8-929dl", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.33.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali919e017736e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:23:58.604080 env[1557]: 2024-02-12 22:23:58.448 [INFO][4142] k8s.go 386: Calico CNI using IPs: [192.168.33.65/32] ContainerID="2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b" Namespace="calico-system" Pod="calico-kube-controllers-55565955d8-929dl" WorkloadEndpoint="ip--172--31--25--241-k8s-calico--kube--controllers--55565955d8--929dl-eth0" Feb 12 22:23:58.604080 env[1557]: 2024-02-12 22:23:58.448 [INFO][4142] dataplane_linux.go 68: Setting the host side veth name to cali919e017736e ContainerID="2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b" Namespace="calico-system" Pod="calico-kube-controllers-55565955d8-929dl" WorkloadEndpoint="ip--172--31--25--241-k8s-calico--kube--controllers--55565955d8--929dl-eth0" Feb 12 22:23:58.604080 env[1557]: 2024-02-12 22:23:58.562 [INFO][4142] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b" Namespace="calico-system" Pod="calico-kube-controllers-55565955d8-929dl" WorkloadEndpoint="ip--172--31--25--241-k8s-calico--kube--controllers--55565955d8--929dl-eth0" Feb 12 22:23:58.604080 env[1557]: 2024-02-12 22:23:58.577 [INFO][4142] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b" Namespace="calico-system" Pod="calico-kube-controllers-55565955d8-929dl" WorkloadEndpoint="ip--172--31--25--241-k8s-calico--kube--controllers--55565955d8--929dl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--241-k8s-calico--kube--controllers--55565955d8--929dl-eth0", GenerateName:"calico-kube-controllers-55565955d8-", Namespace:"calico-system", SelfLink:"", UID:"33f002e0-5134-437b-9e2c-765a200b98f8", ResourceVersion:"704", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 23, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55565955d8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-241", ContainerID:"2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b", Pod:"calico-kube-controllers-55565955d8-929dl", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.33.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali919e017736e", MAC:"32:0e:a0:11:f2:f9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:23:58.604080 env[1557]: 2024-02-12 22:23:58.591 [INFO][4142] k8s.go 491: Wrote updated endpoint to datastore ContainerID="2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b" Namespace="calico-system" Pod="calico-kube-controllers-55565955d8-929dl" WorkloadEndpoint="ip--172--31--25--241-k8s-calico--kube--controllers--55565955d8--929dl-eth0" Feb 12 22:23:58.607000 audit: BPF prog-id=154 op=UNLOAD Feb 12 22:23:58.607000 audit[1510]: SYSCALL arch=c000003e syscall=262 success=yes exit=0 a0=ffffff9c a1=5602a374784b a2=7ffcb2dae070 a3=0 items=1 ppid=1 pid=1510 auid=4294967295 uid=245 gid=245 euid=245 suid=245 fsuid=245 egid=245 sgid=245 fsgid=245 tty=(none) ses=4294967295 comm="systemd-resolve" exe="/usr/lib/systemd/systemd-resolved" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:58.607000 audit: CWD cwd="/" Feb 12 22:23:58.607000 audit: PATH item=0 name="/etc/resolv.conf" inode=733 dev=00:17 mode=0100644 ouid=245 ogid=245 rdev=00:00 obj=system_u:object_r:systemd_resolved_runtime_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 22:23:58.607000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-resolved" Feb 12 22:23:58.643929 env[1557]: time="2024-02-12T22:23:58.643803080Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:23:58.643929 env[1557]: time="2024-02-12T22:23:58.643870047Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:23:58.643929 env[1557]: time="2024-02-12T22:23:58.643886828Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:23:58.665761 env[1557]: time="2024-02-12T22:23:58.644058763Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b pid=4213 runtime=io.containerd.runc.v2 Feb 12 22:23:58.724920 env[1557]: time="2024-02-12T22:23:58.724880852Z" level=info msg="StopPodSandbox for \"614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc\"" Feb 12 22:23:58.740451 systemd[1]: Started cri-containerd-2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b.scope. Feb 12 22:23:58.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.803000 audit: BPF prog-id=155 op=LOAD Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000195c48 a2=10 a3=1c items=0 ppid=4213 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:58.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265323936393831363636653761336336306565343864346465383231 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001956b0 a2=3c a3=c items=0 ppid=4213 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:58.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265323936393831363636653761336336306565343864346465383231 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit: BPF prog-id=156 op=LOAD Feb 12 22:23:58.804000 audit[4224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001959d8 a2=78 a3=c000288d50 items=0 ppid=4213 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:58.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265323936393831363636653761336336306565343864346465383231 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit: BPF prog-id=157 op=LOAD Feb 12 22:23:58.804000 audit[4224]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000195770 a2=78 a3=c000288d98 items=0 ppid=4213 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:58.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265323936393831363636653761336336306565343864346465383231 Feb 12 22:23:58.804000 audit: BPF prog-id=157 op=UNLOAD Feb 12 22:23:58.804000 audit: BPF prog-id=156 op=UNLOAD Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:58.804000 audit: BPF prog-id=158 op=LOAD Feb 12 22:23:58.804000 audit[4224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000195c30 a2=78 a3=c0002891a8 items=0 ppid=4213 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:58.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265323936393831363636653761336336306565343864346465383231 Feb 12 22:23:58.870000 audit[4273]: NETFILTER_CFG table=nat:111 family=2 entries=16 op=nft_register_chain pid=4273 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:23:58.870000 audit[4273]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffd3196bdc0 a2=0 a3=7ffd3196bdac items=0 ppid=4002 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:58.870000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:23:58.892000 audit[4275]: NETFILTER_CFG table=filter:112 family=2 entries=39 op=nft_register_chain pid=4275 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:23:58.892000 audit[4275]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffd92e7b260 a2=0 a3=55f8bae97000 items=0 ppid=4002 pid=4275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:58.892000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:23:58.902000 audit[4276]: NETFILTER_CFG table=raw:113 family=2 entries=19 op=nft_register_chain pid=4276 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:23:58.902000 audit[4276]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffda963ba20 a2=0 a3=7ffda963ba0c items=0 ppid=4002 pid=4276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:58.902000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:23:58.906988 env[1557]: time="2024-02-12T22:23:58.906944877Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55565955d8-929dl,Uid:33f002e0-5134-437b-9e2c-765a200b98f8,Namespace:calico-system,Attempt:1,} returns sandbox id \"2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b\"" Feb 12 22:23:58.910846 env[1557]: time="2024-02-12T22:23:58.910813022Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 12 22:23:58.925000 audit[4278]: NETFILTER_CFG table=mangle:114 family=2 entries=19 op=nft_register_chain pid=4278 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:23:58.925000 audit[4278]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffca60145a0 a2=0 a3=562a12c8d000 items=0 ppid=4002 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:58.936127 (udev-worker)[4225]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:23:58.925000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:23:58.956483 systemd-networkd[1377]: vxlan.calico: Link UP Feb 12 22:23:58.956492 systemd-networkd[1377]: vxlan.calico: Gained carrier Feb 12 22:23:59.080302 env[1557]: 2024-02-12 22:23:58.922 [INFO][4258] k8s.go 578: Cleaning up netns ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" Feb 12 22:23:59.080302 env[1557]: 2024-02-12 22:23:58.923 [INFO][4258] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" iface="eth0" netns="/var/run/netns/cni-d03d9f1c-ba25-17b5-b2c2-68f656747596" Feb 12 22:23:59.080302 env[1557]: 2024-02-12 22:23:58.923 [INFO][4258] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" iface="eth0" netns="/var/run/netns/cni-d03d9f1c-ba25-17b5-b2c2-68f656747596" Feb 12 22:23:59.080302 env[1557]: 2024-02-12 22:23:58.923 [INFO][4258] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" iface="eth0" netns="/var/run/netns/cni-d03d9f1c-ba25-17b5-b2c2-68f656747596" Feb 12 22:23:59.080302 env[1557]: 2024-02-12 22:23:58.923 [INFO][4258] k8s.go 585: Releasing IP address(es) ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" Feb 12 22:23:59.080302 env[1557]: 2024-02-12 22:23:58.923 [INFO][4258] utils.go 188: Calico CNI releasing IP address ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" Feb 12 22:23:59.080302 env[1557]: 2024-02-12 22:23:59.020 [INFO][4289] ipam_plugin.go 415: Releasing address using handleID ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" HandleID="k8s-pod-network.614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" Workload="ip--172--31--25--241-k8s-coredns--787d4945fb--hq5pq-eth0" Feb 12 22:23:59.080302 env[1557]: 2024-02-12 22:23:59.021 [INFO][4289] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:23:59.080302 env[1557]: 2024-02-12 22:23:59.021 [INFO][4289] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:23:59.080302 env[1557]: 2024-02-12 22:23:59.048 [WARNING][4289] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" HandleID="k8s-pod-network.614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" Workload="ip--172--31--25--241-k8s-coredns--787d4945fb--hq5pq-eth0" Feb 12 22:23:59.080302 env[1557]: 2024-02-12 22:23:59.048 [INFO][4289] ipam_plugin.go 443: Releasing address using workloadID ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" HandleID="k8s-pod-network.614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" Workload="ip--172--31--25--241-k8s-coredns--787d4945fb--hq5pq-eth0" Feb 12 22:23:59.080302 env[1557]: 2024-02-12 22:23:59.055 [INFO][4289] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:23:59.080302 env[1557]: 2024-02-12 22:23:59.058 [INFO][4258] k8s.go 591: Teardown processing complete. ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" Feb 12 22:23:59.085931 systemd[1]: run-netns-cni\x2dd03d9f1c\x2dba25\x2d17b5\x2db2c2\x2d68f656747596.mount: Deactivated successfully. Feb 12 22:23:59.088506 env[1557]: time="2024-02-12T22:23:59.088232054Z" level=info msg="TearDown network for sandbox \"614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc\" successfully" Feb 12 22:23:59.088506 env[1557]: time="2024-02-12T22:23:59.088328855Z" level=info msg="StopPodSandbox for \"614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc\" returns successfully" Feb 12 22:23:59.089542 env[1557]: time="2024-02-12T22:23:59.089509100Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-hq5pq,Uid:e0db5db6-2308-44b2-a5bb-86a966d03452,Namespace:kube-system,Attempt:1,}" Feb 12 22:23:59.105000 audit[4300]: NETFILTER_CFG table=filter:115 family=2 entries=36 op=nft_register_chain pid=4300 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:23:59.105000 audit[4300]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7fffeeefefe0 a2=0 a3=7fffeeefefcc items=0 ppid=4002 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.105000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:23:59.362845 systemd-networkd[1377]: cali9295b7cd116: Link UP Feb 12 22:23:59.372905 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9295b7cd116: link becomes ready Feb 12 22:23:59.373135 systemd-networkd[1377]: cali9295b7cd116: Gained carrier Feb 12 22:23:59.394106 env[1557]: 2024-02-12 22:23:59.225 [INFO][4301] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--25--241-k8s-coredns--787d4945fb--hq5pq-eth0 coredns-787d4945fb- kube-system e0db5db6-2308-44b2-a5bb-86a966d03452 714 0 2024-02-12 22:23:18 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-25-241 coredns-787d4945fb-hq5pq eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali9295b7cd116 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d" Namespace="kube-system" Pod="coredns-787d4945fb-hq5pq" WorkloadEndpoint="ip--172--31--25--241-k8s-coredns--787d4945fb--hq5pq-" Feb 12 22:23:59.394106 env[1557]: 2024-02-12 22:23:59.225 [INFO][4301] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d" Namespace="kube-system" Pod="coredns-787d4945fb-hq5pq" WorkloadEndpoint="ip--172--31--25--241-k8s-coredns--787d4945fb--hq5pq-eth0" Feb 12 22:23:59.394106 env[1557]: 2024-02-12 22:23:59.285 [INFO][4313] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d" HandleID="k8s-pod-network.f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d" Workload="ip--172--31--25--241-k8s-coredns--787d4945fb--hq5pq-eth0" Feb 12 22:23:59.394106 env[1557]: 2024-02-12 22:23:59.302 [INFO][4313] ipam_plugin.go 268: Auto assigning IP ContainerID="f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d" HandleID="k8s-pod-network.f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d" Workload="ip--172--31--25--241-k8s-coredns--787d4945fb--hq5pq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00024e4e0), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-25-241", "pod":"coredns-787d4945fb-hq5pq", "timestamp":"2024-02-12 22:23:59.284987698 +0000 UTC"}, Hostname:"ip-172-31-25-241", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:23:59.394106 env[1557]: 2024-02-12 22:23:59.302 [INFO][4313] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:23:59.394106 env[1557]: 2024-02-12 22:23:59.302 [INFO][4313] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:23:59.394106 env[1557]: 2024-02-12 22:23:59.303 [INFO][4313] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-25-241' Feb 12 22:23:59.394106 env[1557]: 2024-02-12 22:23:59.312 [INFO][4313] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d" host="ip-172-31-25-241" Feb 12 22:23:59.394106 env[1557]: 2024-02-12 22:23:59.320 [INFO][4313] ipam.go 372: Looking up existing affinities for host host="ip-172-31-25-241" Feb 12 22:23:59.394106 env[1557]: 2024-02-12 22:23:59.327 [INFO][4313] ipam.go 489: Trying affinity for 192.168.33.64/26 host="ip-172-31-25-241" Feb 12 22:23:59.394106 env[1557]: 2024-02-12 22:23:59.331 [INFO][4313] ipam.go 155: Attempting to load block cidr=192.168.33.64/26 host="ip-172-31-25-241" Feb 12 22:23:59.394106 env[1557]: 2024-02-12 22:23:59.337 [INFO][4313] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.33.64/26 host="ip-172-31-25-241" Feb 12 22:23:59.394106 env[1557]: 2024-02-12 22:23:59.337 [INFO][4313] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.33.64/26 handle="k8s-pod-network.f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d" host="ip-172-31-25-241" Feb 12 22:23:59.394106 env[1557]: 2024-02-12 22:23:59.339 [INFO][4313] ipam.go 1682: Creating new handle: k8s-pod-network.f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d Feb 12 22:23:59.394106 env[1557]: 2024-02-12 22:23:59.345 [INFO][4313] ipam.go 1203: Writing block in order to claim IPs block=192.168.33.64/26 handle="k8s-pod-network.f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d" host="ip-172-31-25-241" Feb 12 22:23:59.394106 env[1557]: 2024-02-12 22:23:59.352 [INFO][4313] ipam.go 1216: Successfully claimed IPs: [192.168.33.66/26] block=192.168.33.64/26 handle="k8s-pod-network.f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d" host="ip-172-31-25-241" Feb 12 22:23:59.394106 env[1557]: 2024-02-12 22:23:59.352 [INFO][4313] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.33.66/26] handle="k8s-pod-network.f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d" host="ip-172-31-25-241" Feb 12 22:23:59.394106 env[1557]: 2024-02-12 22:23:59.352 [INFO][4313] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:23:59.394106 env[1557]: 2024-02-12 22:23:59.352 [INFO][4313] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.33.66/26] IPv6=[] ContainerID="f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d" HandleID="k8s-pod-network.f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d" Workload="ip--172--31--25--241-k8s-coredns--787d4945fb--hq5pq-eth0" Feb 12 22:23:59.395594 env[1557]: 2024-02-12 22:23:59.356 [INFO][4301] k8s.go 385: Populated endpoint ContainerID="f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d" Namespace="kube-system" Pod="coredns-787d4945fb-hq5pq" WorkloadEndpoint="ip--172--31--25--241-k8s-coredns--787d4945fb--hq5pq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--241-k8s-coredns--787d4945fb--hq5pq-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"e0db5db6-2308-44b2-a5bb-86a966d03452", ResourceVersion:"714", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 23, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-241", ContainerID:"", Pod:"coredns-787d4945fb-hq5pq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.33.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9295b7cd116", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:23:59.395594 env[1557]: 2024-02-12 22:23:59.356 [INFO][4301] k8s.go 386: Calico CNI using IPs: [192.168.33.66/32] ContainerID="f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d" Namespace="kube-system" Pod="coredns-787d4945fb-hq5pq" WorkloadEndpoint="ip--172--31--25--241-k8s-coredns--787d4945fb--hq5pq-eth0" Feb 12 22:23:59.395594 env[1557]: 2024-02-12 22:23:59.356 [INFO][4301] dataplane_linux.go 68: Setting the host side veth name to cali9295b7cd116 ContainerID="f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d" Namespace="kube-system" Pod="coredns-787d4945fb-hq5pq" WorkloadEndpoint="ip--172--31--25--241-k8s-coredns--787d4945fb--hq5pq-eth0" Feb 12 22:23:59.395594 env[1557]: 2024-02-12 22:23:59.380 [INFO][4301] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d" Namespace="kube-system" Pod="coredns-787d4945fb-hq5pq" WorkloadEndpoint="ip--172--31--25--241-k8s-coredns--787d4945fb--hq5pq-eth0" Feb 12 22:23:59.395594 env[1557]: 2024-02-12 22:23:59.380 [INFO][4301] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d" Namespace="kube-system" Pod="coredns-787d4945fb-hq5pq" WorkloadEndpoint="ip--172--31--25--241-k8s-coredns--787d4945fb--hq5pq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--241-k8s-coredns--787d4945fb--hq5pq-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"e0db5db6-2308-44b2-a5bb-86a966d03452", ResourceVersion:"714", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 23, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-241", ContainerID:"f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d", Pod:"coredns-787d4945fb-hq5pq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.33.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9295b7cd116", MAC:"4e:a9:08:90:4e:ef", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:23:59.395594 env[1557]: 2024-02-12 22:23:59.391 [INFO][4301] k8s.go 491: Wrote updated endpoint to datastore ContainerID="f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d" Namespace="kube-system" Pod="coredns-787d4945fb-hq5pq" WorkloadEndpoint="ip--172--31--25--241-k8s-coredns--787d4945fb--hq5pq-eth0" Feb 12 22:23:59.423329 env[1557]: time="2024-02-12T22:23:59.423248160Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:23:59.429459 env[1557]: time="2024-02-12T22:23:59.429396083Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:23:59.429710 env[1557]: time="2024-02-12T22:23:59.429683647Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:23:59.430526 env[1557]: time="2024-02-12T22:23:59.430471769Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d pid=4337 runtime=io.containerd.runc.v2 Feb 12 22:23:59.481209 systemd[1]: Started cri-containerd-f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d.scope. Feb 12 22:23:59.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.529000 audit: BPF prog-id=159 op=LOAD Feb 12 22:23:59.531000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.531000 audit[4348]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4337 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631653665636433393331356563353663353262306263643666393266 Feb 12 22:23:59.531000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.531000 audit[4348]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4337 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631653665636433393331356563353663353262306263643666393266 Feb 12 22:23:59.531000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.531000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.531000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.531000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.531000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.531000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.531000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.531000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.531000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.531000 audit[4370]: NETFILTER_CFG table=filter:116 family=2 entries=40 op=nft_register_chain pid=4370 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:23:59.531000 audit[4370]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7fffdc0ff4c0 a2=0 a3=7fffdc0ff4ac items=0 ppid=4002 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.531000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:23:59.531000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.531000 audit: BPF prog-id=160 op=LOAD Feb 12 22:23:59.531000 audit[4348]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002e06b0 items=0 ppid=4337 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631653665636433393331356563353663353262306263643666393266 Feb 12 22:23:59.533000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.533000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.533000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.533000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.533000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.533000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.533000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.533000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.533000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.533000 audit: BPF prog-id=161 op=LOAD Feb 12 22:23:59.533000 audit[4348]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002e06f8 items=0 ppid=4337 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631653665636433393331356563353663353262306263643666393266 Feb 12 22:23:59.535000 audit: BPF prog-id=161 op=UNLOAD Feb 12 22:23:59.535000 audit: BPF prog-id=160 op=UNLOAD Feb 12 22:23:59.535000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.535000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.535000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.535000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.535000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.535000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.535000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.535000 audit[4348]: AVC avc: denied { perfmon } for pid=4348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.535000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.535000 audit[4348]: AVC avc: denied { bpf } for pid=4348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.535000 audit: BPF prog-id=162 op=LOAD Feb 12 22:23:59.535000 audit[4348]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002e0b08 items=0 ppid=4337 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631653665636433393331356563353663353262306263643666393266 Feb 12 22:23:59.583086 env[1557]: time="2024-02-12T22:23:59.583033134Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-hq5pq,Uid:e0db5db6-2308-44b2-a5bb-86a966d03452,Namespace:kube-system,Attempt:1,} returns sandbox id \"f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d\"" Feb 12 22:23:59.587888 env[1557]: time="2024-02-12T22:23:59.586206630Z" level=info msg="CreateContainer within sandbox \"f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 22:23:59.608416 env[1557]: time="2024-02-12T22:23:59.608337921Z" level=info msg="CreateContainer within sandbox \"f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"3f43760b3828e14e3222d198d3d0fe396a692c268cfc3f4f136f162a3d9e7264\"" Feb 12 22:23:59.609119 env[1557]: time="2024-02-12T22:23:59.609086453Z" level=info msg="StartContainer for \"3f43760b3828e14e3222d198d3d0fe396a692c268cfc3f4f136f162a3d9e7264\"" Feb 12 22:23:59.638565 systemd[1]: Started cri-containerd-3f43760b3828e14e3222d198d3d0fe396a692c268cfc3f4f136f162a3d9e7264.scope. Feb 12 22:23:59.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.666000 audit: BPF prog-id=163 op=LOAD Feb 12 22:23:59.667000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.667000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4337 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366343337363062333832386531346533323232643139386433643066 Feb 12 22:23:59.668000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.668000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4337 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366343337363062333832386531346533323232643139386433643066 Feb 12 22:23:59.668000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.668000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.668000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.668000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.668000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.668000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.668000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.668000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.668000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.668000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.668000 audit: BPF prog-id=164 op=LOAD Feb 12 22:23:59.668000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000308400 items=0 ppid=4337 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366343337363062333832386531346533323232643139386433643066 Feb 12 22:23:59.669000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.669000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.669000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.669000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.669000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.669000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.669000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.669000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.669000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.669000 audit: BPF prog-id=165 op=LOAD Feb 12 22:23:59.669000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000308448 items=0 ppid=4337 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366343337363062333832386531346533323232643139386433643066 Feb 12 22:23:59.669000 audit: BPF prog-id=165 op=UNLOAD Feb 12 22:23:59.670000 audit: BPF prog-id=164 op=UNLOAD Feb 12 22:23:59.670000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.670000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.670000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.670000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.670000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.670000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.670000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.670000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.670000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.670000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:23:59.670000 audit: BPF prog-id=166 op=LOAD Feb 12 22:23:59.670000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000308858 items=0 ppid=4337 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:23:59.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366343337363062333832386531346533323232643139386433643066 Feb 12 22:23:59.694932 env[1557]: time="2024-02-12T22:23:59.694893101Z" level=info msg="StartContainer for \"3f43760b3828e14e3222d198d3d0fe396a692c268cfc3f4f136f162a3d9e7264\" returns successfully" Feb 12 22:24:00.080003 systemd-networkd[1377]: vxlan.calico: Gained IPv6LL Feb 12 22:24:00.086875 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3685131249.mount: Deactivated successfully. Feb 12 22:24:00.141326 systemd-networkd[1377]: cali919e017736e: Gained IPv6LL Feb 12 22:24:00.114000 audit[2687]: AVC avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:00.114000 audit[2687]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002453d40 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:24:00.114000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:24:00.159876 kernel: kauditd_printk_skb: 332 callbacks suppressed Feb 12 22:24:00.159949 kernel: audit: type=1400 audit(1707776640.114:1279): avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:00.159985 kernel: audit: type=1300 audit(1707776640.114:1279): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002453d40 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:24:00.160019 kernel: audit: type=1327 audit(1707776640.114:1279): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:24:00.160046 kernel: audit: type=1400 audit(1707776640.115:1280): avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:00.160074 kernel: audit: type=1300 audit(1707776640.115:1280): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002940420 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:24:00.160641 kernel: audit: type=1327 audit(1707776640.115:1280): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:24:00.115000 audit[2687]: AVC avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:00.115000 audit[2687]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002940420 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:24:00.115000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:24:00.479000 audit[4439]: NETFILTER_CFG table=filter:117 family=2 entries=12 op=nft_register_rule pid=4439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:24:00.479000 audit[4439]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffc5f24fe30 a2=0 a3=7ffc5f24fe1c items=0 ppid=2972 pid=4439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:00.491955 kernel: audit: type=1325 audit(1707776640.479:1281): table=filter:117 family=2 entries=12 op=nft_register_rule pid=4439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:24:00.492127 kernel: audit: type=1300 audit(1707776640.479:1281): arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffc5f24fe30 a2=0 a3=7ffc5f24fe1c items=0 ppid=2972 pid=4439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:00.492169 kernel: audit: type=1327 audit(1707776640.479:1281): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:24:00.479000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:24:00.479000 audit[4439]: NETFILTER_CFG table=nat:118 family=2 entries=30 op=nft_register_rule pid=4439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:24:00.479000 audit[4439]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffc5f24fe30 a2=0 a3=7ffc5f24fe1c items=0 ppid=2972 pid=4439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:00.479000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:24:00.505877 kernel: audit: type=1325 audit(1707776640.479:1282): table=nat:118 family=2 entries=30 op=nft_register_rule pid=4439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:24:00.654082 systemd-networkd[1377]: cali9295b7cd116: Gained IPv6LL Feb 12 22:24:00.714676 env[1557]: time="2024-02-12T22:24:00.713451646Z" level=info msg="StopPodSandbox for \"997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296\"" Feb 12 22:24:00.789350 kubelet[2807]: I0212 22:24:00.789313 2807 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-hq5pq" podStartSLOduration=42.789268921 pod.CreationTimestamp="2024-02-12 22:23:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:24:00.074237967 +0000 UTC m=+55.594657223" watchObservedRunningTime="2024-02-12 22:24:00.789268921 +0000 UTC m=+56.309688162" Feb 12 22:24:00.840097 env[1557]: 2024-02-12 22:24:00.790 [INFO][4455] k8s.go 578: Cleaning up netns ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" Feb 12 22:24:00.840097 env[1557]: 2024-02-12 22:24:00.790 [INFO][4455] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" iface="eth0" netns="/var/run/netns/cni-0691d4c3-67dd-bfd2-3a87-199272b4dec1" Feb 12 22:24:00.840097 env[1557]: 2024-02-12 22:24:00.790 [INFO][4455] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" iface="eth0" netns="/var/run/netns/cni-0691d4c3-67dd-bfd2-3a87-199272b4dec1" Feb 12 22:24:00.840097 env[1557]: 2024-02-12 22:24:00.790 [INFO][4455] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" iface="eth0" netns="/var/run/netns/cni-0691d4c3-67dd-bfd2-3a87-199272b4dec1" Feb 12 22:24:00.840097 env[1557]: 2024-02-12 22:24:00.790 [INFO][4455] k8s.go 585: Releasing IP address(es) ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" Feb 12 22:24:00.840097 env[1557]: 2024-02-12 22:24:00.790 [INFO][4455] utils.go 188: Calico CNI releasing IP address ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" Feb 12 22:24:00.840097 env[1557]: 2024-02-12 22:24:00.826 [INFO][4461] ipam_plugin.go 415: Releasing address using handleID ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" HandleID="k8s-pod-network.997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" Workload="ip--172--31--25--241-k8s-csi--node--driver--4qkdf-eth0" Feb 12 22:24:00.840097 env[1557]: 2024-02-12 22:24:00.826 [INFO][4461] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:24:00.840097 env[1557]: 2024-02-12 22:24:00.826 [INFO][4461] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:24:00.840097 env[1557]: 2024-02-12 22:24:00.834 [WARNING][4461] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" HandleID="k8s-pod-network.997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" Workload="ip--172--31--25--241-k8s-csi--node--driver--4qkdf-eth0" Feb 12 22:24:00.840097 env[1557]: 2024-02-12 22:24:00.834 [INFO][4461] ipam_plugin.go 443: Releasing address using workloadID ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" HandleID="k8s-pod-network.997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" Workload="ip--172--31--25--241-k8s-csi--node--driver--4qkdf-eth0" Feb 12 22:24:00.840097 env[1557]: 2024-02-12 22:24:00.836 [INFO][4461] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:24:00.840097 env[1557]: 2024-02-12 22:24:00.838 [INFO][4455] k8s.go 591: Teardown processing complete. ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" Feb 12 22:24:00.848647 env[1557]: time="2024-02-12T22:24:00.847382204Z" level=info msg="TearDown network for sandbox \"997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296\" successfully" Feb 12 22:24:00.848647 env[1557]: time="2024-02-12T22:24:00.847432310Z" level=info msg="StopPodSandbox for \"997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296\" returns successfully" Feb 12 22:24:00.848647 env[1557]: time="2024-02-12T22:24:00.848309091Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-4qkdf,Uid:2196ea8e-c0da-421e-83bb-4ead3cb0e76b,Namespace:calico-system,Attempt:1,}" Feb 12 22:24:00.847608 systemd[1]: run-netns-cni\x2d0691d4c3\x2d67dd\x2dbfd2\x2d3a87\x2d199272b4dec1.mount: Deactivated successfully. Feb 12 22:24:00.995000 audit[2680]: AVC avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:00.995000 audit[2680]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c0121355a0 a2=fc6 a3=0 items=0 ppid=2506 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 key=(null) Feb 12 22:24:00.995000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E323431002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 12 22:24:00.996000 audit[2680]: AVC avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:00.996000 audit[2680]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00c2abbc0 a2=fc6 a3=0 items=0 ppid=2506 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 key=(null) Feb 12 22:24:00.996000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E323431002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 12 22:24:01.000000 audit[2680]: AVC avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521276 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:01.000000 audit[2680]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00bcfe000 a2=fc6 a3=0 items=0 ppid=2506 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 key=(null) Feb 12 22:24:01.000000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E323431002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 12 22:24:01.001547 systemd-networkd[1377]: cali442bb88cab3: Link UP Feb 12 22:24:01.004076 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 22:24:01.006126 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali442bb88cab3: link becomes ready Feb 12 22:24:01.004000 audit[2680]: AVC avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521282 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:01.004000 audit[2680]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00bcfe090 a2=fc6 a3=0 items=0 ppid=2506 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 key=(null) Feb 12 22:24:01.004000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E323431002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 12 22:24:01.004507 systemd-networkd[1377]: cali442bb88cab3: Gained carrier Feb 12 22:24:01.024043 env[1557]: 2024-02-12 22:24:00.920 [INFO][4467] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--25--241-k8s-csi--node--driver--4qkdf-eth0 csi-node-driver- calico-system 2196ea8e-c0da-421e-83bb-4ead3cb0e76b 731 0 2024-02-12 22:23:24 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ip-172-31-25-241 csi-node-driver-4qkdf eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali442bb88cab3 [] []}} ContainerID="aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41" Namespace="calico-system" Pod="csi-node-driver-4qkdf" WorkloadEndpoint="ip--172--31--25--241-k8s-csi--node--driver--4qkdf-" Feb 12 22:24:01.024043 env[1557]: 2024-02-12 22:24:00.920 [INFO][4467] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41" Namespace="calico-system" Pod="csi-node-driver-4qkdf" WorkloadEndpoint="ip--172--31--25--241-k8s-csi--node--driver--4qkdf-eth0" Feb 12 22:24:01.024043 env[1557]: 2024-02-12 22:24:00.948 [INFO][4479] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41" HandleID="k8s-pod-network.aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41" Workload="ip--172--31--25--241-k8s-csi--node--driver--4qkdf-eth0" Feb 12 22:24:01.024043 env[1557]: 2024-02-12 22:24:00.960 [INFO][4479] ipam_plugin.go 268: Auto assigning IP ContainerID="aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41" HandleID="k8s-pod-network.aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41" Workload="ip--172--31--25--241-k8s-csi--node--driver--4qkdf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004a1aa0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-25-241", "pod":"csi-node-driver-4qkdf", "timestamp":"2024-02-12 22:24:00.948435774 +0000 UTC"}, Hostname:"ip-172-31-25-241", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:24:01.024043 env[1557]: 2024-02-12 22:24:00.960 [INFO][4479] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:24:01.024043 env[1557]: 2024-02-12 22:24:00.960 [INFO][4479] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:24:01.024043 env[1557]: 2024-02-12 22:24:00.960 [INFO][4479] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-25-241' Feb 12 22:24:01.024043 env[1557]: 2024-02-12 22:24:00.962 [INFO][4479] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41" host="ip-172-31-25-241" Feb 12 22:24:01.024043 env[1557]: 2024-02-12 22:24:00.966 [INFO][4479] ipam.go 372: Looking up existing affinities for host host="ip-172-31-25-241" Feb 12 22:24:01.024043 env[1557]: 2024-02-12 22:24:00.970 [INFO][4479] ipam.go 489: Trying affinity for 192.168.33.64/26 host="ip-172-31-25-241" Feb 12 22:24:01.024043 env[1557]: 2024-02-12 22:24:00.972 [INFO][4479] ipam.go 155: Attempting to load block cidr=192.168.33.64/26 host="ip-172-31-25-241" Feb 12 22:24:01.024043 env[1557]: 2024-02-12 22:24:00.975 [INFO][4479] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.33.64/26 host="ip-172-31-25-241" Feb 12 22:24:01.024043 env[1557]: 2024-02-12 22:24:00.975 [INFO][4479] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.33.64/26 handle="k8s-pod-network.aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41" host="ip-172-31-25-241" Feb 12 22:24:01.024043 env[1557]: 2024-02-12 22:24:00.977 [INFO][4479] ipam.go 1682: Creating new handle: k8s-pod-network.aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41 Feb 12 22:24:01.024043 env[1557]: 2024-02-12 22:24:00.981 [INFO][4479] ipam.go 1203: Writing block in order to claim IPs block=192.168.33.64/26 handle="k8s-pod-network.aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41" host="ip-172-31-25-241" Feb 12 22:24:01.024043 env[1557]: 2024-02-12 22:24:00.988 [INFO][4479] ipam.go 1216: Successfully claimed IPs: [192.168.33.67/26] block=192.168.33.64/26 handle="k8s-pod-network.aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41" host="ip-172-31-25-241" Feb 12 22:24:01.024043 env[1557]: 2024-02-12 22:24:00.988 [INFO][4479] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.33.67/26] handle="k8s-pod-network.aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41" host="ip-172-31-25-241" Feb 12 22:24:01.024043 env[1557]: 2024-02-12 22:24:00.988 [INFO][4479] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:24:01.024043 env[1557]: 2024-02-12 22:24:00.988 [INFO][4479] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.33.67/26] IPv6=[] ContainerID="aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41" HandleID="k8s-pod-network.aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41" Workload="ip--172--31--25--241-k8s-csi--node--driver--4qkdf-eth0" Feb 12 22:24:01.025161 env[1557]: 2024-02-12 22:24:00.991 [INFO][4467] k8s.go 385: Populated endpoint ContainerID="aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41" Namespace="calico-system" Pod="csi-node-driver-4qkdf" WorkloadEndpoint="ip--172--31--25--241-k8s-csi--node--driver--4qkdf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--241-k8s-csi--node--driver--4qkdf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2196ea8e-c0da-421e-83bb-4ead3cb0e76b", ResourceVersion:"731", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 23, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-241", ContainerID:"", Pod:"csi-node-driver-4qkdf", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.33.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali442bb88cab3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:24:01.025161 env[1557]: 2024-02-12 22:24:00.991 [INFO][4467] k8s.go 386: Calico CNI using IPs: [192.168.33.67/32] ContainerID="aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41" Namespace="calico-system" Pod="csi-node-driver-4qkdf" WorkloadEndpoint="ip--172--31--25--241-k8s-csi--node--driver--4qkdf-eth0" Feb 12 22:24:01.025161 env[1557]: 2024-02-12 22:24:00.991 [INFO][4467] dataplane_linux.go 68: Setting the host side veth name to cali442bb88cab3 ContainerID="aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41" Namespace="calico-system" Pod="csi-node-driver-4qkdf" WorkloadEndpoint="ip--172--31--25--241-k8s-csi--node--driver--4qkdf-eth0" Feb 12 22:24:01.025161 env[1557]: 2024-02-12 22:24:01.004 [INFO][4467] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41" Namespace="calico-system" Pod="csi-node-driver-4qkdf" WorkloadEndpoint="ip--172--31--25--241-k8s-csi--node--driver--4qkdf-eth0" Feb 12 22:24:01.025161 env[1557]: 2024-02-12 22:24:01.004 [INFO][4467] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41" Namespace="calico-system" Pod="csi-node-driver-4qkdf" WorkloadEndpoint="ip--172--31--25--241-k8s-csi--node--driver--4qkdf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--241-k8s-csi--node--driver--4qkdf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2196ea8e-c0da-421e-83bb-4ead3cb0e76b", ResourceVersion:"731", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 23, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-241", ContainerID:"aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41", Pod:"csi-node-driver-4qkdf", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.33.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali442bb88cab3", MAC:"06:49:aa:60:63:96", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:24:01.025161 env[1557]: 2024-02-12 22:24:01.021 [INFO][4467] k8s.go 491: Wrote updated endpoint to datastore ContainerID="aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41" Namespace="calico-system" Pod="csi-node-driver-4qkdf" WorkloadEndpoint="ip--172--31--25--241-k8s-csi--node--driver--4qkdf-eth0" Feb 12 22:24:01.046000 audit[2680]: AVC avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:01.046000 audit[2680]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00b9561b0 a2=fc6 a3=0 items=0 ppid=2506 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 key=(null) Feb 12 22:24:01.046000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E323431002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 12 22:24:01.046000 audit[2680]: AVC avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:01.046000 audit[2680]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c011ce9300 a2=fc6 a3=0 items=0 ppid=2506 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 key=(null) Feb 12 22:24:01.046000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E323431002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 12 22:24:01.051126 env[1557]: time="2024-02-12T22:24:01.046942515Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:24:01.051126 env[1557]: time="2024-02-12T22:24:01.047038795Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:24:01.051126 env[1557]: time="2024-02-12T22:24:01.047070071Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:24:01.051126 env[1557]: time="2024-02-12T22:24:01.047338376Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41 pid=4510 runtime=io.containerd.runc.v2 Feb 12 22:24:01.051000 audit[4512]: NETFILTER_CFG table=filter:119 family=2 entries=44 op=nft_register_chain pid=4512 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:24:01.051000 audit[4512]: SYSCALL arch=c000003e syscall=46 success=yes exit=22360 a0=3 a1=7ffcd4b504d0 a2=0 a3=7ffcd4b504bc items=0 ppid=4002 pid=4512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:01.051000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:24:01.097580 systemd[1]: Started cri-containerd-aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41.scope. Feb 12 22:24:01.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.147000 audit: BPF prog-id=167 op=LOAD Feb 12 22:24:01.148000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.148000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4510 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:01.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161666532626365616561356131656239366138613935383532353762 Feb 12 22:24:01.148000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.148000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4510 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:01.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161666532626365616561356131656239366138613935383532353762 Feb 12 22:24:01.148000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.148000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.148000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.148000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.148000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.148000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.148000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.148000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.148000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.148000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.148000 audit: BPF prog-id=168 op=LOAD Feb 12 22:24:01.148000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000364750 items=0 ppid=4510 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:01.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161666532626365616561356131656239366138613935383532353762 Feb 12 22:24:01.149000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.149000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.149000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.149000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.149000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.149000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.149000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.149000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.149000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.149000 audit: BPF prog-id=169 op=LOAD Feb 12 22:24:01.149000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000364798 items=0 ppid=4510 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:01.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161666532626365616561356131656239366138613935383532353762 Feb 12 22:24:01.149000 audit: BPF prog-id=169 op=UNLOAD Feb 12 22:24:01.149000 audit: BPF prog-id=168 op=UNLOAD Feb 12 22:24:01.149000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.149000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.149000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.149000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.149000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.149000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.149000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.149000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.149000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.149000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:01.149000 audit: BPF prog-id=170 op=LOAD Feb 12 22:24:01.149000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000364ba8 items=0 ppid=4510 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:01.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161666532626365616561356131656239366138613935383532353762 Feb 12 22:24:01.169561 env[1557]: time="2024-02-12T22:24:01.169507204Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-4qkdf,Uid:2196ea8e-c0da-421e-83bb-4ead3cb0e76b,Namespace:calico-system,Attempt:1,} returns sandbox id \"aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41\"" Feb 12 22:24:01.208000 audit[4571]: NETFILTER_CFG table=filter:120 family=2 entries=9 op=nft_register_rule pid=4571 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:24:01.208000 audit[4571]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe61ca73f0 a2=0 a3=7ffe61ca73dc items=0 ppid=2972 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:01.208000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:24:01.211000 audit[4571]: NETFILTER_CFG table=nat:121 family=2 entries=51 op=nft_register_chain pid=4571 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:24:01.211000 audit[4571]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffe61ca73f0 a2=0 a3=7ffe61ca73dc items=0 ppid=2972 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:01.211000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:24:01.713579 env[1557]: time="2024-02-12T22:24:01.713526754Z" level=info msg="StopPodSandbox for \"1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf\"" Feb 12 22:24:01.871080 env[1557]: 2024-02-12 22:24:01.811 [INFO][4586] k8s.go 578: Cleaning up netns ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" Feb 12 22:24:01.871080 env[1557]: 2024-02-12 22:24:01.811 [INFO][4586] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" iface="eth0" netns="/var/run/netns/cni-39a5f158-1419-4aad-60d1-e148f2671fec" Feb 12 22:24:01.871080 env[1557]: 2024-02-12 22:24:01.812 [INFO][4586] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" iface="eth0" netns="/var/run/netns/cni-39a5f158-1419-4aad-60d1-e148f2671fec" Feb 12 22:24:01.871080 env[1557]: 2024-02-12 22:24:01.812 [INFO][4586] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" iface="eth0" netns="/var/run/netns/cni-39a5f158-1419-4aad-60d1-e148f2671fec" Feb 12 22:24:01.871080 env[1557]: 2024-02-12 22:24:01.812 [INFO][4586] k8s.go 585: Releasing IP address(es) ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" Feb 12 22:24:01.871080 env[1557]: 2024-02-12 22:24:01.812 [INFO][4586] utils.go 188: Calico CNI releasing IP address ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" Feb 12 22:24:01.871080 env[1557]: 2024-02-12 22:24:01.852 [INFO][4593] ipam_plugin.go 415: Releasing address using handleID ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" HandleID="k8s-pod-network.1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" Workload="ip--172--31--25--241-k8s-coredns--787d4945fb--sb959-eth0" Feb 12 22:24:01.871080 env[1557]: 2024-02-12 22:24:01.852 [INFO][4593] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:24:01.871080 env[1557]: 2024-02-12 22:24:01.852 [INFO][4593] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:24:01.871080 env[1557]: 2024-02-12 22:24:01.865 [WARNING][4593] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" HandleID="k8s-pod-network.1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" Workload="ip--172--31--25--241-k8s-coredns--787d4945fb--sb959-eth0" Feb 12 22:24:01.871080 env[1557]: 2024-02-12 22:24:01.865 [INFO][4593] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" HandleID="k8s-pod-network.1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" Workload="ip--172--31--25--241-k8s-coredns--787d4945fb--sb959-eth0" Feb 12 22:24:01.871080 env[1557]: 2024-02-12 22:24:01.867 [INFO][4593] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:24:01.871080 env[1557]: 2024-02-12 22:24:01.869 [INFO][4586] k8s.go 591: Teardown processing complete. ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" Feb 12 22:24:01.875391 systemd[1]: run-netns-cni\x2d39a5f158\x2d1419\x2d4aad\x2d60d1\x2de148f2671fec.mount: Deactivated successfully. Feb 12 22:24:01.876586 env[1557]: time="2024-02-12T22:24:01.876512928Z" level=info msg="TearDown network for sandbox \"1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf\" successfully" Feb 12 22:24:01.876586 env[1557]: time="2024-02-12T22:24:01.876563535Z" level=info msg="StopPodSandbox for \"1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf\" returns successfully" Feb 12 22:24:01.877631 env[1557]: time="2024-02-12T22:24:01.877587918Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-sb959,Uid:9653bac9-fb07-4fb8-9d87-e5c643305cb2,Namespace:kube-system,Attempt:1,}" Feb 12 22:24:02.045104 systemd-networkd[1377]: cali410b90be2c1: Link UP Feb 12 22:24:02.046444 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 22:24:02.046499 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali410b90be2c1: link becomes ready Feb 12 22:24:02.046600 systemd-networkd[1377]: cali410b90be2c1: Gained carrier Feb 12 22:24:02.073470 env[1557]: 2024-02-12 22:24:01.949 [INFO][4600] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--25--241-k8s-coredns--787d4945fb--sb959-eth0 coredns-787d4945fb- kube-system 9653bac9-fb07-4fb8-9d87-e5c643305cb2 743 0 2024-02-12 22:23:18 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-25-241 coredns-787d4945fb-sb959 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali410b90be2c1 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11" Namespace="kube-system" Pod="coredns-787d4945fb-sb959" WorkloadEndpoint="ip--172--31--25--241-k8s-coredns--787d4945fb--sb959-" Feb 12 22:24:02.073470 env[1557]: 2024-02-12 22:24:01.949 [INFO][4600] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11" Namespace="kube-system" Pod="coredns-787d4945fb-sb959" WorkloadEndpoint="ip--172--31--25--241-k8s-coredns--787d4945fb--sb959-eth0" Feb 12 22:24:02.073470 env[1557]: 2024-02-12 22:24:01.992 [INFO][4611] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11" HandleID="k8s-pod-network.44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11" Workload="ip--172--31--25--241-k8s-coredns--787d4945fb--sb959-eth0" Feb 12 22:24:02.073470 env[1557]: 2024-02-12 22:24:02.005 [INFO][4611] ipam_plugin.go 268: Auto assigning IP ContainerID="44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11" HandleID="k8s-pod-network.44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11" Workload="ip--172--31--25--241-k8s-coredns--787d4945fb--sb959-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027d950), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-25-241", "pod":"coredns-787d4945fb-sb959", "timestamp":"2024-02-12 22:24:01.992434638 +0000 UTC"}, Hostname:"ip-172-31-25-241", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:24:02.073470 env[1557]: 2024-02-12 22:24:02.005 [INFO][4611] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:24:02.073470 env[1557]: 2024-02-12 22:24:02.005 [INFO][4611] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:24:02.073470 env[1557]: 2024-02-12 22:24:02.005 [INFO][4611] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-25-241' Feb 12 22:24:02.073470 env[1557]: 2024-02-12 22:24:02.008 [INFO][4611] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11" host="ip-172-31-25-241" Feb 12 22:24:02.073470 env[1557]: 2024-02-12 22:24:02.013 [INFO][4611] ipam.go 372: Looking up existing affinities for host host="ip-172-31-25-241" Feb 12 22:24:02.073470 env[1557]: 2024-02-12 22:24:02.019 [INFO][4611] ipam.go 489: Trying affinity for 192.168.33.64/26 host="ip-172-31-25-241" Feb 12 22:24:02.073470 env[1557]: 2024-02-12 22:24:02.021 [INFO][4611] ipam.go 155: Attempting to load block cidr=192.168.33.64/26 host="ip-172-31-25-241" Feb 12 22:24:02.073470 env[1557]: 2024-02-12 22:24:02.024 [INFO][4611] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.33.64/26 host="ip-172-31-25-241" Feb 12 22:24:02.073470 env[1557]: 2024-02-12 22:24:02.025 [INFO][4611] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.33.64/26 handle="k8s-pod-network.44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11" host="ip-172-31-25-241" Feb 12 22:24:02.073470 env[1557]: 2024-02-12 22:24:02.026 [INFO][4611] ipam.go 1682: Creating new handle: k8s-pod-network.44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11 Feb 12 22:24:02.073470 env[1557]: 2024-02-12 22:24:02.031 [INFO][4611] ipam.go 1203: Writing block in order to claim IPs block=192.168.33.64/26 handle="k8s-pod-network.44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11" host="ip-172-31-25-241" Feb 12 22:24:02.073470 env[1557]: 2024-02-12 22:24:02.038 [INFO][4611] ipam.go 1216: Successfully claimed IPs: [192.168.33.68/26] block=192.168.33.64/26 handle="k8s-pod-network.44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11" host="ip-172-31-25-241" Feb 12 22:24:02.073470 env[1557]: 2024-02-12 22:24:02.038 [INFO][4611] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.33.68/26] handle="k8s-pod-network.44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11" host="ip-172-31-25-241" Feb 12 22:24:02.073470 env[1557]: 2024-02-12 22:24:02.038 [INFO][4611] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:24:02.073470 env[1557]: 2024-02-12 22:24:02.038 [INFO][4611] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.33.68/26] IPv6=[] ContainerID="44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11" HandleID="k8s-pod-network.44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11" Workload="ip--172--31--25--241-k8s-coredns--787d4945fb--sb959-eth0" Feb 12 22:24:02.074462 env[1557]: 2024-02-12 22:24:02.040 [INFO][4600] k8s.go 385: Populated endpoint ContainerID="44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11" Namespace="kube-system" Pod="coredns-787d4945fb-sb959" WorkloadEndpoint="ip--172--31--25--241-k8s-coredns--787d4945fb--sb959-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--241-k8s-coredns--787d4945fb--sb959-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"9653bac9-fb07-4fb8-9d87-e5c643305cb2", ResourceVersion:"743", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 23, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-241", ContainerID:"", Pod:"coredns-787d4945fb-sb959", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.33.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali410b90be2c1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:24:02.074462 env[1557]: 2024-02-12 22:24:02.040 [INFO][4600] k8s.go 386: Calico CNI using IPs: [192.168.33.68/32] ContainerID="44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11" Namespace="kube-system" Pod="coredns-787d4945fb-sb959" WorkloadEndpoint="ip--172--31--25--241-k8s-coredns--787d4945fb--sb959-eth0" Feb 12 22:24:02.074462 env[1557]: 2024-02-12 22:24:02.040 [INFO][4600] dataplane_linux.go 68: Setting the host side veth name to cali410b90be2c1 ContainerID="44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11" Namespace="kube-system" Pod="coredns-787d4945fb-sb959" WorkloadEndpoint="ip--172--31--25--241-k8s-coredns--787d4945fb--sb959-eth0" Feb 12 22:24:02.074462 env[1557]: 2024-02-12 22:24:02.045 [INFO][4600] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11" Namespace="kube-system" Pod="coredns-787d4945fb-sb959" WorkloadEndpoint="ip--172--31--25--241-k8s-coredns--787d4945fb--sb959-eth0" Feb 12 22:24:02.074462 env[1557]: 2024-02-12 22:24:02.047 [INFO][4600] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11" Namespace="kube-system" Pod="coredns-787d4945fb-sb959" WorkloadEndpoint="ip--172--31--25--241-k8s-coredns--787d4945fb--sb959-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--241-k8s-coredns--787d4945fb--sb959-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"9653bac9-fb07-4fb8-9d87-e5c643305cb2", ResourceVersion:"743", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 23, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-241", ContainerID:"44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11", Pod:"coredns-787d4945fb-sb959", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.33.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali410b90be2c1", MAC:"0e:16:3c:37:61:41", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:24:02.074462 env[1557]: 2024-02-12 22:24:02.059 [INFO][4600] k8s.go 491: Wrote updated endpoint to datastore ContainerID="44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11" Namespace="kube-system" Pod="coredns-787d4945fb-sb959" WorkloadEndpoint="ip--172--31--25--241-k8s-coredns--787d4945fb--sb959-eth0" Feb 12 22:24:02.098000 audit[4631]: NETFILTER_CFG table=filter:122 family=2 entries=40 op=nft_register_chain pid=4631 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:24:02.098000 audit[4631]: SYSCALL arch=c000003e syscall=46 success=yes exit=20736 a0=3 a1=7ffd2128a440 a2=0 a3=7ffd2128a42c items=0 ppid=4002 pid=4631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:02.098000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:24:02.119975 env[1557]: time="2024-02-12T22:24:02.119838731Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:24:02.119975 env[1557]: time="2024-02-12T22:24:02.119925787Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:24:02.120231 env[1557]: time="2024-02-12T22:24:02.119942304Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:24:02.120374 env[1557]: time="2024-02-12T22:24:02.120211258Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11 pid=4639 runtime=io.containerd.runc.v2 Feb 12 22:24:02.157546 systemd[1]: Started cri-containerd-44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11.scope. Feb 12 22:24:02.161569 systemd[1]: run-containerd-runc-k8s.io-44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11-runc.qyEwKu.mount: Deactivated successfully. Feb 12 22:24:02.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.185000 audit: BPF prog-id=171 op=LOAD Feb 12 22:24:02.186000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.186000 audit[4651]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=4639 pid=4651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:02.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434333937653336393162666637626534353537316130343962303465 Feb 12 22:24:02.186000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.186000 audit[4651]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=4639 pid=4651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:02.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434333937653336393162666637626534353537316130343962303465 Feb 12 22:24:02.186000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.186000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.186000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.186000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.186000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.186000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.186000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.186000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.186000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.186000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.186000 audit: BPF prog-id=172 op=LOAD Feb 12 22:24:02.186000 audit[4651]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c00021c430 items=0 ppid=4639 pid=4651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:02.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434333937653336393162666637626534353537316130343962303465 Feb 12 22:24:02.187000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.187000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.187000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.187000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.187000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.187000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.187000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.187000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.187000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.187000 audit: BPF prog-id=173 op=LOAD Feb 12 22:24:02.187000 audit[4651]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c00021c478 items=0 ppid=4639 pid=4651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:02.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434333937653336393162666637626534353537316130343962303465 Feb 12 22:24:02.187000 audit: BPF prog-id=173 op=UNLOAD Feb 12 22:24:02.187000 audit: BPF prog-id=172 op=UNLOAD Feb 12 22:24:02.187000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.187000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.187000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.187000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.187000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.187000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.187000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.187000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.187000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.187000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.187000 audit: BPF prog-id=174 op=LOAD Feb 12 22:24:02.187000 audit[4651]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c00021c888 items=0 ppid=4639 pid=4651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:02.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434333937653336393162666637626534353537316130343962303465 Feb 12 22:24:02.226898 env[1557]: time="2024-02-12T22:24:02.226023002Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-sb959,Uid:9653bac9-fb07-4fb8-9d87-e5c643305cb2,Namespace:kube-system,Attempt:1,} returns sandbox id \"44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11\"" Feb 12 22:24:02.231367 env[1557]: time="2024-02-12T22:24:02.231323115Z" level=info msg="CreateContainer within sandbox \"44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 22:24:02.252603 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3697609175.mount: Deactivated successfully. Feb 12 22:24:02.263215 env[1557]: time="2024-02-12T22:24:02.263152318Z" level=info msg="CreateContainer within sandbox \"44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"5b5754ef858adc7fee648a300c0f2136a3b7fa2fa60224b93d58840ee002ee36\"" Feb 12 22:24:02.263994 env[1557]: time="2024-02-12T22:24:02.263947045Z" level=info msg="StartContainer for \"5b5754ef858adc7fee648a300c0f2136a3b7fa2fa60224b93d58840ee002ee36\"" Feb 12 22:24:02.290636 systemd[1]: Started cri-containerd-5b5754ef858adc7fee648a300c0f2136a3b7fa2fa60224b93d58840ee002ee36.scope. Feb 12 22:24:02.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.303000 audit: BPF prog-id=175 op=LOAD Feb 12 22:24:02.304000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.304000 audit[4682]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4639 pid=4682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:02.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562353735346566383538616463376665653634386133303063306632 Feb 12 22:24:02.304000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.304000 audit[4682]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4639 pid=4682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:02.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562353735346566383538616463376665653634386133303063306632 Feb 12 22:24:02.304000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.304000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.304000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.304000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.304000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.304000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.304000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.304000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.304000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.304000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.304000 audit: BPF prog-id=176 op=LOAD Feb 12 22:24:02.304000 audit[4682]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000316120 items=0 ppid=4639 pid=4682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:02.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562353735346566383538616463376665653634386133303063306632 Feb 12 22:24:02.305000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.305000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.305000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.305000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.305000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.305000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.305000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.305000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.305000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.305000 audit: BPF prog-id=177 op=LOAD Feb 12 22:24:02.305000 audit[4682]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000316168 items=0 ppid=4639 pid=4682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:02.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562353735346566383538616463376665653634386133303063306632 Feb 12 22:24:02.305000 audit: BPF prog-id=177 op=UNLOAD Feb 12 22:24:02.305000 audit: BPF prog-id=176 op=UNLOAD Feb 12 22:24:02.305000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.305000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.305000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.305000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.305000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.305000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.305000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.305000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.305000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.305000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:02.305000 audit: BPF prog-id=178 op=LOAD Feb 12 22:24:02.305000 audit[4682]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000316578 items=0 ppid=4639 pid=4682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:02.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562353735346566383538616463376665653634386133303063306632 Feb 12 22:24:02.343284 env[1557]: time="2024-02-12T22:24:02.343233253Z" level=info msg="StartContainer for \"5b5754ef858adc7fee648a300c0f2136a3b7fa2fa60224b93d58840ee002ee36\" returns successfully" Feb 12 22:24:02.829087 systemd-networkd[1377]: cali442bb88cab3: Gained IPv6LL Feb 12 22:24:03.115740 kubelet[2807]: I0212 22:24:03.115639 2807 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-sb959" podStartSLOduration=45.115570404 pod.CreationTimestamp="2024-02-12 22:23:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:24:03.096429966 +0000 UTC m=+58.616849208" watchObservedRunningTime="2024-02-12 22:24:03.115570404 +0000 UTC m=+58.635989649" Feb 12 22:24:03.196000 audit[4735]: NETFILTER_CFG table=filter:123 family=2 entries=6 op=nft_register_rule pid=4735 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:24:03.196000 audit[4735]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffcda84b6d0 a2=0 a3=7ffcda84b6bc items=0 ppid=2972 pid=4735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:03.196000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:24:03.199000 audit[4735]: NETFILTER_CFG table=nat:124 family=2 entries=60 op=nft_register_rule pid=4735 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:24:03.199000 audit[4735]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffcda84b6d0 a2=0 a3=7ffcda84b6bc items=0 ppid=2972 pid=4735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:03.199000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:24:03.250000 audit[4761]: NETFILTER_CFG table=filter:125 family=2 entries=6 op=nft_register_rule pid=4761 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:24:03.250000 audit[4761]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff4ffd0d20 a2=0 a3=7fff4ffd0d0c items=0 ppid=2972 pid=4761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:03.250000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:24:03.262000 audit[4761]: NETFILTER_CFG table=nat:126 family=2 entries=72 op=nft_register_chain pid=4761 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:24:03.262000 audit[4761]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff4ffd0d20 a2=0 a3=7fff4ffd0d0c items=0 ppid=2972 pid=4761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:03.262000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:24:03.277064 systemd-networkd[1377]: cali410b90be2c1: Gained IPv6LL Feb 12 22:24:04.625128 env[1557]: time="2024-02-12T22:24:04.625089559Z" level=info msg="StopPodSandbox for \"1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf\"" Feb 12 22:24:04.744683 env[1557]: 2024-02-12 22:24:04.701 [WARNING][4782] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--241-k8s-coredns--787d4945fb--sb959-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"9653bac9-fb07-4fb8-9d87-e5c643305cb2", ResourceVersion:"757", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 23, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-241", ContainerID:"44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11", Pod:"coredns-787d4945fb-sb959", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.33.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali410b90be2c1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:24:04.744683 env[1557]: 2024-02-12 22:24:04.701 [INFO][4782] k8s.go 578: Cleaning up netns ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" Feb 12 22:24:04.744683 env[1557]: 2024-02-12 22:24:04.701 [INFO][4782] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" iface="eth0" netns="" Feb 12 22:24:04.744683 env[1557]: 2024-02-12 22:24:04.701 [INFO][4782] k8s.go 585: Releasing IP address(es) ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" Feb 12 22:24:04.744683 env[1557]: 2024-02-12 22:24:04.701 [INFO][4782] utils.go 188: Calico CNI releasing IP address ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" Feb 12 22:24:04.744683 env[1557]: 2024-02-12 22:24:04.733 [INFO][4789] ipam_plugin.go 415: Releasing address using handleID ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" HandleID="k8s-pod-network.1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" Workload="ip--172--31--25--241-k8s-coredns--787d4945fb--sb959-eth0" Feb 12 22:24:04.744683 env[1557]: 2024-02-12 22:24:04.733 [INFO][4789] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:24:04.744683 env[1557]: 2024-02-12 22:24:04.733 [INFO][4789] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:24:04.744683 env[1557]: 2024-02-12 22:24:04.740 [WARNING][4789] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" HandleID="k8s-pod-network.1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" Workload="ip--172--31--25--241-k8s-coredns--787d4945fb--sb959-eth0" Feb 12 22:24:04.744683 env[1557]: 2024-02-12 22:24:04.740 [INFO][4789] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" HandleID="k8s-pod-network.1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" Workload="ip--172--31--25--241-k8s-coredns--787d4945fb--sb959-eth0" Feb 12 22:24:04.744683 env[1557]: 2024-02-12 22:24:04.741 [INFO][4789] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:24:04.744683 env[1557]: 2024-02-12 22:24:04.743 [INFO][4782] k8s.go 591: Teardown processing complete. ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" Feb 12 22:24:04.745501 env[1557]: time="2024-02-12T22:24:04.744715608Z" level=info msg="TearDown network for sandbox \"1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf\" successfully" Feb 12 22:24:04.745501 env[1557]: time="2024-02-12T22:24:04.744754183Z" level=info msg="StopPodSandbox for \"1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf\" returns successfully" Feb 12 22:24:04.745680 env[1557]: time="2024-02-12T22:24:04.745646764Z" level=info msg="RemovePodSandbox for \"1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf\"" Feb 12 22:24:04.745747 env[1557]: time="2024-02-12T22:24:04.745685905Z" level=info msg="Forcibly stopping sandbox \"1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf\"" Feb 12 22:24:04.829223 env[1557]: 2024-02-12 22:24:04.793 [WARNING][4808] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--241-k8s-coredns--787d4945fb--sb959-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"9653bac9-fb07-4fb8-9d87-e5c643305cb2", ResourceVersion:"757", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 23, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-241", ContainerID:"44397e3691bff7be45571a049b04efdf1d543e85da27c58de54b36af93ad1d11", Pod:"coredns-787d4945fb-sb959", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.33.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali410b90be2c1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:24:04.829223 env[1557]: 2024-02-12 22:24:04.794 [INFO][4808] k8s.go 578: Cleaning up netns ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" Feb 12 22:24:04.829223 env[1557]: 2024-02-12 22:24:04.794 [INFO][4808] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" iface="eth0" netns="" Feb 12 22:24:04.829223 env[1557]: 2024-02-12 22:24:04.794 [INFO][4808] k8s.go 585: Releasing IP address(es) ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" Feb 12 22:24:04.829223 env[1557]: 2024-02-12 22:24:04.794 [INFO][4808] utils.go 188: Calico CNI releasing IP address ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" Feb 12 22:24:04.829223 env[1557]: 2024-02-12 22:24:04.816 [INFO][4814] ipam_plugin.go 415: Releasing address using handleID ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" HandleID="k8s-pod-network.1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" Workload="ip--172--31--25--241-k8s-coredns--787d4945fb--sb959-eth0" Feb 12 22:24:04.829223 env[1557]: 2024-02-12 22:24:04.817 [INFO][4814] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:24:04.829223 env[1557]: 2024-02-12 22:24:04.817 [INFO][4814] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:24:04.829223 env[1557]: 2024-02-12 22:24:04.824 [WARNING][4814] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" HandleID="k8s-pod-network.1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" Workload="ip--172--31--25--241-k8s-coredns--787d4945fb--sb959-eth0" Feb 12 22:24:04.829223 env[1557]: 2024-02-12 22:24:04.824 [INFO][4814] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" HandleID="k8s-pod-network.1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" Workload="ip--172--31--25--241-k8s-coredns--787d4945fb--sb959-eth0" Feb 12 22:24:04.829223 env[1557]: 2024-02-12 22:24:04.826 [INFO][4814] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:24:04.829223 env[1557]: 2024-02-12 22:24:04.827 [INFO][4808] k8s.go 591: Teardown processing complete. ContainerID="1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf" Feb 12 22:24:04.830064 env[1557]: time="2024-02-12T22:24:04.829268388Z" level=info msg="TearDown network for sandbox \"1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf\" successfully" Feb 12 22:24:04.840082 env[1557]: time="2024-02-12T22:24:04.840041308Z" level=info msg="RemovePodSandbox \"1fd91e2d58e81110f45e07d2889c92e79b3ffdf3db783e3f183a1edf2b1962cf\" returns successfully" Feb 12 22:24:04.840525 env[1557]: time="2024-02-12T22:24:04.840500662Z" level=info msg="StopPodSandbox for \"e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f\"" Feb 12 22:24:04.922526 env[1557]: 2024-02-12 22:24:04.885 [WARNING][4833] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--241-k8s-calico--kube--controllers--55565955d8--929dl-eth0", GenerateName:"calico-kube-controllers-55565955d8-", Namespace:"calico-system", SelfLink:"", UID:"33f002e0-5134-437b-9e2c-765a200b98f8", ResourceVersion:"709", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 23, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55565955d8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-241", ContainerID:"2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b", Pod:"calico-kube-controllers-55565955d8-929dl", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.33.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali919e017736e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:24:04.922526 env[1557]: 2024-02-12 22:24:04.886 [INFO][4833] k8s.go 578: Cleaning up netns ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" Feb 12 22:24:04.922526 env[1557]: 2024-02-12 22:24:04.886 [INFO][4833] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" iface="eth0" netns="" Feb 12 22:24:04.922526 env[1557]: 2024-02-12 22:24:04.886 [INFO][4833] k8s.go 585: Releasing IP address(es) ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" Feb 12 22:24:04.922526 env[1557]: 2024-02-12 22:24:04.886 [INFO][4833] utils.go 188: Calico CNI releasing IP address ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" Feb 12 22:24:04.922526 env[1557]: 2024-02-12 22:24:04.908 [INFO][4839] ipam_plugin.go 415: Releasing address using handleID ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" HandleID="k8s-pod-network.e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" Workload="ip--172--31--25--241-k8s-calico--kube--controllers--55565955d8--929dl-eth0" Feb 12 22:24:04.922526 env[1557]: 2024-02-12 22:24:04.908 [INFO][4839] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:24:04.922526 env[1557]: 2024-02-12 22:24:04.908 [INFO][4839] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:24:04.922526 env[1557]: 2024-02-12 22:24:04.915 [WARNING][4839] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" HandleID="k8s-pod-network.e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" Workload="ip--172--31--25--241-k8s-calico--kube--controllers--55565955d8--929dl-eth0" Feb 12 22:24:04.922526 env[1557]: 2024-02-12 22:24:04.915 [INFO][4839] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" HandleID="k8s-pod-network.e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" Workload="ip--172--31--25--241-k8s-calico--kube--controllers--55565955d8--929dl-eth0" Feb 12 22:24:04.922526 env[1557]: 2024-02-12 22:24:04.917 [INFO][4839] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:24:04.922526 env[1557]: 2024-02-12 22:24:04.918 [INFO][4833] k8s.go 591: Teardown processing complete. ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" Feb 12 22:24:04.922526 env[1557]: time="2024-02-12T22:24:04.921078904Z" level=info msg="TearDown network for sandbox \"e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f\" successfully" Feb 12 22:24:04.922526 env[1557]: time="2024-02-12T22:24:04.921111450Z" level=info msg="StopPodSandbox for \"e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f\" returns successfully" Feb 12 22:24:04.923456 env[1557]: time="2024-02-12T22:24:04.923423190Z" level=info msg="RemovePodSandbox for \"e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f\"" Feb 12 22:24:04.923564 env[1557]: time="2024-02-12T22:24:04.923462513Z" level=info msg="Forcibly stopping sandbox \"e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f\"" Feb 12 22:24:05.057431 env[1557]: 2024-02-12 22:24:04.972 [WARNING][4857] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--241-k8s-calico--kube--controllers--55565955d8--929dl-eth0", GenerateName:"calico-kube-controllers-55565955d8-", Namespace:"calico-system", SelfLink:"", UID:"33f002e0-5134-437b-9e2c-765a200b98f8", ResourceVersion:"709", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 23, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55565955d8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-241", ContainerID:"2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b", Pod:"calico-kube-controllers-55565955d8-929dl", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.33.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali919e017736e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:24:05.057431 env[1557]: 2024-02-12 22:24:04.973 [INFO][4857] k8s.go 578: Cleaning up netns ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" Feb 12 22:24:05.057431 env[1557]: 2024-02-12 22:24:04.975 [INFO][4857] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" iface="eth0" netns="" Feb 12 22:24:05.057431 env[1557]: 2024-02-12 22:24:04.975 [INFO][4857] k8s.go 585: Releasing IP address(es) ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" Feb 12 22:24:05.057431 env[1557]: 2024-02-12 22:24:04.975 [INFO][4857] utils.go 188: Calico CNI releasing IP address ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" Feb 12 22:24:05.057431 env[1557]: 2024-02-12 22:24:05.041 [INFO][4863] ipam_plugin.go 415: Releasing address using handleID ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" HandleID="k8s-pod-network.e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" Workload="ip--172--31--25--241-k8s-calico--kube--controllers--55565955d8--929dl-eth0" Feb 12 22:24:05.057431 env[1557]: 2024-02-12 22:24:05.041 [INFO][4863] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:24:05.057431 env[1557]: 2024-02-12 22:24:05.042 [INFO][4863] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:24:05.057431 env[1557]: 2024-02-12 22:24:05.050 [WARNING][4863] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" HandleID="k8s-pod-network.e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" Workload="ip--172--31--25--241-k8s-calico--kube--controllers--55565955d8--929dl-eth0" Feb 12 22:24:05.057431 env[1557]: 2024-02-12 22:24:05.050 [INFO][4863] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" HandleID="k8s-pod-network.e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" Workload="ip--172--31--25--241-k8s-calico--kube--controllers--55565955d8--929dl-eth0" Feb 12 22:24:05.057431 env[1557]: 2024-02-12 22:24:05.052 [INFO][4863] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:24:05.057431 env[1557]: 2024-02-12 22:24:05.054 [INFO][4857] k8s.go 591: Teardown processing complete. ContainerID="e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f" Feb 12 22:24:05.058171 env[1557]: time="2024-02-12T22:24:05.057474215Z" level=info msg="TearDown network for sandbox \"e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f\" successfully" Feb 12 22:24:05.067437 env[1557]: time="2024-02-12T22:24:05.067387387Z" level=info msg="RemovePodSandbox \"e3257567fc4263187893e45375e13f436b0fd70e2b48354d6f111e04ab5eb97f\" returns successfully" Feb 12 22:24:05.068307 env[1557]: time="2024-02-12T22:24:05.068260963Z" level=info msg="StopPodSandbox for \"614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc\"" Feb 12 22:24:05.177712 env[1557]: 2024-02-12 22:24:05.136 [WARNING][4882] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--241-k8s-coredns--787d4945fb--hq5pq-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"e0db5db6-2308-44b2-a5bb-86a966d03452", ResourceVersion:"735", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 23, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-241", ContainerID:"f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d", Pod:"coredns-787d4945fb-hq5pq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.33.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9295b7cd116", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:24:05.177712 env[1557]: 2024-02-12 22:24:05.137 [INFO][4882] k8s.go 578: Cleaning up netns ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" Feb 12 22:24:05.177712 env[1557]: 2024-02-12 22:24:05.137 [INFO][4882] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" iface="eth0" netns="" Feb 12 22:24:05.177712 env[1557]: 2024-02-12 22:24:05.137 [INFO][4882] k8s.go 585: Releasing IP address(es) ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" Feb 12 22:24:05.177712 env[1557]: 2024-02-12 22:24:05.137 [INFO][4882] utils.go 188: Calico CNI releasing IP address ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" Feb 12 22:24:05.177712 env[1557]: 2024-02-12 22:24:05.163 [INFO][4888] ipam_plugin.go 415: Releasing address using handleID ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" HandleID="k8s-pod-network.614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" Workload="ip--172--31--25--241-k8s-coredns--787d4945fb--hq5pq-eth0" Feb 12 22:24:05.177712 env[1557]: 2024-02-12 22:24:05.163 [INFO][4888] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:24:05.177712 env[1557]: 2024-02-12 22:24:05.163 [INFO][4888] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:24:05.177712 env[1557]: 2024-02-12 22:24:05.171 [WARNING][4888] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" HandleID="k8s-pod-network.614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" Workload="ip--172--31--25--241-k8s-coredns--787d4945fb--hq5pq-eth0" Feb 12 22:24:05.177712 env[1557]: 2024-02-12 22:24:05.171 [INFO][4888] ipam_plugin.go 443: Releasing address using workloadID ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" HandleID="k8s-pod-network.614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" Workload="ip--172--31--25--241-k8s-coredns--787d4945fb--hq5pq-eth0" Feb 12 22:24:05.177712 env[1557]: 2024-02-12 22:24:05.173 [INFO][4888] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:24:05.177712 env[1557]: 2024-02-12 22:24:05.175 [INFO][4882] k8s.go 591: Teardown processing complete. ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" Feb 12 22:24:05.180453 env[1557]: time="2024-02-12T22:24:05.177670450Z" level=info msg="TearDown network for sandbox \"614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc\" successfully" Feb 12 22:24:05.180453 env[1557]: time="2024-02-12T22:24:05.180063203Z" level=info msg="StopPodSandbox for \"614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc\" returns successfully" Feb 12 22:24:05.180629 env[1557]: time="2024-02-12T22:24:05.180521094Z" level=info msg="RemovePodSandbox for \"614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc\"" Feb 12 22:24:05.180629 env[1557]: time="2024-02-12T22:24:05.180558446Z" level=info msg="Forcibly stopping sandbox \"614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc\"" Feb 12 22:24:05.299391 env[1557]: 2024-02-12 22:24:05.243 [WARNING][4908] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--241-k8s-coredns--787d4945fb--hq5pq-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"e0db5db6-2308-44b2-a5bb-86a966d03452", ResourceVersion:"735", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 23, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-241", ContainerID:"f1e6ecd39315ec56c52b0bcd6f92f28a2f5840705ebc748a8e60ff8cff3f130d", Pod:"coredns-787d4945fb-hq5pq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.33.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9295b7cd116", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:24:05.299391 env[1557]: 2024-02-12 22:24:05.246 [INFO][4908] k8s.go 578: Cleaning up netns ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" Feb 12 22:24:05.299391 env[1557]: 2024-02-12 22:24:05.246 [INFO][4908] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" iface="eth0" netns="" Feb 12 22:24:05.299391 env[1557]: 2024-02-12 22:24:05.246 [INFO][4908] k8s.go 585: Releasing IP address(es) ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" Feb 12 22:24:05.299391 env[1557]: 2024-02-12 22:24:05.246 [INFO][4908] utils.go 188: Calico CNI releasing IP address ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" Feb 12 22:24:05.299391 env[1557]: 2024-02-12 22:24:05.285 [INFO][4914] ipam_plugin.go 415: Releasing address using handleID ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" HandleID="k8s-pod-network.614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" Workload="ip--172--31--25--241-k8s-coredns--787d4945fb--hq5pq-eth0" Feb 12 22:24:05.299391 env[1557]: 2024-02-12 22:24:05.286 [INFO][4914] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:24:05.299391 env[1557]: 2024-02-12 22:24:05.286 [INFO][4914] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:24:05.299391 env[1557]: 2024-02-12 22:24:05.294 [WARNING][4914] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" HandleID="k8s-pod-network.614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" Workload="ip--172--31--25--241-k8s-coredns--787d4945fb--hq5pq-eth0" Feb 12 22:24:05.299391 env[1557]: 2024-02-12 22:24:05.294 [INFO][4914] ipam_plugin.go 443: Releasing address using workloadID ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" HandleID="k8s-pod-network.614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" Workload="ip--172--31--25--241-k8s-coredns--787d4945fb--hq5pq-eth0" Feb 12 22:24:05.299391 env[1557]: 2024-02-12 22:24:05.295 [INFO][4914] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:24:05.299391 env[1557]: 2024-02-12 22:24:05.297 [INFO][4908] k8s.go 591: Teardown processing complete. ContainerID="614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc" Feb 12 22:24:05.300306 env[1557]: time="2024-02-12T22:24:05.300259439Z" level=info msg="TearDown network for sandbox \"614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc\" successfully" Feb 12 22:24:05.401780 env[1557]: time="2024-02-12T22:24:05.401696423Z" level=info msg="RemovePodSandbox \"614544b0afed0f89dc64cd46cccad1e7b8e487802df01bff264ffea1392ac0cc\" returns successfully" Feb 12 22:24:05.402494 env[1557]: time="2024-02-12T22:24:05.402453251Z" level=info msg="StopPodSandbox for \"997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296\"" Feb 12 22:24:05.504785 env[1557]: 2024-02-12 22:24:05.449 [WARNING][4932] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--241-k8s-csi--node--driver--4qkdf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2196ea8e-c0da-421e-83bb-4ead3cb0e76b", ResourceVersion:"734", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 23, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-241", ContainerID:"aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41", Pod:"csi-node-driver-4qkdf", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.33.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali442bb88cab3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:24:05.504785 env[1557]: 2024-02-12 22:24:05.450 [INFO][4932] k8s.go 578: Cleaning up netns ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" Feb 12 22:24:05.504785 env[1557]: 2024-02-12 22:24:05.450 [INFO][4932] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" iface="eth0" netns="" Feb 12 22:24:05.504785 env[1557]: 2024-02-12 22:24:05.450 [INFO][4932] k8s.go 585: Releasing IP address(es) ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" Feb 12 22:24:05.504785 env[1557]: 2024-02-12 22:24:05.450 [INFO][4932] utils.go 188: Calico CNI releasing IP address ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" Feb 12 22:24:05.504785 env[1557]: 2024-02-12 22:24:05.481 [INFO][4938] ipam_plugin.go 415: Releasing address using handleID ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" HandleID="k8s-pod-network.997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" Workload="ip--172--31--25--241-k8s-csi--node--driver--4qkdf-eth0" Feb 12 22:24:05.504785 env[1557]: 2024-02-12 22:24:05.481 [INFO][4938] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:24:05.504785 env[1557]: 2024-02-12 22:24:05.481 [INFO][4938] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:24:05.504785 env[1557]: 2024-02-12 22:24:05.496 [WARNING][4938] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" HandleID="k8s-pod-network.997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" Workload="ip--172--31--25--241-k8s-csi--node--driver--4qkdf-eth0" Feb 12 22:24:05.504785 env[1557]: 2024-02-12 22:24:05.496 [INFO][4938] ipam_plugin.go 443: Releasing address using workloadID ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" HandleID="k8s-pod-network.997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" Workload="ip--172--31--25--241-k8s-csi--node--driver--4qkdf-eth0" Feb 12 22:24:05.504785 env[1557]: 2024-02-12 22:24:05.498 [INFO][4938] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:24:05.504785 env[1557]: 2024-02-12 22:24:05.501 [INFO][4932] k8s.go 591: Teardown processing complete. ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" Feb 12 22:24:05.504785 env[1557]: time="2024-02-12T22:24:05.503588083Z" level=info msg="TearDown network for sandbox \"997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296\" successfully" Feb 12 22:24:05.504785 env[1557]: time="2024-02-12T22:24:05.503621194Z" level=info msg="StopPodSandbox for \"997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296\" returns successfully" Feb 12 22:24:05.504785 env[1557]: time="2024-02-12T22:24:05.504144101Z" level=info msg="RemovePodSandbox for \"997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296\"" Feb 12 22:24:05.504785 env[1557]: time="2024-02-12T22:24:05.504179989Z" level=info msg="Forcibly stopping sandbox \"997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296\"" Feb 12 22:24:05.585226 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1520338217.mount: Deactivated successfully. Feb 12 22:24:05.626667 env[1557]: 2024-02-12 22:24:05.565 [WARNING][4957] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--241-k8s-csi--node--driver--4qkdf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2196ea8e-c0da-421e-83bb-4ead3cb0e76b", ResourceVersion:"734", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 23, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-241", ContainerID:"aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41", Pod:"csi-node-driver-4qkdf", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.33.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali442bb88cab3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:24:05.626667 env[1557]: 2024-02-12 22:24:05.565 [INFO][4957] k8s.go 578: Cleaning up netns ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" Feb 12 22:24:05.626667 env[1557]: 2024-02-12 22:24:05.566 [INFO][4957] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" iface="eth0" netns="" Feb 12 22:24:05.626667 env[1557]: 2024-02-12 22:24:05.566 [INFO][4957] k8s.go 585: Releasing IP address(es) ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" Feb 12 22:24:05.626667 env[1557]: 2024-02-12 22:24:05.566 [INFO][4957] utils.go 188: Calico CNI releasing IP address ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" Feb 12 22:24:05.626667 env[1557]: 2024-02-12 22:24:05.614 [INFO][4963] ipam_plugin.go 415: Releasing address using handleID ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" HandleID="k8s-pod-network.997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" Workload="ip--172--31--25--241-k8s-csi--node--driver--4qkdf-eth0" Feb 12 22:24:05.626667 env[1557]: 2024-02-12 22:24:05.614 [INFO][4963] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:24:05.626667 env[1557]: 2024-02-12 22:24:05.614 [INFO][4963] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:24:05.626667 env[1557]: 2024-02-12 22:24:05.621 [WARNING][4963] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" HandleID="k8s-pod-network.997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" Workload="ip--172--31--25--241-k8s-csi--node--driver--4qkdf-eth0" Feb 12 22:24:05.626667 env[1557]: 2024-02-12 22:24:05.621 [INFO][4963] ipam_plugin.go 443: Releasing address using workloadID ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" HandleID="k8s-pod-network.997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" Workload="ip--172--31--25--241-k8s-csi--node--driver--4qkdf-eth0" Feb 12 22:24:05.626667 env[1557]: 2024-02-12 22:24:05.623 [INFO][4963] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:24:05.626667 env[1557]: 2024-02-12 22:24:05.625 [INFO][4957] k8s.go 591: Teardown processing complete. ContainerID="997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296" Feb 12 22:24:05.627939 env[1557]: time="2024-02-12T22:24:05.626692803Z" level=info msg="TearDown network for sandbox \"997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296\" successfully" Feb 12 22:24:05.631789 env[1557]: time="2024-02-12T22:24:05.631743235Z" level=info msg="RemovePodSandbox \"997e5039fddd871a2810e64c7667edfacdaf0b784dc86cfe5b943d46209bf296\" returns successfully" Feb 12 22:24:08.011197 env[1557]: time="2024-02-12T22:24:08.011143798Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:08.015908 env[1557]: time="2024-02-12T22:24:08.015846978Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:08.018777 env[1557]: time="2024-02-12T22:24:08.018733810Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:08.024208 env[1557]: time="2024-02-12T22:24:08.024161136Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:08.026134 env[1557]: time="2024-02-12T22:24:08.026090882Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 12 22:24:08.027992 env[1557]: time="2024-02-12T22:24:08.027948780Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 22:24:08.045935 env[1557]: time="2024-02-12T22:24:08.042643269Z" level=info msg="CreateContainer within sandbox \"2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 12 22:24:08.071132 env[1557]: time="2024-02-12T22:24:08.071084012Z" level=info msg="CreateContainer within sandbox \"2e296981666e7a3c60ee48d4de8213179140eb5b1a2d406cd0e61d4d39c11d2b\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"03ac01119681ae19a795789a942a28e6c47451eee84058645d363badbbac7e01\"" Feb 12 22:24:08.074303 env[1557]: time="2024-02-12T22:24:08.071946073Z" level=info msg="StartContainer for \"03ac01119681ae19a795789a942a28e6c47451eee84058645d363badbbac7e01\"" Feb 12 22:24:08.111146 systemd[1]: Started cri-containerd-03ac01119681ae19a795789a942a28e6c47451eee84058645d363badbbac7e01.scope. Feb 12 22:24:08.146102 kernel: kauditd_printk_skb: 215 callbacks suppressed Feb 12 22:24:08.146236 kernel: audit: type=1400 audit(1707776648.139:1351): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.146278 kernel: audit: type=1400 audit(1707776648.139:1352): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.154821 kernel: audit: type=1400 audit(1707776648.139:1353): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.164094 kernel: audit: type=1400 audit(1707776648.139:1354): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.164180 kernel: audit: type=1400 audit(1707776648.139:1355): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.164212 kernel: audit: type=1400 audit(1707776648.139:1356): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.174964 kernel: audit: type=1400 audit(1707776648.139:1357): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.175083 kernel: audit: type=1400 audit(1707776648.139:1358): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.179596 kernel: audit: type=1400 audit(1707776648.139:1359): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.188419 kernel: audit: type=1400 audit(1707776648.149:1360): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.149000 audit: BPF prog-id=179 op=LOAD Feb 12 22:24:08.150000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.150000 audit[4980]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4213 pid=4980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:08.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033616330313131393638316165313961373935373839613934326132 Feb 12 22:24:08.150000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.150000 audit[4980]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=4213 pid=4980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:08.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033616330313131393638316165313961373935373839613934326132 Feb 12 22:24:08.150000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.150000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.150000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.150000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.150000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.150000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.150000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.150000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.150000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.150000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.150000 audit: BPF prog-id=180 op=LOAD Feb 12 22:24:08.150000 audit[4980]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00025fd10 items=0 ppid=4213 pid=4980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:08.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033616330313131393638316165313961373935373839613934326132 Feb 12 22:24:08.159000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.159000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.159000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.159000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.159000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.159000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.159000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.159000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.159000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.159000 audit: BPF prog-id=181 op=LOAD Feb 12 22:24:08.159000 audit[4980]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00025fd58 items=0 ppid=4213 pid=4980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:08.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033616330313131393638316165313961373935373839613934326132 Feb 12 22:24:08.167000 audit: BPF prog-id=181 op=UNLOAD Feb 12 22:24:08.167000 audit: BPF prog-id=180 op=UNLOAD Feb 12 22:24:08.167000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.167000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.167000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.167000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.167000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.167000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.167000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.167000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.167000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.167000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:08.167000 audit: BPF prog-id=182 op=LOAD Feb 12 22:24:08.167000 audit[4980]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003e6168 items=0 ppid=4213 pid=4980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:08.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033616330313131393638316165313961373935373839613934326132 Feb 12 22:24:08.236887 env[1557]: time="2024-02-12T22:24:08.236824523Z" level=info msg="StartContainer for \"03ac01119681ae19a795789a942a28e6c47451eee84058645d363badbbac7e01\" returns successfully" Feb 12 22:24:09.042777 systemd[1]: run-containerd-runc-k8s.io-03ac01119681ae19a795789a942a28e6c47451eee84058645d363badbbac7e01-runc.07MU60.mount: Deactivated successfully. Feb 12 22:24:09.142958 kubelet[2807]: I0212 22:24:09.142250 2807 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-55565955d8-929dl" podStartSLOduration=-9.223371992712574e+09 pod.CreationTimestamp="2024-02-12 22:23:25 +0000 UTC" firstStartedPulling="2024-02-12 22:23:58.910188203 +0000 UTC m=+54.430607441" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:24:09.13900375 +0000 UTC m=+64.659422994" watchObservedRunningTime="2024-02-12 22:24:09.142201783 +0000 UTC m=+64.662621019" Feb 12 22:24:09.186161 systemd[1]: run-containerd-runc-k8s.io-03ac01119681ae19a795789a942a28e6c47451eee84058645d363badbbac7e01-runc.pOY8T3.mount: Deactivated successfully. Feb 12 22:24:09.476327 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount310216316.mount: Deactivated successfully. Feb 12 22:24:09.999278 env[1557]: time="2024-02-12T22:24:09.996021644Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:10.002315 env[1557]: time="2024-02-12T22:24:10.002269985Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:10.009602 env[1557]: time="2024-02-12T22:24:10.009551288Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:10.013595 env[1557]: time="2024-02-12T22:24:10.013546961Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:10.014311 env[1557]: time="2024-02-12T22:24:10.014275320Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 12 22:24:10.019107 env[1557]: time="2024-02-12T22:24:10.019069315Z" level=info msg="CreateContainer within sandbox \"aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 22:24:10.049894 env[1557]: time="2024-02-12T22:24:10.049810354Z" level=info msg="CreateContainer within sandbox \"aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"bc9c4a69892bd302fa7045e95f2c16cf8b91fe0320b0e952f48d63ceb2f477ae\"" Feb 12 22:24:10.052089 env[1557]: time="2024-02-12T22:24:10.050449192Z" level=info msg="StartContainer for \"bc9c4a69892bd302fa7045e95f2c16cf8b91fe0320b0e952f48d63ceb2f477ae\"" Feb 12 22:24:10.110337 systemd[1]: Started cri-containerd-bc9c4a69892bd302fa7045e95f2c16cf8b91fe0320b0e952f48d63ceb2f477ae.scope. Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { perfmon } for pid=5043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit[5043]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f25f87f3578 items=0 ppid=4510 pid=5043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:10.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263396334613639383932626433303266613730343565393566326331 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { bpf } for pid=5043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { bpf } for pid=5043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { bpf } for pid=5043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { perfmon } for pid=5043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { perfmon } for pid=5043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { perfmon } for pid=5043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { perfmon } for pid=5043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { perfmon } for pid=5043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { bpf } for pid=5043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { bpf } for pid=5043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit: BPF prog-id=183 op=LOAD Feb 12 22:24:10.142000 audit[5043]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002b03f8 items=0 ppid=4510 pid=5043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:10.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263396334613639383932626433303266613730343565393566326331 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { bpf } for pid=5043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { bpf } for pid=5043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { perfmon } for pid=5043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { perfmon } for pid=5043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { perfmon } for pid=5043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { perfmon } for pid=5043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { perfmon } for pid=5043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { bpf } for pid=5043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { bpf } for pid=5043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit: BPF prog-id=184 op=LOAD Feb 12 22:24:10.142000 audit[5043]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002b0448 items=0 ppid=4510 pid=5043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:10.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263396334613639383932626433303266613730343565393566326331 Feb 12 22:24:10.142000 audit: BPF prog-id=184 op=UNLOAD Feb 12 22:24:10.142000 audit: BPF prog-id=183 op=UNLOAD Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { bpf } for pid=5043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { bpf } for pid=5043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { bpf } for pid=5043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { perfmon } for pid=5043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { perfmon } for pid=5043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { perfmon } for pid=5043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { perfmon } for pid=5043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { perfmon } for pid=5043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { bpf } for pid=5043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit[5043]: AVC avc: denied { bpf } for pid=5043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:10.142000 audit: BPF prog-id=185 op=LOAD Feb 12 22:24:10.142000 audit[5043]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002b04d8 items=0 ppid=4510 pid=5043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:10.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263396334613639383932626433303266613730343565393566326331 Feb 12 22:24:10.163842 env[1557]: time="2024-02-12T22:24:10.163752365Z" level=info msg="StartContainer for \"bc9c4a69892bd302fa7045e95f2c16cf8b91fe0320b0e952f48d63ceb2f477ae\" returns successfully" Feb 12 22:24:10.165445 env[1557]: time="2024-02-12T22:24:10.165415139Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 22:24:11.814781 systemd[1]: Started sshd@7-172.31.25.241:22-139.178.89.65:36570.service. Feb 12 22:24:11.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.25.241:22-139.178.89.65:36570 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:12.054000 audit[5077]: USER_ACCT pid=5077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:12.055000 audit[5077]: CRED_ACQ pid=5077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:12.055000 audit[5077]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3bf76d80 a2=3 a3=0 items=0 ppid=1 pid=5077 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:12.055000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:24:12.074000 audit[5077]: USER_START pid=5077 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:12.076000 audit[5079]: CRED_ACQ pid=5079 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:12.082406 sshd[5077]: Accepted publickey for core from 139.178.89.65 port 36570 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:24:12.059606 sshd[5077]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:24:12.068529 systemd[1]: Started session-8.scope. Feb 12 22:24:12.069187 systemd-logind[1548]: New session 8 of user core. Feb 12 22:24:12.092196 env[1557]: time="2024-02-12T22:24:12.092149538Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:12.095402 env[1557]: time="2024-02-12T22:24:12.095365864Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:12.097637 env[1557]: time="2024-02-12T22:24:12.097602080Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:12.099724 env[1557]: time="2024-02-12T22:24:12.099678487Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:24:12.100228 env[1557]: time="2024-02-12T22:24:12.100195767Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 12 22:24:12.102495 env[1557]: time="2024-02-12T22:24:12.102467830Z" level=info msg="CreateContainer within sandbox \"aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 22:24:12.125700 env[1557]: time="2024-02-12T22:24:12.125647347Z" level=info msg="CreateContainer within sandbox \"aafe2bceaea5a1eb96a8a9585257ba78cb5d93eaf26055725653da9abccdef41\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"34d42893a53b7491aef2100b9ba39f1bb1019f0eaa84a633a9c3541461a68146\"" Feb 12 22:24:12.126349 env[1557]: time="2024-02-12T22:24:12.126241932Z" level=info msg="StartContainer for \"34d42893a53b7491aef2100b9ba39f1bb1019f0eaa84a633a9c3541461a68146\"" Feb 12 22:24:12.159114 systemd[1]: Started cri-containerd-34d42893a53b7491aef2100b9ba39f1bb1019f0eaa84a633a9c3541461a68146.scope. Feb 12 22:24:12.205000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.205000 audit[5088]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fc3c0d59b18 items=0 ppid=4510 pid=5088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:12.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334643432383933613533623734393161656632313030623962613339 Feb 12 22:24:12.205000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.205000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.205000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.205000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.205000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.205000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.205000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.205000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.205000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.205000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.205000 audit: BPF prog-id=186 op=LOAD Feb 12 22:24:12.205000 audit[5088]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00028a828 items=0 ppid=4510 pid=5088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:12.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334643432383933613533623734393161656632313030623962613339 Feb 12 22:24:12.206000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.206000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.206000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.206000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.206000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.206000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.206000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.206000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.206000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.206000 audit: BPF prog-id=187 op=LOAD Feb 12 22:24:12.206000 audit[5088]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00028a878 items=0 ppid=4510 pid=5088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:12.206000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334643432383933613533623734393161656632313030623962613339 Feb 12 22:24:12.206000 audit: BPF prog-id=187 op=UNLOAD Feb 12 22:24:12.206000 audit: BPF prog-id=186 op=UNLOAD Feb 12 22:24:12.206000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.206000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.206000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.206000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.206000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.206000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.206000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.206000 audit[5088]: AVC avc: denied { perfmon } for pid=5088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.206000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.206000 audit[5088]: AVC avc: denied { bpf } for pid=5088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:24:12.206000 audit: BPF prog-id=188 op=LOAD Feb 12 22:24:12.206000 audit[5088]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00028a908 items=0 ppid=4510 pid=5088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:12.206000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334643432383933613533623734393161656632313030623962613339 Feb 12 22:24:12.233087 env[1557]: time="2024-02-12T22:24:12.233038194Z" level=info msg="StartContainer for \"34d42893a53b7491aef2100b9ba39f1bb1019f0eaa84a633a9c3541461a68146\" returns successfully" Feb 12 22:24:12.756172 sshd[5077]: pam_unix(sshd:session): session closed for user core Feb 12 22:24:12.761000 audit[5077]: USER_END pid=5077 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:12.761000 audit[5077]: CRED_DISP pid=5077 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:12.763935 systemd[1]: sshd@7-172.31.25.241:22-139.178.89.65:36570.service: Deactivated successfully. Feb 12 22:24:12.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.25.241:22-139.178.89.65:36570 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:12.765509 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 22:24:12.766324 systemd-logind[1548]: Session 8 logged out. Waiting for processes to exit. Feb 12 22:24:12.773722 systemd-logind[1548]: Removed session 8. Feb 12 22:24:12.861685 kubelet[2807]: I0212 22:24:12.861646 2807 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 22:24:12.862349 kubelet[2807]: I0212 22:24:12.862330 2807 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 22:24:13.193439 kubelet[2807]: I0212 22:24:13.193408 2807 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-4qkdf" podStartSLOduration=-9.223371987661417e+09 pod.CreationTimestamp="2024-02-12 22:23:24 +0000 UTC" firstStartedPulling="2024-02-12 22:24:01.170872939 +0000 UTC m=+56.691292174" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:24:13.192688477 +0000 UTC m=+68.713107720" watchObservedRunningTime="2024-02-12 22:24:13.193359353 +0000 UTC m=+68.713778592" Feb 12 22:24:13.781096 kernel: kauditd_printk_skb: 144 callbacks suppressed Feb 12 22:24:13.781298 kernel: audit: type=1400 audit(1707776653.773:1390): avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:13.773000 audit[2687]: AVC avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:13.790910 kernel: audit: type=1300 audit(1707776653.773:1390): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000056d60 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:24:13.773000 audit[2687]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000056d60 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:24:13.773000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:24:13.805671 kernel: audit: type=1327 audit(1707776653.773:1390): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:24:13.805806 kernel: audit: type=1400 audit(1707776653.774:1391): avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:13.774000 audit[2687]: AVC avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:13.774000 audit[2687]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000056de0 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:24:13.814891 kernel: audit: type=1300 audit(1707776653.774:1391): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000056de0 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:24:13.815024 kernel: audit: type=1327 audit(1707776653.774:1391): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:24:13.774000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:24:13.834570 kernel: audit: type=1400 audit(1707776653.780:1392): avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:13.780000 audit[2687]: AVC avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:13.780000 audit[2687]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0000576c0 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:24:13.780000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:24:13.851635 kernel: audit: type=1300 audit(1707776653.780:1392): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0000576c0 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:24:13.851814 kernel: audit: type=1327 audit(1707776653.780:1392): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:24:13.781000 audit[2687]: AVC avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:13.781000 audit[2687]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011c8ee0 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:24:13.781000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:24:13.858967 kernel: audit: type=1400 audit(1707776653.781:1393): avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:24:15.276736 systemd[1]: run-containerd-runc-k8s.io-ec8ddc908cbc0a0d5a988d9c572ae3f5a079090f14b1b75a7a0d5ae410a92e8e-runc.B312fA.mount: Deactivated successfully. Feb 12 22:24:16.323926 systemd[1]: run-containerd-runc-k8s.io-03ac01119681ae19a795789a942a28e6c47451eee84058645d363badbbac7e01-runc.aWvEAa.mount: Deactivated successfully. Feb 12 22:24:17.782718 systemd[1]: Started sshd@8-172.31.25.241:22-139.178.89.65:36576.service. Feb 12 22:24:17.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.25.241:22-139.178.89.65:36576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:17.952000 audit[5174]: USER_ACCT pid=5174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:17.953425 sshd[5174]: Accepted publickey for core from 139.178.89.65 port 36576 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:24:17.953000 audit[5174]: CRED_ACQ pid=5174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:17.953000 audit[5174]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd41ff7bd0 a2=3 a3=0 items=0 ppid=1 pid=5174 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:17.953000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:24:17.955199 sshd[5174]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:24:17.960669 systemd-logind[1548]: New session 9 of user core. Feb 12 22:24:17.961304 systemd[1]: Started session-9.scope. Feb 12 22:24:17.967000 audit[5174]: USER_START pid=5174 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:17.970000 audit[5176]: CRED_ACQ pid=5176 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:18.202663 sshd[5174]: pam_unix(sshd:session): session closed for user core Feb 12 22:24:18.204000 audit[5174]: USER_END pid=5174 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:18.204000 audit[5174]: CRED_DISP pid=5174 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:18.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.25.241:22-139.178.89.65:36576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:18.208292 systemd-logind[1548]: Session 9 logged out. Waiting for processes to exit. Feb 12 22:24:18.208564 systemd[1]: sshd@8-172.31.25.241:22-139.178.89.65:36576.service: Deactivated successfully. Feb 12 22:24:18.209635 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 22:24:18.211099 systemd-logind[1548]: Removed session 9. Feb 12 22:24:23.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.25.241:22-139.178.89.65:55506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:23.232836 systemd[1]: Started sshd@9-172.31.25.241:22-139.178.89.65:55506.service. Feb 12 22:24:23.235342 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 12 22:24:23.235403 kernel: audit: type=1130 audit(1707776663.232:1403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.25.241:22-139.178.89.65:55506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:23.412000 audit[5197]: USER_ACCT pid=5197 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:23.414166 sshd[5197]: Accepted publickey for core from 139.178.89.65 port 55506 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:24:23.420000 audit[5197]: CRED_ACQ pid=5197 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:23.422158 sshd[5197]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:24:23.430907 kernel: audit: type=1101 audit(1707776663.412:1404): pid=5197 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:23.431023 kernel: audit: type=1103 audit(1707776663.420:1405): pid=5197 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:23.431093 kernel: audit: type=1006 audit(1707776663.420:1406): pid=5197 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 12 22:24:23.434603 systemd[1]: Started session-10.scope. Feb 12 22:24:23.437120 kernel: audit: type=1300 audit(1707776663.420:1406): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9d392490 a2=3 a3=0 items=0 ppid=1 pid=5197 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:23.420000 audit[5197]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9d392490 a2=3 a3=0 items=0 ppid=1 pid=5197 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:23.436341 systemd-logind[1548]: New session 10 of user core. Feb 12 22:24:23.451482 kernel: audit: type=1327 audit(1707776663.420:1406): proctitle=737368643A20636F7265205B707269765D Feb 12 22:24:23.420000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:24:23.451000 audit[5197]: USER_START pid=5197 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:23.456000 audit[5199]: CRED_ACQ pid=5199 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:23.467726 kernel: audit: type=1105 audit(1707776663.451:1407): pid=5197 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:23.467850 kernel: audit: type=1103 audit(1707776663.456:1408): pid=5199 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:23.714360 sshd[5197]: pam_unix(sshd:session): session closed for user core Feb 12 22:24:23.718000 audit[5197]: USER_END pid=5197 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:23.727300 systemd[1]: sshd@9-172.31.25.241:22-139.178.89.65:55506.service: Deactivated successfully. Feb 12 22:24:23.719000 audit[5197]: CRED_DISP pid=5197 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:23.728535 systemd[1]: session-10.scope: Deactivated successfully. Feb 12 22:24:23.732677 systemd-logind[1548]: Session 10 logged out. Waiting for processes to exit. Feb 12 22:24:23.736043 systemd-logind[1548]: Removed session 10. Feb 12 22:24:23.739444 kernel: audit: type=1106 audit(1707776663.718:1409): pid=5197 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:23.739536 kernel: audit: type=1104 audit(1707776663.719:1410): pid=5197 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:23.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.25.241:22-139.178.89.65:55506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:28.741304 systemd[1]: Started sshd@10-172.31.25.241:22-139.178.89.65:60538.service. Feb 12 22:24:28.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.25.241:22-139.178.89.65:60538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:28.743179 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:24:28.744172 kernel: audit: type=1130 audit(1707776668.740:1412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.25.241:22-139.178.89.65:60538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:28.917000 audit[5211]: USER_ACCT pid=5211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:28.919169 sshd[5211]: Accepted publickey for core from 139.178.89.65 port 60538 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:24:28.928000 kernel: audit: type=1101 audit(1707776668.917:1413): pid=5211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:28.927000 audit[5211]: CRED_ACQ pid=5211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:28.929001 sshd[5211]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:24:28.935047 kernel: audit: type=1103 audit(1707776668.927:1414): pid=5211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:28.927000 audit[5211]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee2a24130 a2=3 a3=0 items=0 ppid=1 pid=5211 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:28.939828 systemd[1]: Started session-11.scope. Feb 12 22:24:28.942825 systemd-logind[1548]: New session 11 of user core. Feb 12 22:24:28.946904 kernel: audit: type=1006 audit(1707776668.927:1415): pid=5211 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 12 22:24:28.947203 kernel: audit: type=1300 audit(1707776668.927:1415): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee2a24130 a2=3 a3=0 items=0 ppid=1 pid=5211 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:28.927000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:24:28.953794 kernel: audit: type=1327 audit(1707776668.927:1415): proctitle=737368643A20636F7265205B707269765D Feb 12 22:24:28.953961 kernel: audit: type=1105 audit(1707776668.952:1416): pid=5211 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:28.952000 audit[5211]: USER_START pid=5211 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:28.952000 audit[5213]: CRED_ACQ pid=5213 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:28.965611 kernel: audit: type=1103 audit(1707776668.952:1417): pid=5213 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:29.180243 sshd[5211]: pam_unix(sshd:session): session closed for user core Feb 12 22:24:29.181000 audit[5211]: USER_END pid=5211 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:29.184343 systemd[1]: sshd@10-172.31.25.241:22-139.178.89.65:60538.service: Deactivated successfully. Feb 12 22:24:29.191340 kernel: audit: type=1106 audit(1707776669.181:1418): pid=5211 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:29.191448 kernel: audit: type=1104 audit(1707776669.181:1419): pid=5211 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:29.181000 audit[5211]: CRED_DISP pid=5211 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:29.190617 systemd[1]: session-11.scope: Deactivated successfully. Feb 12 22:24:29.193976 systemd-logind[1548]: Session 11 logged out. Waiting for processes to exit. Feb 12 22:24:29.195315 systemd-logind[1548]: Removed session 11. Feb 12 22:24:29.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.25.241:22-139.178.89.65:60538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:34.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.25.241:22-139.178.89.65:60542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:34.206663 systemd[1]: Started sshd@11-172.31.25.241:22-139.178.89.65:60542.service. Feb 12 22:24:34.215248 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:24:34.215382 kernel: audit: type=1130 audit(1707776674.206:1421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.25.241:22-139.178.89.65:60542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:34.399000 audit[5224]: USER_ACCT pid=5224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:34.400842 sshd[5224]: Accepted publickey for core from 139.178.89.65 port 60542 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:24:34.407967 kernel: audit: type=1101 audit(1707776674.399:1422): pid=5224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:34.407000 audit[5224]: CRED_ACQ pid=5224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:34.409283 sshd[5224]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:24:34.421174 kernel: audit: type=1103 audit(1707776674.407:1423): pid=5224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:34.421275 kernel: audit: type=1006 audit(1707776674.407:1424): pid=5224 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 12 22:24:34.421343 kernel: audit: type=1300 audit(1707776674.407:1424): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde175f6d0 a2=3 a3=0 items=0 ppid=1 pid=5224 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:34.407000 audit[5224]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde175f6d0 a2=3 a3=0 items=0 ppid=1 pid=5224 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:34.420735 systemd[1]: Started session-12.scope. Feb 12 22:24:34.423674 systemd-logind[1548]: New session 12 of user core. Feb 12 22:24:34.407000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:24:34.433315 kernel: audit: type=1327 audit(1707776674.407:1424): proctitle=737368643A20636F7265205B707269765D Feb 12 22:24:34.433389 kernel: audit: type=1105 audit(1707776674.430:1425): pid=5224 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:34.430000 audit[5224]: USER_START pid=5224 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:34.433000 audit[5226]: CRED_ACQ pid=5226 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:34.438913 kernel: audit: type=1103 audit(1707776674.433:1426): pid=5226 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:34.638569 sshd[5224]: pam_unix(sshd:session): session closed for user core Feb 12 22:24:34.639000 audit[5224]: USER_END pid=5224 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:34.643017 systemd[1]: sshd@11-172.31.25.241:22-139.178.89.65:60542.service: Deactivated successfully. Feb 12 22:24:34.644328 systemd[1]: session-12.scope: Deactivated successfully. Feb 12 22:24:34.647141 systemd-logind[1548]: Session 12 logged out. Waiting for processes to exit. Feb 12 22:24:34.639000 audit[5224]: CRED_DISP pid=5224 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:34.648758 systemd-logind[1548]: Removed session 12. Feb 12 22:24:34.654502 kernel: audit: type=1106 audit(1707776674.639:1427): pid=5224 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:34.654614 kernel: audit: type=1104 audit(1707776674.639:1428): pid=5224 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:34.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.25.241:22-139.178.89.65:60542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:34.666724 systemd[1]: Started sshd@12-172.31.25.241:22-139.178.89.65:60548.service. Feb 12 22:24:34.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.25.241:22-139.178.89.65:60548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:34.842000 audit[5237]: USER_ACCT pid=5237 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:34.843588 sshd[5237]: Accepted publickey for core from 139.178.89.65 port 60548 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:24:34.843000 audit[5237]: CRED_ACQ pid=5237 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:34.844000 audit[5237]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe09fab010 a2=3 a3=0 items=0 ppid=1 pid=5237 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:34.844000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:24:34.845761 sshd[5237]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:24:34.853504 systemd-logind[1548]: New session 13 of user core. Feb 12 22:24:34.854177 systemd[1]: Started session-13.scope. Feb 12 22:24:34.861000 audit[5237]: USER_START pid=5237 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:34.862000 audit[5239]: CRED_ACQ pid=5239 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:36.081023 amazon-ssm-agent[1535]: 2024-02-12 22:24:36 INFO [HealthCheck] HealthCheck reporting agent health. Feb 12 22:24:36.463676 sshd[5237]: pam_unix(sshd:session): session closed for user core Feb 12 22:24:36.472000 audit[5237]: USER_END pid=5237 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:36.474000 audit[5237]: CRED_DISP pid=5237 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:36.488382 systemd[1]: Started sshd@13-172.31.25.241:22-139.178.89.65:60562.service. Feb 12 22:24:36.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.25.241:22-139.178.89.65:60562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:36.492576 systemd[1]: sshd@12-172.31.25.241:22-139.178.89.65:60548.service: Deactivated successfully. Feb 12 22:24:36.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.25.241:22-139.178.89.65:60548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:36.494514 systemd[1]: session-13.scope: Deactivated successfully. Feb 12 22:24:36.495780 systemd-logind[1548]: Session 13 logged out. Waiting for processes to exit. Feb 12 22:24:36.499355 systemd-logind[1548]: Removed session 13. Feb 12 22:24:36.686000 audit[5248]: USER_ACCT pid=5248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:36.687622 sshd[5248]: Accepted publickey for core from 139.178.89.65 port 60562 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:24:36.687000 audit[5248]: CRED_ACQ pid=5248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:36.687000 audit[5248]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffccb01b480 a2=3 a3=0 items=0 ppid=1 pid=5248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:36.687000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:24:36.689761 sshd[5248]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:24:36.698534 systemd[1]: Started session-14.scope. Feb 12 22:24:36.699074 systemd-logind[1548]: New session 14 of user core. Feb 12 22:24:36.704000 audit[5248]: USER_START pid=5248 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:36.706000 audit[5251]: CRED_ACQ pid=5251 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:36.921626 sshd[5248]: pam_unix(sshd:session): session closed for user core Feb 12 22:24:36.922000 audit[5248]: USER_END pid=5248 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:36.923000 audit[5248]: CRED_DISP pid=5248 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:36.925829 systemd[1]: sshd@13-172.31.25.241:22-139.178.89.65:60562.service: Deactivated successfully. Feb 12 22:24:36.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.25.241:22-139.178.89.65:60562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:36.926811 systemd[1]: session-14.scope: Deactivated successfully. Feb 12 22:24:36.927598 systemd-logind[1548]: Session 14 logged out. Waiting for processes to exit. Feb 12 22:24:36.928637 systemd-logind[1548]: Removed session 14. Feb 12 22:24:41.964079 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 12 22:24:41.964228 kernel: audit: type=1130 audit(1707776681.953:1448): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.25.241:22-139.178.89.65:48960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:41.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.25.241:22-139.178.89.65:48960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:41.954022 systemd[1]: Started sshd@14-172.31.25.241:22-139.178.89.65:48960.service. Feb 12 22:24:42.119000 audit[5268]: USER_ACCT pid=5268 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:42.122178 sshd[5268]: Accepted publickey for core from 139.178.89.65 port 48960 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:24:42.127688 kernel: audit: type=1101 audit(1707776682.119:1449): pid=5268 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:42.127796 kernel: audit: type=1103 audit(1707776682.125:1450): pid=5268 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:42.125000 audit[5268]: CRED_ACQ pid=5268 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:42.127139 sshd[5268]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:24:42.135006 systemd[1]: Started session-15.scope. Feb 12 22:24:42.136131 kernel: audit: type=1006 audit(1707776682.125:1451): pid=5268 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 12 22:24:42.125000 audit[5268]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd40afb9d0 a2=3 a3=0 items=0 ppid=1 pid=5268 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:42.137967 systemd-logind[1548]: New session 15 of user core. Feb 12 22:24:42.142833 kernel: audit: type=1300 audit(1707776682.125:1451): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd40afb9d0 a2=3 a3=0 items=0 ppid=1 pid=5268 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:42.142944 kernel: audit: type=1327 audit(1707776682.125:1451): proctitle=737368643A20636F7265205B707269765D Feb 12 22:24:42.125000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:24:42.145457 kernel: audit: type=1105 audit(1707776682.143:1452): pid=5268 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:42.143000 audit[5268]: USER_START pid=5268 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:42.163090 kernel: audit: type=1103 audit(1707776682.146:1453): pid=5272 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:42.146000 audit[5272]: CRED_ACQ pid=5272 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:42.337451 sshd[5268]: pam_unix(sshd:session): session closed for user core Feb 12 22:24:42.344000 audit[5268]: USER_END pid=5268 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:42.355886 kernel: audit: type=1106 audit(1707776682.344:1454): pid=5268 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:42.345000 audit[5268]: CRED_DISP pid=5268 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:42.358367 systemd[1]: sshd@14-172.31.25.241:22-139.178.89.65:48960.service: Deactivated successfully. Feb 12 22:24:42.359378 systemd[1]: session-15.scope: Deactivated successfully. Feb 12 22:24:42.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.25.241:22-139.178.89.65:48960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:42.361898 kernel: audit: type=1104 audit(1707776682.345:1455): pid=5268 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:42.361543 systemd-logind[1548]: Session 15 logged out. Waiting for processes to exit. Feb 12 22:24:42.362917 systemd-logind[1548]: Removed session 15. Feb 12 22:24:46.319425 systemd[1]: run-containerd-runc-k8s.io-03ac01119681ae19a795789a942a28e6c47451eee84058645d363badbbac7e01-runc.G5gSH2.mount: Deactivated successfully. Feb 12 22:24:47.366227 systemd[1]: Started sshd@15-172.31.25.241:22-139.178.89.65:48976.service. Feb 12 22:24:47.370897 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:24:47.371011 kernel: audit: type=1130 audit(1707776687.366:1457): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.25.241:22-139.178.89.65:48976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:47.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.25.241:22-139.178.89.65:48976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:47.546000 audit[5327]: USER_ACCT pid=5327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:47.548106 sshd[5327]: Accepted publickey for core from 139.178.89.65 port 48976 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:24:47.553881 kernel: audit: type=1101 audit(1707776687.546:1458): pid=5327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:47.555387 sshd[5327]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:24:47.565610 kernel: audit: type=1103 audit(1707776687.554:1459): pid=5327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:47.554000 audit[5327]: CRED_ACQ pid=5327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:47.570049 systemd[1]: Started session-16.scope. Feb 12 22:24:47.572806 systemd-logind[1548]: New session 16 of user core. Feb 12 22:24:47.554000 audit[5327]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9a6ca790 a2=3 a3=0 items=0 ppid=1 pid=5327 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:47.583667 kernel: audit: type=1006 audit(1707776687.554:1460): pid=5327 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 12 22:24:47.583745 kernel: audit: type=1300 audit(1707776687.554:1460): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9a6ca790 a2=3 a3=0 items=0 ppid=1 pid=5327 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:47.554000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:24:47.586250 kernel: audit: type=1327 audit(1707776687.554:1460): proctitle=737368643A20636F7265205B707269765D Feb 12 22:24:47.586000 audit[5327]: USER_START pid=5327 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:47.587000 audit[5329]: CRED_ACQ pid=5329 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:47.600845 kernel: audit: type=1105 audit(1707776687.586:1461): pid=5327 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:47.600989 kernel: audit: type=1103 audit(1707776687.587:1462): pid=5329 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:47.784041 sshd[5327]: pam_unix(sshd:session): session closed for user core Feb 12 22:24:47.784000 audit[5327]: USER_END pid=5327 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:47.785000 audit[5327]: CRED_DISP pid=5327 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:47.793610 systemd-logind[1548]: Session 16 logged out. Waiting for processes to exit. Feb 12 22:24:47.795491 systemd[1]: sshd@15-172.31.25.241:22-139.178.89.65:48976.service: Deactivated successfully. Feb 12 22:24:47.796957 systemd[1]: session-16.scope: Deactivated successfully. Feb 12 22:24:47.799189 kernel: audit: type=1106 audit(1707776687.784:1463): pid=5327 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:47.799262 kernel: audit: type=1104 audit(1707776687.785:1464): pid=5327 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:47.798998 systemd-logind[1548]: Removed session 16. Feb 12 22:24:47.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.25.241:22-139.178.89.65:48976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:49.284523 systemd[1]: run-containerd-runc-k8s.io-03ac01119681ae19a795789a942a28e6c47451eee84058645d363badbbac7e01-runc.Or6JV1.mount: Deactivated successfully. Feb 12 22:24:52.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.25.241:22-139.178.89.65:51564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:52.817103 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:24:52.817153 kernel: audit: type=1130 audit(1707776692.814:1466): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.25.241:22-139.178.89.65:51564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:52.814703 systemd[1]: Started sshd@16-172.31.25.241:22-139.178.89.65:51564.service. Feb 12 22:24:52.983000 audit[5362]: USER_ACCT pid=5362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:52.995395 kernel: audit: type=1101 audit(1707776692.983:1467): pid=5362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:52.995799 sshd[5362]: Accepted publickey for core from 139.178.89.65 port 51564 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:24:52.995000 audit[5362]: CRED_ACQ pid=5362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:52.996938 sshd[5362]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:24:53.015469 systemd[1]: Started session-17.scope. Feb 12 22:24:53.019773 kernel: audit: type=1103 audit(1707776692.995:1468): pid=5362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:53.019842 kernel: audit: type=1006 audit(1707776692.995:1469): pid=5362 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 12 22:24:53.019907 kernel: audit: type=1300 audit(1707776692.995:1469): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff28b28d80 a2=3 a3=0 items=0 ppid=1 pid=5362 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:52.995000 audit[5362]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff28b28d80 a2=3 a3=0 items=0 ppid=1 pid=5362 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:53.018829 systemd-logind[1548]: New session 17 of user core. Feb 12 22:24:52.995000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:24:53.029974 kernel: audit: type=1327 audit(1707776692.995:1469): proctitle=737368643A20636F7265205B707269765D Feb 12 22:24:53.029000 audit[5362]: USER_START pid=5362 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:53.029000 audit[5364]: CRED_ACQ pid=5364 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:53.043643 kernel: audit: type=1105 audit(1707776693.029:1470): pid=5362 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:53.043738 kernel: audit: type=1103 audit(1707776693.029:1471): pid=5364 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:53.236470 sshd[5362]: pam_unix(sshd:session): session closed for user core Feb 12 22:24:53.239000 audit[5362]: USER_END pid=5362 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:53.243128 systemd[1]: sshd@16-172.31.25.241:22-139.178.89.65:51564.service: Deactivated successfully. Feb 12 22:24:53.244609 systemd[1]: session-17.scope: Deactivated successfully. Feb 12 22:24:53.251282 systemd-logind[1548]: Session 17 logged out. Waiting for processes to exit. Feb 12 22:24:53.239000 audit[5362]: CRED_DISP pid=5362 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:53.253301 systemd-logind[1548]: Removed session 17. Feb 12 22:24:53.258725 kernel: audit: type=1106 audit(1707776693.239:1472): pid=5362 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:53.259317 kernel: audit: type=1104 audit(1707776693.239:1473): pid=5362 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:53.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.25.241:22-139.178.89.65:51564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:58.272010 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:24:58.272174 kernel: audit: type=1130 audit(1707776698.263:1475): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.25.241:22-139.178.89.65:54224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:58.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.25.241:22-139.178.89.65:54224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:58.263976 systemd[1]: Started sshd@17-172.31.25.241:22-139.178.89.65:54224.service. Feb 12 22:24:58.430000 audit[5373]: USER_ACCT pid=5373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:58.432132 sshd[5373]: Accepted publickey for core from 139.178.89.65 port 54224 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:24:58.438078 kernel: audit: type=1101 audit(1707776698.430:1476): pid=5373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:58.443954 kernel: audit: type=1103 audit(1707776698.437:1477): pid=5373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:58.437000 audit[5373]: CRED_ACQ pid=5373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:58.438585 sshd[5373]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:24:58.437000 audit[5373]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc16ffc6c0 a2=3 a3=0 items=0 ppid=1 pid=5373 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:58.452821 systemd[1]: Started session-18.scope. Feb 12 22:24:58.455907 kernel: audit: type=1006 audit(1707776698.437:1478): pid=5373 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Feb 12 22:24:58.455984 kernel: audit: type=1300 audit(1707776698.437:1478): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc16ffc6c0 a2=3 a3=0 items=0 ppid=1 pid=5373 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:58.456030 kernel: audit: type=1327 audit(1707776698.437:1478): proctitle=737368643A20636F7265205B707269765D Feb 12 22:24:58.437000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:24:58.456150 systemd-logind[1548]: New session 18 of user core. Feb 12 22:24:58.464000 audit[5373]: USER_START pid=5373 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:58.464000 audit[5375]: CRED_ACQ pid=5375 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:58.477456 kernel: audit: type=1105 audit(1707776698.464:1479): pid=5373 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:58.477587 kernel: audit: type=1103 audit(1707776698.464:1480): pid=5375 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:58.750407 sshd[5373]: pam_unix(sshd:session): session closed for user core Feb 12 22:24:58.751000 audit[5373]: USER_END pid=5373 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:58.755061 systemd-logind[1548]: Session 18 logged out. Waiting for processes to exit. Feb 12 22:24:58.756998 systemd[1]: sshd@17-172.31.25.241:22-139.178.89.65:54224.service: Deactivated successfully. Feb 12 22:24:58.758169 systemd[1]: session-18.scope: Deactivated successfully. Feb 12 22:24:58.759905 kernel: audit: type=1106 audit(1707776698.751:1481): pid=5373 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:58.759989 kernel: audit: type=1104 audit(1707776698.751:1482): pid=5373 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:58.751000 audit[5373]: CRED_DISP pid=5373 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:24:58.760914 systemd-logind[1548]: Removed session 18. Feb 12 22:24:58.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.25.241:22-139.178.89.65:54224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:24:59.310991 kubelet[2807]: I0212 22:24:59.310958 2807 topology_manager.go:210] "Topology Admit Handler" Feb 12 22:24:59.318370 systemd[1]: Created slice kubepods-besteffort-pode7109601_9cae_435a_aea2_b543d7dbce71.slice. Feb 12 22:24:59.447163 kubelet[2807]: I0212 22:24:59.447070 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zpf7l\" (UniqueName: \"kubernetes.io/projected/e7109601-9cae-435a-aea2-b543d7dbce71-kube-api-access-zpf7l\") pod \"calico-apiserver-5cc4d9f49-plbfq\" (UID: \"e7109601-9cae-435a-aea2-b543d7dbce71\") " pod="calico-apiserver/calico-apiserver-5cc4d9f49-plbfq" Feb 12 22:24:59.447453 kubelet[2807]: I0212 22:24:59.447433 2807 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e7109601-9cae-435a-aea2-b543d7dbce71-calico-apiserver-certs\") pod \"calico-apiserver-5cc4d9f49-plbfq\" (UID: \"e7109601-9cae-435a-aea2-b543d7dbce71\") " pod="calico-apiserver/calico-apiserver-5cc4d9f49-plbfq" Feb 12 22:24:59.489000 audit[5409]: NETFILTER_CFG table=filter:127 family=2 entries=6 op=nft_register_rule pid=5409 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:24:59.489000 audit[5409]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe3e0b95b0 a2=0 a3=7ffe3e0b959c items=0 ppid=2972 pid=5409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:59.489000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:24:59.493000 audit[5409]: NETFILTER_CFG table=nat:128 family=2 entries=78 op=nft_register_rule pid=5409 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:24:59.493000 audit[5409]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe3e0b95b0 a2=0 a3=7ffe3e0b959c items=0 ppid=2972 pid=5409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:59.493000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:24:59.549883 kubelet[2807]: E0212 22:24:59.549840 2807 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 12 22:24:59.551909 kubelet[2807]: E0212 22:24:59.551887 2807 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/e7109601-9cae-435a-aea2-b543d7dbce71-calico-apiserver-certs podName:e7109601-9cae-435a-aea2-b543d7dbce71 nodeName:}" failed. No retries permitted until 2024-02-12 22:25:00.050107329 +0000 UTC m=+115.570526571 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/e7109601-9cae-435a-aea2-b543d7dbce71-calico-apiserver-certs") pod "calico-apiserver-5cc4d9f49-plbfq" (UID: "e7109601-9cae-435a-aea2-b543d7dbce71") : secret "calico-apiserver-certs" not found Feb 12 22:24:59.579000 audit[5435]: NETFILTER_CFG table=filter:129 family=2 entries=7 op=nft_register_rule pid=5435 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:24:59.579000 audit[5435]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fffb6b44720 a2=0 a3=7fffb6b4470c items=0 ppid=2972 pid=5435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:59.579000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:24:59.583000 audit[5435]: NETFILTER_CFG table=nat:130 family=2 entries=78 op=nft_register_rule pid=5435 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:24:59.583000 audit[5435]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fffb6b44720 a2=0 a3=7fffb6b4470c items=0 ppid=2972 pid=5435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:24:59.583000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:00.148000 audit[2687]: AVC avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:00.148000 audit[2687]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0019fdd40 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:25:00.148000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:25:00.154000 audit[2687]: AVC avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:00.154000 audit[2687]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002cf5c60 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:25:00.154000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:25:00.224446 env[1557]: time="2024-02-12T22:25:00.224394883Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cc4d9f49-plbfq,Uid:e7109601-9cae-435a-aea2-b543d7dbce71,Namespace:calico-apiserver,Attempt:0,}" Feb 12 22:25:00.749084 (udev-worker)[5456]: Network interface NamePolicy= disabled on kernel command line. Feb 12 22:25:00.753738 systemd-networkd[1377]: cali7f674140587: Link UP Feb 12 22:25:00.757001 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 22:25:00.757129 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7f674140587: link becomes ready Feb 12 22:25:00.757353 systemd-networkd[1377]: cali7f674140587: Gained carrier Feb 12 22:25:00.779284 env[1557]: 2024-02-12 22:25:00.629 [INFO][5438] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--25--241-k8s-calico--apiserver--5cc4d9f49--plbfq-eth0 calico-apiserver-5cc4d9f49- calico-apiserver e7109601-9cae-435a-aea2-b543d7dbce71 1068 0 2024-02-12 22:24:59 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5cc4d9f49 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-25-241 calico-apiserver-5cc4d9f49-plbfq eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali7f674140587 [] []}} ContainerID="da7f922d49b6fb1ad50b0f800d284a0c1e49598e6e981a37eb3b58c632091735" Namespace="calico-apiserver" Pod="calico-apiserver-5cc4d9f49-plbfq" WorkloadEndpoint="ip--172--31--25--241-k8s-calico--apiserver--5cc4d9f49--plbfq-" Feb 12 22:25:00.779284 env[1557]: 2024-02-12 22:25:00.630 [INFO][5438] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="da7f922d49b6fb1ad50b0f800d284a0c1e49598e6e981a37eb3b58c632091735" Namespace="calico-apiserver" Pod="calico-apiserver-5cc4d9f49-plbfq" WorkloadEndpoint="ip--172--31--25--241-k8s-calico--apiserver--5cc4d9f49--plbfq-eth0" Feb 12 22:25:00.779284 env[1557]: 2024-02-12 22:25:00.677 [INFO][5449] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="da7f922d49b6fb1ad50b0f800d284a0c1e49598e6e981a37eb3b58c632091735" HandleID="k8s-pod-network.da7f922d49b6fb1ad50b0f800d284a0c1e49598e6e981a37eb3b58c632091735" Workload="ip--172--31--25--241-k8s-calico--apiserver--5cc4d9f49--plbfq-eth0" Feb 12 22:25:00.779284 env[1557]: 2024-02-12 22:25:00.688 [INFO][5449] ipam_plugin.go 268: Auto assigning IP ContainerID="da7f922d49b6fb1ad50b0f800d284a0c1e49598e6e981a37eb3b58c632091735" HandleID="k8s-pod-network.da7f922d49b6fb1ad50b0f800d284a0c1e49598e6e981a37eb3b58c632091735" Workload="ip--172--31--25--241-k8s-calico--apiserver--5cc4d9f49--plbfq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027d7b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-25-241", "pod":"calico-apiserver-5cc4d9f49-plbfq", "timestamp":"2024-02-12 22:25:00.677262969 +0000 UTC"}, Hostname:"ip-172-31-25-241", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 22:25:00.779284 env[1557]: 2024-02-12 22:25:00.689 [INFO][5449] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 22:25:00.779284 env[1557]: 2024-02-12 22:25:00.689 [INFO][5449] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 22:25:00.779284 env[1557]: 2024-02-12 22:25:00.689 [INFO][5449] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-25-241' Feb 12 22:25:00.779284 env[1557]: 2024-02-12 22:25:00.691 [INFO][5449] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.da7f922d49b6fb1ad50b0f800d284a0c1e49598e6e981a37eb3b58c632091735" host="ip-172-31-25-241" Feb 12 22:25:00.779284 env[1557]: 2024-02-12 22:25:00.701 [INFO][5449] ipam.go 372: Looking up existing affinities for host host="ip-172-31-25-241" Feb 12 22:25:00.779284 env[1557]: 2024-02-12 22:25:00.714 [INFO][5449] ipam.go 489: Trying affinity for 192.168.33.64/26 host="ip-172-31-25-241" Feb 12 22:25:00.779284 env[1557]: 2024-02-12 22:25:00.718 [INFO][5449] ipam.go 155: Attempting to load block cidr=192.168.33.64/26 host="ip-172-31-25-241" Feb 12 22:25:00.779284 env[1557]: 2024-02-12 22:25:00.722 [INFO][5449] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.33.64/26 host="ip-172-31-25-241" Feb 12 22:25:00.779284 env[1557]: 2024-02-12 22:25:00.722 [INFO][5449] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.33.64/26 handle="k8s-pod-network.da7f922d49b6fb1ad50b0f800d284a0c1e49598e6e981a37eb3b58c632091735" host="ip-172-31-25-241" Feb 12 22:25:00.779284 env[1557]: 2024-02-12 22:25:00.724 [INFO][5449] ipam.go 1682: Creating new handle: k8s-pod-network.da7f922d49b6fb1ad50b0f800d284a0c1e49598e6e981a37eb3b58c632091735 Feb 12 22:25:00.779284 env[1557]: 2024-02-12 22:25:00.729 [INFO][5449] ipam.go 1203: Writing block in order to claim IPs block=192.168.33.64/26 handle="k8s-pod-network.da7f922d49b6fb1ad50b0f800d284a0c1e49598e6e981a37eb3b58c632091735" host="ip-172-31-25-241" Feb 12 22:25:00.779284 env[1557]: 2024-02-12 22:25:00.736 [INFO][5449] ipam.go 1216: Successfully claimed IPs: [192.168.33.69/26] block=192.168.33.64/26 handle="k8s-pod-network.da7f922d49b6fb1ad50b0f800d284a0c1e49598e6e981a37eb3b58c632091735" host="ip-172-31-25-241" Feb 12 22:25:00.779284 env[1557]: 2024-02-12 22:25:00.736 [INFO][5449] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.33.69/26] handle="k8s-pod-network.da7f922d49b6fb1ad50b0f800d284a0c1e49598e6e981a37eb3b58c632091735" host="ip-172-31-25-241" Feb 12 22:25:00.779284 env[1557]: 2024-02-12 22:25:00.736 [INFO][5449] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 22:25:00.779284 env[1557]: 2024-02-12 22:25:00.736 [INFO][5449] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.33.69/26] IPv6=[] ContainerID="da7f922d49b6fb1ad50b0f800d284a0c1e49598e6e981a37eb3b58c632091735" HandleID="k8s-pod-network.da7f922d49b6fb1ad50b0f800d284a0c1e49598e6e981a37eb3b58c632091735" Workload="ip--172--31--25--241-k8s-calico--apiserver--5cc4d9f49--plbfq-eth0" Feb 12 22:25:00.783092 env[1557]: 2024-02-12 22:25:00.740 [INFO][5438] k8s.go 385: Populated endpoint ContainerID="da7f922d49b6fb1ad50b0f800d284a0c1e49598e6e981a37eb3b58c632091735" Namespace="calico-apiserver" Pod="calico-apiserver-5cc4d9f49-plbfq" WorkloadEndpoint="ip--172--31--25--241-k8s-calico--apiserver--5cc4d9f49--plbfq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--241-k8s-calico--apiserver--5cc4d9f49--plbfq-eth0", GenerateName:"calico-apiserver-5cc4d9f49-", Namespace:"calico-apiserver", SelfLink:"", UID:"e7109601-9cae-435a-aea2-b543d7dbce71", ResourceVersion:"1068", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 24, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cc4d9f49", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-241", ContainerID:"", Pod:"calico-apiserver-5cc4d9f49-plbfq", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.33.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7f674140587", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:25:00.783092 env[1557]: 2024-02-12 22:25:00.740 [INFO][5438] k8s.go 386: Calico CNI using IPs: [192.168.33.69/32] ContainerID="da7f922d49b6fb1ad50b0f800d284a0c1e49598e6e981a37eb3b58c632091735" Namespace="calico-apiserver" Pod="calico-apiserver-5cc4d9f49-plbfq" WorkloadEndpoint="ip--172--31--25--241-k8s-calico--apiserver--5cc4d9f49--plbfq-eth0" Feb 12 22:25:00.783092 env[1557]: 2024-02-12 22:25:00.740 [INFO][5438] dataplane_linux.go 68: Setting the host side veth name to cali7f674140587 ContainerID="da7f922d49b6fb1ad50b0f800d284a0c1e49598e6e981a37eb3b58c632091735" Namespace="calico-apiserver" Pod="calico-apiserver-5cc4d9f49-plbfq" WorkloadEndpoint="ip--172--31--25--241-k8s-calico--apiserver--5cc4d9f49--plbfq-eth0" Feb 12 22:25:00.783092 env[1557]: 2024-02-12 22:25:00.753 [INFO][5438] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="da7f922d49b6fb1ad50b0f800d284a0c1e49598e6e981a37eb3b58c632091735" Namespace="calico-apiserver" Pod="calico-apiserver-5cc4d9f49-plbfq" WorkloadEndpoint="ip--172--31--25--241-k8s-calico--apiserver--5cc4d9f49--plbfq-eth0" Feb 12 22:25:00.783092 env[1557]: 2024-02-12 22:25:00.757 [INFO][5438] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="da7f922d49b6fb1ad50b0f800d284a0c1e49598e6e981a37eb3b58c632091735" Namespace="calico-apiserver" Pod="calico-apiserver-5cc4d9f49-plbfq" WorkloadEndpoint="ip--172--31--25--241-k8s-calico--apiserver--5cc4d9f49--plbfq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--25--241-k8s-calico--apiserver--5cc4d9f49--plbfq-eth0", GenerateName:"calico-apiserver-5cc4d9f49-", Namespace:"calico-apiserver", SelfLink:"", UID:"e7109601-9cae-435a-aea2-b543d7dbce71", ResourceVersion:"1068", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 22, 24, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cc4d9f49", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-25-241", ContainerID:"da7f922d49b6fb1ad50b0f800d284a0c1e49598e6e981a37eb3b58c632091735", Pod:"calico-apiserver-5cc4d9f49-plbfq", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.33.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7f674140587", MAC:"ce:c5:a9:bd:0c:ff", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 22:25:00.783092 env[1557]: 2024-02-12 22:25:00.774 [INFO][5438] k8s.go 491: Wrote updated endpoint to datastore ContainerID="da7f922d49b6fb1ad50b0f800d284a0c1e49598e6e981a37eb3b58c632091735" Namespace="calico-apiserver" Pod="calico-apiserver-5cc4d9f49-plbfq" WorkloadEndpoint="ip--172--31--25--241-k8s-calico--apiserver--5cc4d9f49--plbfq-eth0" Feb 12 22:25:00.848392 env[1557]: time="2024-02-12T22:25:00.848288473Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 22:25:00.848547 env[1557]: time="2024-02-12T22:25:00.848416687Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 22:25:00.848547 env[1557]: time="2024-02-12T22:25:00.848448225Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 22:25:00.848691 env[1557]: time="2024-02-12T22:25:00.848645764Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/da7f922d49b6fb1ad50b0f800d284a0c1e49598e6e981a37eb3b58c632091735 pid=5481 runtime=io.containerd.runc.v2 Feb 12 22:25:00.899411 systemd[1]: run-containerd-runc-k8s.io-da7f922d49b6fb1ad50b0f800d284a0c1e49598e6e981a37eb3b58c632091735-runc.zVVmfR.mount: Deactivated successfully. Feb 12 22:25:00.904144 systemd[1]: Started cri-containerd-da7f922d49b6fb1ad50b0f800d284a0c1e49598e6e981a37eb3b58c632091735.scope. Feb 12 22:25:00.926000 audit[5509]: NETFILTER_CFG table=filter:131 family=2 entries=51 op=nft_register_chain pid=5509 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 22:25:00.926000 audit[5509]: SYSCALL arch=c000003e syscall=46 success=yes exit=26884 a0=3 a1=7ffdebcb8930 a2=0 a3=7ffdebcb891c items=0 ppid=4002 pid=5509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:00.926000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 22:25:00.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.931000 audit: BPF prog-id=189 op=LOAD Feb 12 22:25:00.931000 audit[5492]: AVC avc: denied { bpf } for pid=5492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.931000 audit[5492]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5481 pid=5492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:00.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461376639323264343962366662316164353062306638303064323834 Feb 12 22:25:00.931000 audit[5492]: AVC avc: denied { perfmon } for pid=5492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.931000 audit[5492]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=5481 pid=5492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:00.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461376639323264343962366662316164353062306638303064323834 Feb 12 22:25:00.931000 audit[5492]: AVC avc: denied { bpf } for pid=5492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.931000 audit[5492]: AVC avc: denied { bpf } for pid=5492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.931000 audit[5492]: AVC avc: denied { bpf } for pid=5492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.931000 audit[5492]: AVC avc: denied { perfmon } for pid=5492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.931000 audit[5492]: AVC avc: denied { perfmon } for pid=5492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.931000 audit[5492]: AVC avc: denied { perfmon } for pid=5492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.931000 audit[5492]: AVC avc: denied { perfmon } for pid=5492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.931000 audit[5492]: AVC avc: denied { perfmon } for pid=5492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.931000 audit[5492]: AVC avc: denied { bpf } for pid=5492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.931000 audit[5492]: AVC avc: denied { bpf } for pid=5492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.931000 audit: BPF prog-id=190 op=LOAD Feb 12 22:25:00.931000 audit[5492]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003185f0 items=0 ppid=5481 pid=5492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:00.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461376639323264343962366662316164353062306638303064323834 Feb 12 22:25:00.932000 audit[5492]: AVC avc: denied { bpf } for pid=5492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.932000 audit[5492]: AVC avc: denied { bpf } for pid=5492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.932000 audit[5492]: AVC avc: denied { perfmon } for pid=5492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.932000 audit[5492]: AVC avc: denied { perfmon } for pid=5492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.932000 audit[5492]: AVC avc: denied { perfmon } for pid=5492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.932000 audit[5492]: AVC avc: denied { perfmon } for pid=5492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.932000 audit[5492]: AVC avc: denied { perfmon } for pid=5492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.932000 audit[5492]: AVC avc: denied { bpf } for pid=5492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.932000 audit[5492]: AVC avc: denied { bpf } for pid=5492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.932000 audit: BPF prog-id=191 op=LOAD Feb 12 22:25:00.932000 audit[5492]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000318638 items=0 ppid=5481 pid=5492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:00.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461376639323264343962366662316164353062306638303064323834 Feb 12 22:25:00.932000 audit: BPF prog-id=191 op=UNLOAD Feb 12 22:25:00.932000 audit: BPF prog-id=190 op=UNLOAD Feb 12 22:25:00.932000 audit[5492]: AVC avc: denied { bpf } for pid=5492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.932000 audit[5492]: AVC avc: denied { bpf } for pid=5492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.932000 audit[5492]: AVC avc: denied { bpf } for pid=5492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.932000 audit[5492]: AVC avc: denied { perfmon } for pid=5492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.932000 audit[5492]: AVC avc: denied { perfmon } for pid=5492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.932000 audit[5492]: AVC avc: denied { perfmon } for pid=5492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.932000 audit[5492]: AVC avc: denied { perfmon } for pid=5492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.932000 audit[5492]: AVC avc: denied { perfmon } for pid=5492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.932000 audit[5492]: AVC avc: denied { bpf } for pid=5492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.932000 audit[5492]: AVC avc: denied { bpf } for pid=5492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:00.932000 audit: BPF prog-id=192 op=LOAD Feb 12 22:25:00.932000 audit[5492]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000318a48 items=0 ppid=5481 pid=5492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:00.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461376639323264343962366662316164353062306638303064323834 Feb 12 22:25:00.972414 env[1557]: time="2024-02-12T22:25:00.972362226Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cc4d9f49-plbfq,Uid:e7109601-9cae-435a-aea2-b543d7dbce71,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"da7f922d49b6fb1ad50b0f800d284a0c1e49598e6e981a37eb3b58c632091735\"" Feb 12 22:25:00.974972 env[1557]: time="2024-02-12T22:25:00.974937246Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 22:25:01.000000 audit[2680]: AVC avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:01.000000 audit[2680]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c0145bab70 a2=fc6 a3=0 items=0 ppid=2506 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 key=(null) Feb 12 22:25:01.000000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E323431002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 12 22:25:01.001000 audit[2680]: AVC avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:01.001000 audit[2680]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00307caa0 a2=fc6 a3=0 items=0 ppid=2506 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 key=(null) Feb 12 22:25:01.001000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E323431002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 12 22:25:01.006000 audit[2680]: AVC avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521282 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:01.006000 audit[2680]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c016fbe900 a2=fc6 a3=0 items=0 ppid=2506 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 key=(null) Feb 12 22:25:01.006000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E323431002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 12 22:25:01.006000 audit[2680]: AVC avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521276 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:01.006000 audit[2680]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c016fbe930 a2=fc6 a3=0 items=0 ppid=2506 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 key=(null) Feb 12 22:25:01.006000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E323431002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 12 22:25:01.046000 audit[2680]: AVC avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:01.046000 audit[2680]: AVC avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:01.046000 audit[2680]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c0030404a0 a2=fc6 a3=0 items=0 ppid=2506 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 key=(null) Feb 12 22:25:01.046000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E323431002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 12 22:25:01.046000 audit[2680]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c016fbeba0 a2=fc6 a3=0 items=0 ppid=2506 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 key=(null) Feb 12 22:25:01.046000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E323431002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 12 22:25:02.286974 systemd-networkd[1377]: cali7f674140587: Gained IPv6LL Feb 12 22:25:02.476403 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3978277691.mount: Deactivated successfully. Feb 12 22:25:03.780041 systemd[1]: Started sshd@18-172.31.25.241:22-139.178.89.65:54234.service. Feb 12 22:25:03.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.25.241:22-139.178.89.65:54234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:03.788326 kernel: kauditd_printk_skb: 97 callbacks suppressed Feb 12 22:25:03.788510 kernel: audit: type=1130 audit(1707776703.779:1515): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.25.241:22-139.178.89.65:54234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:04.018000 audit[5518]: USER_ACCT pid=5518 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:04.025828 sshd[5518]: Accepted publickey for core from 139.178.89.65 port 54234 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:25:04.026170 kernel: audit: type=1101 audit(1707776704.018:1516): pid=5518 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:04.024000 audit[5518]: CRED_ACQ pid=5518 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:04.031987 sshd[5518]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:25:04.035517 kernel: audit: type=1103 audit(1707776704.024:1517): pid=5518 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:04.035591 kernel: audit: type=1006 audit(1707776704.025:1518): pid=5518 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Feb 12 22:25:04.041815 kernel: audit: type=1300 audit(1707776704.025:1518): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2936e390 a2=3 a3=0 items=0 ppid=1 pid=5518 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:04.044236 kernel: audit: type=1327 audit(1707776704.025:1518): proctitle=737368643A20636F7265205B707269765D Feb 12 22:25:04.025000 audit[5518]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2936e390 a2=3 a3=0 items=0 ppid=1 pid=5518 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:04.025000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:25:04.046203 systemd[1]: Started session-19.scope. Feb 12 22:25:04.046772 systemd-logind[1548]: New session 19 of user core. Feb 12 22:25:04.053000 audit[5518]: USER_START pid=5518 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:04.061084 kernel: audit: type=1105 audit(1707776704.053:1519): pid=5518 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:04.055000 audit[5520]: CRED_ACQ pid=5520 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:04.067081 kernel: audit: type=1103 audit(1707776704.055:1520): pid=5520 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:04.413233 sshd[5518]: pam_unix(sshd:session): session closed for user core Feb 12 22:25:04.424023 kernel: audit: type=1106 audit(1707776704.414:1521): pid=5518 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:04.414000 audit[5518]: USER_END pid=5518 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:04.424374 systemd[1]: sshd@18-172.31.25.241:22-139.178.89.65:54234.service: Deactivated successfully. Feb 12 22:25:04.425653 systemd[1]: session-19.scope: Deactivated successfully. Feb 12 22:25:04.432025 kernel: audit: type=1104 audit(1707776704.421:1522): pid=5518 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:04.421000 audit[5518]: CRED_DISP pid=5518 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:04.427321 systemd-logind[1548]: Session 19 logged out. Waiting for processes to exit. Feb 12 22:25:04.428813 systemd-logind[1548]: Removed session 19. Feb 12 22:25:04.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.25.241:22-139.178.89.65:54234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:04.441447 systemd[1]: Started sshd@19-172.31.25.241:22-139.178.89.65:54242.service. Feb 12 22:25:04.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.25.241:22-139.178.89.65:54242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:04.617000 audit[5530]: USER_ACCT pid=5530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:04.618807 sshd[5530]: Accepted publickey for core from 139.178.89.65 port 54242 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:25:04.618000 audit[5530]: CRED_ACQ pid=5530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:04.619000 audit[5530]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5ddd1ee0 a2=3 a3=0 items=0 ppid=1 pid=5530 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:04.619000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:25:04.620594 sshd[5530]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:25:04.627787 systemd-logind[1548]: New session 20 of user core. Feb 12 22:25:04.628769 systemd[1]: Started session-20.scope. Feb 12 22:25:04.634000 audit[5530]: USER_START pid=5530 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:04.636000 audit[5532]: CRED_ACQ pid=5532 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:05.553013 sshd[5530]: pam_unix(sshd:session): session closed for user core Feb 12 22:25:05.565000 audit[5530]: USER_END pid=5530 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:05.566000 audit[5530]: CRED_DISP pid=5530 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:05.581540 systemd[1]: Started sshd@20-172.31.25.241:22-139.178.89.65:54258.service. Feb 12 22:25:05.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.25.241:22-139.178.89.65:54258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:05.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.25.241:22-139.178.89.65:54242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:05.591534 systemd[1]: sshd@19-172.31.25.241:22-139.178.89.65:54242.service: Deactivated successfully. Feb 12 22:25:05.596221 systemd[1]: session-20.scope: Deactivated successfully. Feb 12 22:25:05.603051 systemd-logind[1548]: Session 20 logged out. Waiting for processes to exit. Feb 12 22:25:05.613882 systemd-logind[1548]: Removed session 20. Feb 12 22:25:05.779000 audit[5541]: USER_ACCT pid=5541 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:05.783380 sshd[5541]: Accepted publickey for core from 139.178.89.65 port 54258 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:25:05.783000 audit[5541]: CRED_ACQ pid=5541 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:05.783000 audit[5541]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcabcec1a0 a2=3 a3=0 items=0 ppid=1 pid=5541 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:05.783000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:25:05.786289 sshd[5541]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:25:05.796409 systemd[1]: Started session-21.scope. Feb 12 22:25:05.798918 systemd-logind[1548]: New session 21 of user core. Feb 12 22:25:05.825000 audit[5541]: USER_START pid=5541 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:05.830000 audit[5544]: CRED_ACQ pid=5544 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:06.465000 audit[5578]: NETFILTER_CFG table=filter:132 family=2 entries=8 op=nft_register_rule pid=5578 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:06.465000 audit[5578]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fff71bed990 a2=0 a3=7fff71bed97c items=0 ppid=2972 pid=5578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:06.465000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:06.470000 audit[5578]: NETFILTER_CFG table=nat:133 family=2 entries=78 op=nft_register_rule pid=5578 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:06.470000 audit[5578]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff71bed990 a2=0 a3=7fff71bed97c items=0 ppid=2972 pid=5578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:06.470000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:07.051448 env[1557]: time="2024-02-12T22:25:07.051394737Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:25:07.056116 env[1557]: time="2024-02-12T22:25:07.055994133Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:25:07.063143 env[1557]: time="2024-02-12T22:25:07.063095844Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:25:07.068218 env[1557]: time="2024-02-12T22:25:07.068174530Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 22:25:07.069466 env[1557]: time="2024-02-12T22:25:07.069426141Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 12 22:25:07.073386 env[1557]: time="2024-02-12T22:25:07.073347203Z" level=info msg="CreateContainer within sandbox \"da7f922d49b6fb1ad50b0f800d284a0c1e49598e6e981a37eb3b58c632091735\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 22:25:07.125568 env[1557]: time="2024-02-12T22:25:07.125346307Z" level=info msg="CreateContainer within sandbox \"da7f922d49b6fb1ad50b0f800d284a0c1e49598e6e981a37eb3b58c632091735\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"047efa854be8e4d435a6dd5d364ade90b83cf012ead4c8a5edf356107ee0735f\"" Feb 12 22:25:07.126926 env[1557]: time="2024-02-12T22:25:07.126882160Z" level=info msg="StartContainer for \"047efa854be8e4d435a6dd5d364ade90b83cf012ead4c8a5edf356107ee0735f\"" Feb 12 22:25:07.199475 systemd[1]: run-containerd-runc-k8s.io-047efa854be8e4d435a6dd5d364ade90b83cf012ead4c8a5edf356107ee0735f-runc.KAGiNa.mount: Deactivated successfully. Feb 12 22:25:07.205752 systemd[1]: Started cri-containerd-047efa854be8e4d435a6dd5d364ade90b83cf012ead4c8a5edf356107ee0735f.scope. Feb 12 22:25:07.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.238000 audit: BPF prog-id=193 op=LOAD Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5481 pid=5592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:07.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034376566613835346265386534643433356136646435643336346164 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=5481 pid=5592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:07.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034376566613835346265386534643433356136646435643336346164 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit: BPF prog-id=194 op=LOAD Feb 12 22:25:07.239000 audit[5592]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000218740 items=0 ppid=5481 pid=5592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:07.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034376566613835346265386534643433356136646435643336346164 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit: BPF prog-id=195 op=LOAD Feb 12 22:25:07.239000 audit[5592]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000218788 items=0 ppid=5481 pid=5592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:07.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034376566613835346265386534643433356136646435643336346164 Feb 12 22:25:07.239000 audit: BPF prog-id=195 op=UNLOAD Feb 12 22:25:07.239000 audit: BPF prog-id=194 op=UNLOAD Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { perfmon } for pid=5592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit[5592]: AVC avc: denied { bpf } for pid=5592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:25:07.239000 audit: BPF prog-id=196 op=LOAD Feb 12 22:25:07.239000 audit[5592]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000218b98 items=0 ppid=5481 pid=5592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:07.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034376566613835346265386534643433356136646435643336346164 Feb 12 22:25:07.287443 env[1557]: time="2024-02-12T22:25:07.287384239Z" level=info msg="StartContainer for \"047efa854be8e4d435a6dd5d364ade90b83cf012ead4c8a5edf356107ee0735f\" returns successfully" Feb 12 22:25:07.700927 kubelet[2807]: I0212 22:25:07.700884 2807 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5cc4d9f49-plbfq" podStartSLOduration=-9.223372028157444e+09 pod.CreationTimestamp="2024-02-12 22:24:59 +0000 UTC" firstStartedPulling="2024-02-12 22:25:00.974423574 +0000 UTC m=+116.494842794" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 22:25:07.695384104 +0000 UTC m=+123.215803348" watchObservedRunningTime="2024-02-12 22:25:07.69733168 +0000 UTC m=+123.217750923" Feb 12 22:25:08.300000 audit[5602]: AVC avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_22_25_00.1586650647/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c41,c769 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c41,c769 tclass=file permissive=0 Feb 12 22:25:08.300000 audit[5602]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e9a460 a2=fc6 a3=0 items=0 ppid=5481 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c41,c769 key=(null) Feb 12 22:25:08.300000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 22:25:08.324000 audit[5645]: NETFILTER_CFG table=filter:134 family=2 entries=8 op=nft_register_rule pid=5645 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:08.324000 audit[5645]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffcde17b430 a2=0 a3=7ffcde17b41c items=0 ppid=2972 pid=5645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:08.324000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:08.329000 audit[5645]: NETFILTER_CFG table=nat:135 family=2 entries=78 op=nft_register_rule pid=5645 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:08.329000 audit[5645]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffcde17b430 a2=0 a3=7ffcde17b41c items=0 ppid=2972 pid=5645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:08.329000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:09.491981 sshd[5541]: pam_unix(sshd:session): session closed for user core Feb 12 22:25:09.504791 kernel: kauditd_printk_skb: 92 callbacks suppressed Feb 12 22:25:09.505157 kernel: audit: type=1106 audit(1707776709.495:1562): pid=5541 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:09.512381 kernel: audit: type=1104 audit(1707776709.495:1563): pid=5541 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:09.495000 audit[5541]: USER_END pid=5541 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:09.495000 audit[5541]: CRED_DISP pid=5541 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:09.498244 systemd[1]: sshd@20-172.31.25.241:22-139.178.89.65:54258.service: Deactivated successfully. Feb 12 22:25:09.500258 systemd[1]: session-21.scope: Deactivated successfully. Feb 12 22:25:09.501460 systemd-logind[1548]: Session 21 logged out. Waiting for processes to exit. Feb 12 22:25:09.502681 systemd-logind[1548]: Removed session 21. Feb 12 22:25:09.522212 kernel: audit: type=1131 audit(1707776709.497:1564): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.25.241:22-139.178.89.65:54258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:09.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.25.241:22-139.178.89.65:54258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:09.529973 systemd[1]: Started sshd@21-172.31.25.241:22-139.178.89.65:60226.service. Feb 12 22:25:09.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.25.241:22-139.178.89.65:60226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:09.537882 kernel: audit: type=1130 audit(1707776709.530:1565): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.25.241:22-139.178.89.65:60226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:09.539000 audit[5674]: NETFILTER_CFG table=filter:136 family=2 entries=20 op=nft_register_rule pid=5674 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:09.553569 kernel: audit: type=1325 audit(1707776709.539:1566): table=filter:136 family=2 entries=20 op=nft_register_rule pid=5674 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:09.553652 kernel: audit: type=1300 audit(1707776709.539:1566): arch=c000003e syscall=46 success=yes exit=11068 a0=3 a1=7ffe6b322600 a2=0 a3=7ffe6b3225ec items=0 ppid=2972 pid=5674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:09.539000 audit[5674]: SYSCALL arch=c000003e syscall=46 success=yes exit=11068 a0=3 a1=7ffe6b322600 a2=0 a3=7ffe6b3225ec items=0 ppid=2972 pid=5674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:09.539000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:09.559876 kernel: audit: type=1327 audit(1707776709.539:1566): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:09.541000 audit[5674]: NETFILTER_CFG table=nat:137 family=2 entries=78 op=nft_register_rule pid=5674 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:09.565926 kernel: audit: type=1325 audit(1707776709.541:1567): table=nat:137 family=2 entries=78 op=nft_register_rule pid=5674 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:09.541000 audit[5674]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe6b322600 a2=0 a3=7ffe6b3225ec items=0 ppid=2972 pid=5674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:09.578038 kernel: audit: type=1300 audit(1707776709.541:1567): arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe6b322600 a2=0 a3=7ffe6b3225ec items=0 ppid=2972 pid=5674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:09.541000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:09.582899 kernel: audit: type=1327 audit(1707776709.541:1567): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:09.675000 audit[5701]: NETFILTER_CFG table=filter:138 family=2 entries=32 op=nft_register_rule pid=5701 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:09.675000 audit[5701]: SYSCALL arch=c000003e syscall=46 success=yes exit=11068 a0=3 a1=7ffdd9fee2a0 a2=0 a3=7ffdd9fee28c items=0 ppid=2972 pid=5701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:09.675000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:09.677000 audit[5701]: NETFILTER_CFG table=nat:139 family=2 entries=78 op=nft_register_rule pid=5701 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:09.677000 audit[5701]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffdd9fee2a0 a2=0 a3=7ffdd9fee28c items=0 ppid=2972 pid=5701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:09.677000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:09.721000 audit[5673]: USER_ACCT pid=5673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:09.723049 sshd[5673]: Accepted publickey for core from 139.178.89.65 port 60226 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:25:09.723000 audit[5673]: CRED_ACQ pid=5673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:09.723000 audit[5673]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc84ac7570 a2=3 a3=0 items=0 ppid=1 pid=5673 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:09.723000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:25:09.725001 sshd[5673]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:25:09.735464 systemd-logind[1548]: New session 22 of user core. Feb 12 22:25:09.736124 systemd[1]: Started session-22.scope. Feb 12 22:25:09.741000 audit[5673]: USER_START pid=5673 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:09.742000 audit[5702]: CRED_ACQ pid=5702 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:10.711775 sshd[5673]: pam_unix(sshd:session): session closed for user core Feb 12 22:25:10.715000 audit[5673]: USER_END pid=5673 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:10.716000 audit[5673]: CRED_DISP pid=5673 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:10.720764 systemd-logind[1548]: Session 22 logged out. Waiting for processes to exit. Feb 12 22:25:10.722712 systemd[1]: sshd@21-172.31.25.241:22-139.178.89.65:60226.service: Deactivated successfully. Feb 12 22:25:10.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.25.241:22-139.178.89.65:60226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:10.724306 systemd[1]: session-22.scope: Deactivated successfully. Feb 12 22:25:10.727907 systemd-logind[1548]: Removed session 22. Feb 12 22:25:10.742110 systemd[1]: Started sshd@22-172.31.25.241:22-139.178.89.65:60236.service. Feb 12 22:25:10.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.25.241:22-139.178.89.65:60236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:10.928000 audit[5711]: USER_ACCT pid=5711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:10.930606 sshd[5711]: Accepted publickey for core from 139.178.89.65 port 60236 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:25:10.931000 audit[5711]: CRED_ACQ pid=5711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:10.931000 audit[5711]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf7c382b0 a2=3 a3=0 items=0 ppid=1 pid=5711 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:10.931000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:25:10.934595 sshd[5711]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:25:10.941777 systemd-logind[1548]: New session 23 of user core. Feb 12 22:25:10.942579 systemd[1]: Started session-23.scope. Feb 12 22:25:10.948000 audit[5711]: USER_START pid=5711 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:10.950000 audit[5714]: CRED_ACQ pid=5714 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:11.283297 sshd[5711]: pam_unix(sshd:session): session closed for user core Feb 12 22:25:11.284000 audit[5711]: USER_END pid=5711 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:11.284000 audit[5711]: CRED_DISP pid=5711 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:11.287011 systemd[1]: sshd@22-172.31.25.241:22-139.178.89.65:60236.service: Deactivated successfully. Feb 12 22:25:11.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.25.241:22-139.178.89.65:60236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:11.288195 systemd[1]: session-23.scope: Deactivated successfully. Feb 12 22:25:11.289017 systemd-logind[1548]: Session 23 logged out. Waiting for processes to exit. Feb 12 22:25:11.289960 systemd-logind[1548]: Removed session 23. Feb 12 22:25:13.781000 audit[2687]: AVC avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:13.781000 audit[2687]: AVC avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:13.781000 audit[2687]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011c8a20 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:25:13.781000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:25:13.781000 audit[2687]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00129a140 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:25:13.781000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:25:13.782000 audit[2687]: AVC avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:13.782000 audit[2687]: AVC avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:25:13.782000 audit[2687]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00129a160 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:25:13.782000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:25:13.782000 audit[2687]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0011c8a60 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:25:13.782000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:25:16.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.25.241:22-139.178.89.65:60246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:16.321995 systemd[1]: Started sshd@23-172.31.25.241:22-139.178.89.65:60246.service. Feb 12 22:25:16.323412 kernel: kauditd_printk_skb: 39 callbacks suppressed Feb 12 22:25:16.325291 kernel: audit: type=1130 audit(1707776716.321:1591): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.25.241:22-139.178.89.65:60246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:16.523000 audit[5760]: USER_ACCT pid=5760 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:16.526570 sshd[5760]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:25:16.531277 kernel: audit: type=1101 audit(1707776716.523:1592): pid=5760 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:16.531318 sshd[5760]: Accepted publickey for core from 139.178.89.65 port 60246 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:25:16.525000 audit[5760]: CRED_ACQ pid=5760 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:16.540972 kernel: audit: type=1103 audit(1707776716.525:1593): pid=5760 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:16.541140 kernel: audit: type=1006 audit(1707776716.525:1594): pid=5760 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 12 22:25:16.525000 audit[5760]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd31a3fbd0 a2=3 a3=0 items=0 ppid=1 pid=5760 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:16.545360 systemd[1]: Started session-24.scope. Feb 12 22:25:16.551090 kernel: audit: type=1300 audit(1707776716.525:1594): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd31a3fbd0 a2=3 a3=0 items=0 ppid=1 pid=5760 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:16.551183 kernel: audit: type=1327 audit(1707776716.525:1594): proctitle=737368643A20636F7265205B707269765D Feb 12 22:25:16.525000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:25:16.549682 systemd-logind[1548]: New session 24 of user core. Feb 12 22:25:16.562000 audit[5760]: USER_START pid=5760 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:16.573637 kernel: audit: type=1105 audit(1707776716.562:1595): pid=5760 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:16.579145 kernel: audit: type=1103 audit(1707776716.571:1596): pid=5770 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:16.571000 audit[5770]: CRED_ACQ pid=5770 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:16.803983 sshd[5760]: pam_unix(sshd:session): session closed for user core Feb 12 22:25:16.804000 audit[5760]: USER_END pid=5760 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:16.804000 audit[5760]: CRED_DISP pid=5760 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:16.815381 systemd[1]: sshd@23-172.31.25.241:22-139.178.89.65:60246.service: Deactivated successfully. Feb 12 22:25:16.816384 systemd[1]: session-24.scope: Deactivated successfully. Feb 12 22:25:16.819219 kernel: audit: type=1106 audit(1707776716.804:1597): pid=5760 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:16.819809 kernel: audit: type=1104 audit(1707776716.804:1598): pid=5760 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:16.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.25.241:22-139.178.89.65:60246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:16.818581 systemd-logind[1548]: Session 24 logged out. Waiting for processes to exit. Feb 12 22:25:16.819903 systemd-logind[1548]: Removed session 24. Feb 12 22:25:18.419000 audit[5806]: NETFILTER_CFG table=filter:140 family=2 entries=20 op=nft_register_rule pid=5806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:18.419000 audit[5806]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fffef9ade50 a2=0 a3=7fffef9ade3c items=0 ppid=2972 pid=5806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:18.419000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:18.424000 audit[5806]: NETFILTER_CFG table=nat:141 family=2 entries=162 op=nft_register_chain pid=5806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:18.424000 audit[5806]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7fffef9ade50 a2=0 a3=7fffef9ade3c items=0 ppid=2972 pid=5806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:18.424000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:21.849569 systemd[1]: Started sshd@24-172.31.25.241:22-139.178.89.65:37262.service. Feb 12 22:25:21.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.25.241:22-139.178.89.65:37262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:21.858096 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 12 22:25:21.858301 kernel: audit: type=1130 audit(1707776721.855:1602): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.25.241:22-139.178.89.65:37262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:22.033000 audit[5819]: USER_ACCT pid=5819 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:22.034252 sshd[5819]: Accepted publickey for core from 139.178.89.65 port 37262 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:25:22.048401 kernel: audit: type=1101 audit(1707776722.033:1603): pid=5819 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:22.051000 audit[5819]: CRED_ACQ pid=5819 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:22.054055 sshd[5819]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:25:22.068542 kernel: audit: type=1103 audit(1707776722.051:1604): pid=5819 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:22.090768 kernel: audit: type=1006 audit(1707776722.051:1605): pid=5819 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 12 22:25:22.090917 kernel: audit: type=1300 audit(1707776722.051:1605): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca67c5d10 a2=3 a3=0 items=0 ppid=1 pid=5819 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:22.051000 audit[5819]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca67c5d10 a2=3 a3=0 items=0 ppid=1 pid=5819 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:22.091525 systemd-logind[1548]: New session 25 of user core. Feb 12 22:25:22.051000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:25:22.092510 systemd[1]: Started session-25.scope. Feb 12 22:25:22.097238 kernel: audit: type=1327 audit(1707776722.051:1605): proctitle=737368643A20636F7265205B707269765D Feb 12 22:25:22.104000 audit[5819]: USER_START pid=5819 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:22.110000 audit[5821]: CRED_ACQ pid=5821 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:22.121848 kernel: audit: type=1105 audit(1707776722.104:1606): pid=5819 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:22.121978 kernel: audit: type=1103 audit(1707776722.110:1607): pid=5821 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:22.380573 sshd[5819]: pam_unix(sshd:session): session closed for user core Feb 12 22:25:22.381000 audit[5819]: USER_END pid=5819 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:22.390227 kernel: audit: type=1106 audit(1707776722.381:1608): pid=5819 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:22.381000 audit[5819]: CRED_DISP pid=5819 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:22.391561 systemd-logind[1548]: Session 25 logged out. Waiting for processes to exit. Feb 12 22:25:22.393547 systemd[1]: sshd@24-172.31.25.241:22-139.178.89.65:37262.service: Deactivated successfully. Feb 12 22:25:22.394597 systemd[1]: session-25.scope: Deactivated successfully. Feb 12 22:25:22.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.25.241:22-139.178.89.65:37262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:22.397122 kernel: audit: type=1104 audit(1707776722.381:1609): pid=5819 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:22.396610 systemd-logind[1548]: Removed session 25. Feb 12 22:25:27.407700 systemd[1]: Started sshd@25-172.31.25.241:22-139.178.89.65:37266.service. Feb 12 22:25:27.416016 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:25:27.416196 kernel: audit: type=1130 audit(1707776727.409:1611): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.25.241:22-139.178.89.65:37266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:27.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.25.241:22-139.178.89.65:37266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:27.598000 audit[5832]: USER_ACCT pid=5832 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:27.600297 sshd[5832]: Accepted publickey for core from 139.178.89.65 port 37266 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:25:27.605883 kernel: audit: type=1101 audit(1707776727.598:1612): pid=5832 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:27.605000 audit[5832]: CRED_ACQ pid=5832 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:27.615228 sshd[5832]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:25:27.625357 kernel: audit: type=1103 audit(1707776727.605:1613): pid=5832 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:27.625475 kernel: audit: type=1006 audit(1707776727.605:1614): pid=5832 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 12 22:25:27.625511 kernel: audit: type=1300 audit(1707776727.605:1614): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2c111d40 a2=3 a3=0 items=0 ppid=1 pid=5832 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:27.605000 audit[5832]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2c111d40 a2=3 a3=0 items=0 ppid=1 pid=5832 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:27.605000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:25:27.642644 kernel: audit: type=1327 audit(1707776727.605:1614): proctitle=737368643A20636F7265205B707269765D Feb 12 22:25:27.642044 systemd[1]: Started session-26.scope. Feb 12 22:25:27.643035 systemd-logind[1548]: New session 26 of user core. Feb 12 22:25:27.654000 audit[5832]: USER_START pid=5832 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:27.666274 kernel: audit: type=1105 audit(1707776727.654:1615): pid=5832 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:27.666427 kernel: audit: type=1103 audit(1707776727.664:1616): pid=5835 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:27.664000 audit[5835]: CRED_ACQ pid=5835 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:27.982360 sshd[5832]: pam_unix(sshd:session): session closed for user core Feb 12 22:25:27.985000 audit[5832]: USER_END pid=5832 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:27.992502 systemd[1]: sshd@25-172.31.25.241:22-139.178.89.65:37266.service: Deactivated successfully. Feb 12 22:25:27.993753 systemd[1]: session-26.scope: Deactivated successfully. Feb 12 22:25:27.994944 kernel: audit: type=1106 audit(1707776727.985:1617): pid=5832 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:27.985000 audit[5832]: CRED_DISP pid=5832 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:27.996581 systemd-logind[1548]: Session 26 logged out. Waiting for processes to exit. Feb 12 22:25:27.998129 systemd-logind[1548]: Removed session 26. Feb 12 22:25:28.004890 kernel: audit: type=1104 audit(1707776727.985:1618): pid=5832 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:27.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.25.241:22-139.178.89.65:37266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:30.257740 systemd[1]: run-containerd-runc-k8s.io-047efa854be8e4d435a6dd5d364ade90b83cf012ead4c8a5edf356107ee0735f-runc.9PY44F.mount: Deactivated successfully. Feb 12 22:25:30.412000 audit[5891]: NETFILTER_CFG table=filter:142 family=2 entries=7 op=nft_register_rule pid=5891 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:30.412000 audit[5891]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff21466560 a2=0 a3=7fff2146654c items=0 ppid=2972 pid=5891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:30.412000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:30.417000 audit[5891]: NETFILTER_CFG table=nat:143 family=2 entries=209 op=nft_register_chain pid=5891 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 22:25:30.417000 audit[5891]: SYSCALL arch=c000003e syscall=46 success=yes exit=72324 a0=3 a1=7fff21466560 a2=0 a3=7fff2146654c items=0 ppid=2972 pid=5891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:30.417000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 22:25:33.009230 systemd[1]: Started sshd@26-172.31.25.241:22-139.178.89.65:51394.service. Feb 12 22:25:33.017701 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 12 22:25:33.017841 kernel: audit: type=1130 audit(1707776733.009:1622): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.25.241:22-139.178.89.65:51394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:33.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.25.241:22-139.178.89.65:51394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:33.220000 audit[5903]: USER_ACCT pid=5903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:33.222000 audit[5903]: CRED_ACQ pid=5903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:33.229712 sshd[5903]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:25:33.231531 sshd[5903]: Accepted publickey for core from 139.178.89.65 port 51394 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:25:33.234169 kernel: audit: type=1101 audit(1707776733.220:1623): pid=5903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:33.235756 kernel: audit: type=1103 audit(1707776733.222:1624): pid=5903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:33.235812 kernel: audit: type=1006 audit(1707776733.222:1625): pid=5903 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 12 22:25:33.249295 kernel: audit: type=1300 audit(1707776733.222:1625): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe25b8e800 a2=3 a3=0 items=0 ppid=1 pid=5903 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:33.222000 audit[5903]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe25b8e800 a2=3 a3=0 items=0 ppid=1 pid=5903 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:33.254433 kernel: audit: type=1327 audit(1707776733.222:1625): proctitle=737368643A20636F7265205B707269765D Feb 12 22:25:33.222000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:25:33.248438 systemd-logind[1548]: New session 27 of user core. Feb 12 22:25:33.249250 systemd[1]: Started session-27.scope. Feb 12 22:25:33.259000 audit[5903]: USER_START pid=5903 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:33.264000 audit[5905]: CRED_ACQ pid=5905 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:33.275669 kernel: audit: type=1105 audit(1707776733.259:1626): pid=5903 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:33.275827 kernel: audit: type=1103 audit(1707776733.264:1627): pid=5905 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:33.526352 sshd[5903]: pam_unix(sshd:session): session closed for user core Feb 12 22:25:33.527000 audit[5903]: USER_END pid=5903 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:33.530833 systemd[1]: sshd@26-172.31.25.241:22-139.178.89.65:51394.service: Deactivated successfully. Feb 12 22:25:33.531912 systemd[1]: session-27.scope: Deactivated successfully. Feb 12 22:25:33.534706 systemd-logind[1548]: Session 27 logged out. Waiting for processes to exit. Feb 12 22:25:33.527000 audit[5903]: CRED_DISP pid=5903 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:33.536202 systemd-logind[1548]: Removed session 27. Feb 12 22:25:33.544426 kernel: audit: type=1106 audit(1707776733.527:1628): pid=5903 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:33.544555 kernel: audit: type=1104 audit(1707776733.527:1629): pid=5903 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:33.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.25.241:22-139.178.89.65:51394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:38.554729 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:25:38.554971 kernel: audit: type=1130 audit(1707776738.551:1631): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.25.241:22-139.178.89.65:44014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:38.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.25.241:22-139.178.89.65:44014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:38.552302 systemd[1]: Started sshd@27-172.31.25.241:22-139.178.89.65:44014.service. Feb 12 22:25:38.719000 audit[5919]: USER_ACCT pid=5919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:38.720453 sshd[5919]: Accepted publickey for core from 139.178.89.65 port 44014 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:25:38.725000 audit[5919]: CRED_ACQ pid=5919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:38.727446 sshd[5919]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:25:38.732521 kernel: audit: type=1101 audit(1707776738.719:1632): pid=5919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:38.732638 kernel: audit: type=1103 audit(1707776738.725:1633): pid=5919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:38.737278 systemd[1]: Started session-28.scope. Feb 12 22:25:38.737929 kernel: audit: type=1006 audit(1707776738.725:1634): pid=5919 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 12 22:25:38.725000 audit[5919]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3b4367d0 a2=3 a3=0 items=0 ppid=1 pid=5919 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:38.740587 systemd-logind[1548]: New session 28 of user core. Feb 12 22:25:38.725000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:25:38.748139 kernel: audit: type=1300 audit(1707776738.725:1634): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3b4367d0 a2=3 a3=0 items=0 ppid=1 pid=5919 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:38.749041 kernel: audit: type=1327 audit(1707776738.725:1634): proctitle=737368643A20636F7265205B707269765D Feb 12 22:25:38.749123 kernel: audit: type=1105 audit(1707776738.744:1635): pid=5919 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:38.744000 audit[5919]: USER_START pid=5919 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:38.757000 audit[5922]: CRED_ACQ pid=5922 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:38.773032 kernel: audit: type=1103 audit(1707776738.757:1636): pid=5922 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:38.946572 sshd[5919]: pam_unix(sshd:session): session closed for user core Feb 12 22:25:38.947000 audit[5919]: USER_END pid=5919 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:38.947000 audit[5919]: CRED_DISP pid=5919 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:38.957453 systemd[1]: sshd@27-172.31.25.241:22-139.178.89.65:44014.service: Deactivated successfully. Feb 12 22:25:38.958507 systemd[1]: session-28.scope: Deactivated successfully. Feb 12 22:25:38.960276 systemd-logind[1548]: Session 28 logged out. Waiting for processes to exit. Feb 12 22:25:38.961303 kernel: audit: type=1106 audit(1707776738.947:1637): pid=5919 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:38.961373 kernel: audit: type=1104 audit(1707776738.947:1638): pid=5919 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:38.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.25.241:22-139.178.89.65:44014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:38.961690 systemd-logind[1548]: Removed session 28. Feb 12 22:25:43.976317 systemd[1]: Started sshd@28-172.31.25.241:22-139.178.89.65:44028.service. Feb 12 22:25:43.985314 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:25:43.985408 kernel: audit: type=1130 audit(1707776743.977:1640): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.25.241:22-139.178.89.65:44028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:43.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.25.241:22-139.178.89.65:44028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:44.142000 audit[5936]: USER_ACCT pid=5936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:44.150141 sshd[5936]: Accepted publickey for core from 139.178.89.65 port 44028 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:25:44.156796 kernel: audit: type=1101 audit(1707776744.142:1641): pid=5936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:44.157102 kernel: audit: type=1103 audit(1707776744.149:1642): pid=5936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:44.149000 audit[5936]: CRED_ACQ pid=5936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:44.151207 sshd[5936]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:25:44.149000 audit[5936]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfee997d0 a2=3 a3=0 items=0 ppid=1 pid=5936 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:44.165000 systemd[1]: Started session-29.scope. Feb 12 22:25:44.168428 kernel: audit: type=1006 audit(1707776744.149:1643): pid=5936 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Feb 12 22:25:44.168510 kernel: audit: type=1300 audit(1707776744.149:1643): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfee997d0 a2=3 a3=0 items=0 ppid=1 pid=5936 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:44.168545 kernel: audit: type=1327 audit(1707776744.149:1643): proctitle=737368643A20636F7265205B707269765D Feb 12 22:25:44.149000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:25:44.167403 systemd-logind[1548]: New session 29 of user core. Feb 12 22:25:44.174000 audit[5936]: USER_START pid=5936 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:44.190892 kernel: audit: type=1105 audit(1707776744.174:1644): pid=5936 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:44.191029 kernel: audit: type=1103 audit(1707776744.182:1645): pid=5938 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:44.182000 audit[5938]: CRED_ACQ pid=5938 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:44.404432 sshd[5936]: pam_unix(sshd:session): session closed for user core Feb 12 22:25:44.405000 audit[5936]: USER_END pid=5936 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:44.408157 systemd[1]: sshd@28-172.31.25.241:22-139.178.89.65:44028.service: Deactivated successfully. Feb 12 22:25:44.409165 systemd[1]: session-29.scope: Deactivated successfully. Feb 12 22:25:44.411341 systemd-logind[1548]: Session 29 logged out. Waiting for processes to exit. Feb 12 22:25:44.413089 systemd-logind[1548]: Removed session 29. Feb 12 22:25:44.405000 audit[5936]: CRED_DISP pid=5936 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:44.418896 kernel: audit: type=1106 audit(1707776744.405:1646): pid=5936 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:44.418995 kernel: audit: type=1104 audit(1707776744.405:1647): pid=5936 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:44.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.25.241:22-139.178.89.65:44028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:45.282765 systemd[1]: run-containerd-runc-k8s.io-ec8ddc908cbc0a0d5a988d9c572ae3f5a079090f14b1b75a7a0d5ae410a92e8e-runc.dpT1wt.mount: Deactivated successfully. Feb 12 22:25:46.321823 systemd[1]: run-containerd-runc-k8s.io-03ac01119681ae19a795789a942a28e6c47451eee84058645d363badbbac7e01-runc.KkpYUx.mount: Deactivated successfully. Feb 12 22:25:49.284656 systemd[1]: run-containerd-runc-k8s.io-03ac01119681ae19a795789a942a28e6c47451eee84058645d363badbbac7e01-runc.lI5pZh.mount: Deactivated successfully. Feb 12 22:25:49.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-172.31.25.241:22-139.178.89.65:37906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:49.429662 systemd[1]: Started sshd@29-172.31.25.241:22-139.178.89.65:37906.service. Feb 12 22:25:49.431511 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:25:49.431584 kernel: audit: type=1130 audit(1707776749.429:1649): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-172.31.25.241:22-139.178.89.65:37906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:25:49.612000 audit[6014]: USER_ACCT pid=6014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:49.615187 sshd[6014]: Accepted publickey for core from 139.178.89.65 port 37906 ssh2: RSA SHA256:H7DTBBMS/ktZfFhBYYqyzFemIgdUvSKXx5shT4O5I5k Feb 12 22:25:49.619881 kernel: audit: type=1101 audit(1707776749.612:1650): pid=6014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:49.619000 audit[6014]: CRED_ACQ pid=6014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:49.620782 sshd[6014]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 22:25:49.631123 systemd[1]: Started session-30.scope. Feb 12 22:25:49.632927 kernel: audit: type=1103 audit(1707776749.619:1651): pid=6014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:49.633033 kernel: audit: type=1006 audit(1707776749.619:1652): pid=6014 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 Feb 12 22:25:49.633079 kernel: audit: type=1300 audit(1707776749.619:1652): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1f840f00 a2=3 a3=0 items=0 ppid=1 pid=6014 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:49.619000 audit[6014]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1f840f00 a2=3 a3=0 items=0 ppid=1 pid=6014 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:25:49.633329 systemd-logind[1548]: New session 30 of user core. Feb 12 22:25:49.619000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 22:25:49.640958 kernel: audit: type=1327 audit(1707776749.619:1652): proctitle=737368643A20636F7265205B707269765D Feb 12 22:25:49.641000 audit[6014]: USER_START pid=6014 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:49.641000 audit[6016]: CRED_ACQ pid=6016 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:49.654070 kernel: audit: type=1105 audit(1707776749.641:1653): pid=6014 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:49.654153 kernel: audit: type=1103 audit(1707776749.641:1654): pid=6016 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:49.854834 sshd[6014]: pam_unix(sshd:session): session closed for user core Feb 12 22:25:49.855000 audit[6014]: USER_END pid=6014 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:49.859454 systemd-logind[1548]: Session 30 logged out. Waiting for processes to exit. Feb 12 22:25:49.861637 systemd[1]: sshd@29-172.31.25.241:22-139.178.89.65:37906.service: Deactivated successfully. Feb 12 22:25:49.856000 audit[6014]: CRED_DISP pid=6014 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:49.862596 systemd[1]: session-30.scope: Deactivated successfully. Feb 12 22:25:49.864911 systemd-logind[1548]: Removed session 30. Feb 12 22:25:49.869212 kernel: audit: type=1106 audit(1707776749.855:1655): pid=6014 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:49.869305 kernel: audit: type=1104 audit(1707776749.856:1656): pid=6014 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 12 22:25:49.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-172.31.25.241:22-139.178.89.65:37906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 22:26:00.149000 audit[2687]: AVC avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:00.152412 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 22:26:00.152506 kernel: audit: type=1400 audit(1707776760.149:1658): avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:00.149000 audit[2687]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0026bb380 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:26:00.166712 kernel: audit: type=1300 audit(1707776760.149:1658): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0026bb380 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:26:00.166854 kernel: audit: type=1327 audit(1707776760.149:1658): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:26:00.149000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:26:00.155000 audit[2687]: AVC avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:00.178784 kernel: audit: type=1400 audit(1707776760.155:1659): avc: denied { watch } for pid=2687 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:00.178948 kernel: audit: type=1300 audit(1707776760.155:1659): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00283c400 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:26:00.155000 audit[2687]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00283c400 a2=fc6 a3=0 items=0 ppid=2510 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:26:00.155000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:26:00.197633 kernel: audit: type=1327 audit(1707776760.155:1659): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:26:01.008000 audit[2680]: AVC avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:01.008000 audit[2680]: AVC avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521276 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:01.022025 kernel: audit: type=1400 audit(1707776761.008:1660): avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:01.022186 kernel: audit: type=1400 audit(1707776761.008:1661): avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521276 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:01.022220 kernel: audit: type=1300 audit(1707776761.008:1661): arch=c000003e syscall=254 success=no exit=-13 a0=37 a1=c0078afc80 a2=fc6 a3=0 items=0 ppid=2506 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 key=(null) Feb 12 22:26:01.008000 audit[2680]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=37 a1=c0078afc80 a2=fc6 a3=0 items=0 ppid=2506 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 key=(null) Feb 12 22:26:01.008000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E323431002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 12 22:26:01.036996 kernel: audit: type=1327 audit(1707776761.008:1661): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E323431002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 12 22:26:01.008000 audit[2680]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=38 a1=c011ce8380 a2=fc6 a3=0 items=0 ppid=2506 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 key=(null) Feb 12 22:26:01.008000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E323431002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 12 22:26:01.008000 audit[2680]: AVC avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:01.008000 audit[2680]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=38 a1=c0078afcb0 a2=fc6 a3=0 items=0 ppid=2506 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 key=(null) Feb 12 22:26:01.008000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E323431002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 12 22:26:01.008000 audit[2680]: AVC avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521282 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:01.008000 audit[2680]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=38 a1=c0078afd10 a2=fc6 a3=0 items=0 ppid=2506 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 key=(null) Feb 12 22:26:01.008000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E323431002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 12 22:26:01.047000 audit[2680]: AVC avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:01.047000 audit[2680]: AVC avc: denied { watch } for pid=2680 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:01.047000 audit[2680]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=38 a1=c011ce8480 a2=fc6 a3=0 items=0 ppid=2506 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 key=(null) Feb 12 22:26:01.047000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E323431002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 12 22:26:01.047000 audit[2680]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=37 a1=c0078afe30 a2=fc6 a3=0 items=0 ppid=2506 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c328,c841 key=(null) Feb 12 22:26:01.047000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32352E323431002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 12 22:26:04.685652 systemd[1]: cri-containerd-6c3e9340cc83c5b8c64a7428e43d9ee81db959abef01680e5a127e8028b4c33c.scope: Deactivated successfully. Feb 12 22:26:04.685964 systemd[1]: cri-containerd-6c3e9340cc83c5b8c64a7428e43d9ee81db959abef01680e5a127e8028b4c33c.scope: Consumed 4.001s CPU time. Feb 12 22:26:04.690000 audit: BPF prog-id=93 op=UNLOAD Feb 12 22:26:04.690000 audit: BPF prog-id=113 op=UNLOAD Feb 12 22:26:04.725897 env[1557]: time="2024-02-12T22:26:04.723622229Z" level=info msg="shim disconnected" id=6c3e9340cc83c5b8c64a7428e43d9ee81db959abef01680e5a127e8028b4c33c Feb 12 22:26:04.725897 env[1557]: time="2024-02-12T22:26:04.723675471Z" level=warning msg="cleaning up after shim disconnected" id=6c3e9340cc83c5b8c64a7428e43d9ee81db959abef01680e5a127e8028b4c33c namespace=k8s.io Feb 12 22:26:04.725897 env[1557]: time="2024-02-12T22:26:04.723689739Z" level=info msg="cleaning up dead shim" Feb 12 22:26:04.725937 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6c3e9340cc83c5b8c64a7428e43d9ee81db959abef01680e5a127e8028b4c33c-rootfs.mount: Deactivated successfully. Feb 12 22:26:04.736085 systemd[1]: cri-containerd-57e1171bc95941a6d3e1f22f69cf8967f780b09657000e86605a6addb364fd47.scope: Deactivated successfully. Feb 12 22:26:04.735000 audit: BPF prog-id=126 op=UNLOAD Feb 12 22:26:04.736424 systemd[1]: cri-containerd-57e1171bc95941a6d3e1f22f69cf8967f780b09657000e86605a6addb364fd47.scope: Consumed 6.409s CPU time. Feb 12 22:26:04.737000 audit: BPF prog-id=129 op=UNLOAD Feb 12 22:26:04.742585 env[1557]: time="2024-02-12T22:26:04.742548531Z" level=warning msg="cleanup warnings time=\"2024-02-12T22:26:04Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6058 runtime=io.containerd.runc.v2\n" Feb 12 22:26:04.769267 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-57e1171bc95941a6d3e1f22f69cf8967f780b09657000e86605a6addb364fd47-rootfs.mount: Deactivated successfully. Feb 12 22:26:04.770914 env[1557]: time="2024-02-12T22:26:04.770815256Z" level=info msg="shim disconnected" id=57e1171bc95941a6d3e1f22f69cf8967f780b09657000e86605a6addb364fd47 Feb 12 22:26:04.770914 env[1557]: time="2024-02-12T22:26:04.770888080Z" level=warning msg="cleaning up after shim disconnected" id=57e1171bc95941a6d3e1f22f69cf8967f780b09657000e86605a6addb364fd47 namespace=k8s.io Feb 12 22:26:04.770914 env[1557]: time="2024-02-12T22:26:04.770902350Z" level=info msg="cleaning up dead shim" Feb 12 22:26:04.782463 env[1557]: time="2024-02-12T22:26:04.782418585Z" level=warning msg="cleanup warnings time=\"2024-02-12T22:26:04Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6083 runtime=io.containerd.runc.v2\n" Feb 12 22:26:05.605525 kubelet[2807]: I0212 22:26:05.605487 2807 scope.go:115] "RemoveContainer" containerID="57e1171bc95941a6d3e1f22f69cf8967f780b09657000e86605a6addb364fd47" Feb 12 22:26:05.607837 kubelet[2807]: I0212 22:26:05.607814 2807 scope.go:115] "RemoveContainer" containerID="6c3e9340cc83c5b8c64a7428e43d9ee81db959abef01680e5a127e8028b4c33c" Feb 12 22:26:05.612161 env[1557]: time="2024-02-12T22:26:05.611988511Z" level=info msg="CreateContainer within sandbox \"e36653d8c5d552a24f1d608f0c55b698fdd3f07242642365c4d5ed8aa04ba629\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Feb 12 22:26:05.612610 env[1557]: time="2024-02-12T22:26:05.612543621Z" level=info msg="CreateContainer within sandbox \"1c3ac6932c45e8989f0ee99c5347936437d7673412340046b357759ae3db39bb\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Feb 12 22:26:05.642712 env[1557]: time="2024-02-12T22:26:05.642666650Z" level=info msg="CreateContainer within sandbox \"e36653d8c5d552a24f1d608f0c55b698fdd3f07242642365c4d5ed8aa04ba629\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"9e4a3d117982deec9ace9c431b2f0f3069cb31f5c71902570933f951a341a7fa\"" Feb 12 22:26:05.643448 env[1557]: time="2024-02-12T22:26:05.643388620Z" level=info msg="StartContainer for \"9e4a3d117982deec9ace9c431b2f0f3069cb31f5c71902570933f951a341a7fa\"" Feb 12 22:26:05.647514 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1400098747.mount: Deactivated successfully. Feb 12 22:26:05.649379 kubelet[2807]: I0212 22:26:05.649231 2807 scope.go:115] "RemoveContainer" containerID="57e1171bc95941a6d3e1f22f69cf8967f780b09657000e86605a6addb364fd47" Feb 12 22:26:05.656738 env[1557]: time="2024-02-12T22:26:05.656683379Z" level=info msg="CreateContainer within sandbox \"1c3ac6932c45e8989f0ee99c5347936437d7673412340046b357759ae3db39bb\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"9493d0e6388483370f50c26ce151877f6b5c7d246fc8ae7447619e02c18aea76\"" Feb 12 22:26:05.657751 env[1557]: time="2024-02-12T22:26:05.657622807Z" level=info msg="StartContainer for \"9493d0e6388483370f50c26ce151877f6b5c7d246fc8ae7447619e02c18aea76\"" Feb 12 22:26:05.659363 env[1557]: time="2024-02-12T22:26:05.659317432Z" level=info msg="RemoveContainer for \"57e1171bc95941a6d3e1f22f69cf8967f780b09657000e86605a6addb364fd47\"" Feb 12 22:26:05.668931 env[1557]: time="2024-02-12T22:26:05.668884373Z" level=info msg="RemoveContainer for \"57e1171bc95941a6d3e1f22f69cf8967f780b09657000e86605a6addb364fd47\" returns successfully" Feb 12 22:26:05.671093 systemd[1]: Started cri-containerd-9e4a3d117982deec9ace9c431b2f0f3069cb31f5c71902570933f951a341a7fa.scope. Feb 12 22:26:05.709473 kernel: kauditd_printk_skb: 18 callbacks suppressed Feb 12 22:26:05.709605 kernel: audit: type=1400 audit(1707776765.698:1670): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.709651 kernel: audit: type=1400 audit(1707776765.698:1671): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.715623 kernel: audit: type=1400 audit(1707776765.698:1672): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.711273 systemd[1]: Started cri-containerd-9493d0e6388483370f50c26ce151877f6b5c7d246fc8ae7447619e02c18aea76.scope. Feb 12 22:26:05.727533 kernel: audit: type=1400 audit(1707776765.698:1673): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.735037 kernel: audit: type=1400 audit(1707776765.698:1674): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.743909 kernel: audit: type=1400 audit(1707776765.698:1675): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.748933 kernel: audit: type=1400 audit(1707776765.698:1676): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.759993 kernel: audit: type=1400 audit(1707776765.698:1677): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.760117 kernel: audit: type=1400 audit(1707776765.698:1678): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.704000 audit: BPF prog-id=197 op=LOAD Feb 12 22:26:05.704000 audit[6109]: AVC avc: denied { bpf } for pid=6109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.766914 kernel: audit: type=1400 audit(1707776765.704:1679): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.704000 audit[6109]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2993 pid=6109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:26:05.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965346133643131373938326465656339616365396334333162326630 Feb 12 22:26:05.704000 audit[6109]: AVC avc: denied { perfmon } for pid=6109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.704000 audit[6109]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2993 pid=6109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:26:05.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965346133643131373938326465656339616365396334333162326630 Feb 12 22:26:05.715000 audit[6109]: AVC avc: denied { bpf } for pid=6109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.715000 audit[6109]: AVC avc: denied { bpf } for pid=6109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.715000 audit[6109]: AVC avc: denied { bpf } for pid=6109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.715000 audit[6109]: AVC avc: denied { perfmon } for pid=6109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.715000 audit[6109]: AVC avc: denied { perfmon } for pid=6109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.715000 audit[6109]: AVC avc: denied { perfmon } for pid=6109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.715000 audit[6109]: AVC avc: denied { perfmon } for pid=6109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.715000 audit[6109]: AVC avc: denied { perfmon } for pid=6109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.715000 audit[6109]: AVC avc: denied { bpf } for pid=6109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.715000 audit[6109]: AVC avc: denied { bpf } for pid=6109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.715000 audit: BPF prog-id=198 op=LOAD Feb 12 22:26:05.715000 audit[6109]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000312540 items=0 ppid=2993 pid=6109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:26:05.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965346133643131373938326465656339616365396334333162326630 Feb 12 22:26:05.743000 audit[6109]: AVC avc: denied { bpf } for pid=6109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.743000 audit[6109]: AVC avc: denied { bpf } for pid=6109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.743000 audit[6109]: AVC avc: denied { perfmon } for pid=6109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.743000 audit[6109]: AVC avc: denied { perfmon } for pid=6109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.743000 audit[6109]: AVC avc: denied { perfmon } for pid=6109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.743000 audit[6109]: AVC avc: denied { perfmon } for pid=6109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.743000 audit[6109]: AVC avc: denied { perfmon } for pid=6109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.743000 audit[6109]: AVC avc: denied { bpf } for pid=6109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.743000 audit[6109]: AVC avc: denied { bpf } for pid=6109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.743000 audit: BPF prog-id=199 op=LOAD Feb 12 22:26:05.743000 audit[6109]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000312588 items=0 ppid=2993 pid=6109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:26:05.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965346133643131373938326465656339616365396334333162326630 Feb 12 22:26:05.743000 audit: BPF prog-id=199 op=UNLOAD Feb 12 22:26:05.743000 audit: BPF prog-id=198 op=UNLOAD Feb 12 22:26:05.743000 audit[6109]: AVC avc: denied { bpf } for pid=6109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.743000 audit[6109]: AVC avc: denied { bpf } for pid=6109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.743000 audit[6109]: AVC avc: denied { bpf } for pid=6109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.743000 audit[6109]: AVC avc: denied { perfmon } for pid=6109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.743000 audit[6109]: AVC avc: denied { perfmon } for pid=6109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.743000 audit[6109]: AVC avc: denied { perfmon } for pid=6109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.743000 audit[6109]: AVC avc: denied { perfmon } for pid=6109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.743000 audit[6109]: AVC avc: denied { perfmon } for pid=6109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.743000 audit[6109]: AVC avc: denied { bpf } for pid=6109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.743000 audit[6109]: AVC avc: denied { bpf } for pid=6109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.743000 audit: BPF prog-id=200 op=LOAD Feb 12 22:26:05.743000 audit[6109]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000312998 items=0 ppid=2993 pid=6109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:26:05.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965346133643131373938326465656339616365396334333162326630 Feb 12 22:26:05.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.765000 audit: BPF prog-id=201 op=LOAD Feb 12 22:26:05.765000 audit[6125]: AVC avc: denied { bpf } for pid=6125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.765000 audit[6125]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2510 pid=6125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:26:05.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934393364306536333838343833333730663530633236636531353138 Feb 12 22:26:05.765000 audit[6125]: AVC avc: denied { perfmon } for pid=6125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.765000 audit[6125]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2510 pid=6125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:26:05.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934393364306536333838343833333730663530633236636531353138 Feb 12 22:26:05.766000 audit[6125]: AVC avc: denied { bpf } for pid=6125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.766000 audit[6125]: AVC avc: denied { bpf } for pid=6125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.766000 audit[6125]: AVC avc: denied { bpf } for pid=6125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.766000 audit[6125]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000309480 items=0 ppid=2510 pid=6125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:26:05.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934393364306536333838343833333730663530633236636531353138 Feb 12 22:26:05.766000 audit[6125]: AVC avc: denied { bpf } for pid=6125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.766000 audit[6125]: AVC avc: denied { bpf } for pid=6125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.766000 audit[6125]: AVC avc: denied { perfmon } for pid=6125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.766000 audit[6125]: AVC avc: denied { perfmon } for pid=6125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.766000 audit[6125]: AVC avc: denied { perfmon } for pid=6125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.766000 audit[6125]: AVC avc: denied { perfmon } for pid=6125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.766000 audit[6125]: AVC avc: denied { perfmon } for pid=6125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.766000 audit[6125]: AVC avc: denied { bpf } for pid=6125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.766000 audit[6125]: AVC avc: denied { bpf } for pid=6125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.766000 audit: BPF prog-id=203 op=LOAD Feb 12 22:26:05.766000 audit[6125]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003094c8 items=0 ppid=2510 pid=6125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:26:05.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934393364306536333838343833333730663530633236636531353138 Feb 12 22:26:05.770000 audit: BPF prog-id=203 op=UNLOAD Feb 12 22:26:05.770000 audit: BPF prog-id=202 op=UNLOAD Feb 12 22:26:05.772000 audit[6125]: AVC avc: denied { bpf } for pid=6125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.772000 audit[6125]: AVC avc: denied { bpf } for pid=6125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.772000 audit[6125]: AVC avc: denied { bpf } for pid=6125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.772000 audit[6125]: AVC avc: denied { perfmon } for pid=6125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.772000 audit[6125]: AVC avc: denied { perfmon } for pid=6125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.772000 audit[6125]: AVC avc: denied { perfmon } for pid=6125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.772000 audit[6125]: AVC avc: denied { perfmon } for pid=6125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.772000 audit[6125]: AVC avc: denied { perfmon } for pid=6125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.772000 audit[6125]: AVC avc: denied { bpf } for pid=6125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.772000 audit[6125]: AVC avc: denied { bpf } for pid=6125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:05.772000 audit: BPF prog-id=204 op=LOAD Feb 12 22:26:05.772000 audit[6125]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003098d8 items=0 ppid=2510 pid=6125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:26:05.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934393364306536333838343833333730663530633236636531353138 Feb 12 22:26:05.792795 env[1557]: time="2024-02-12T22:26:05.792725734Z" level=info msg="StartContainer for \"9e4a3d117982deec9ace9c431b2f0f3069cb31f5c71902570933f951a341a7fa\" returns successfully" Feb 12 22:26:05.816387 env[1557]: time="2024-02-12T22:26:05.816341723Z" level=info msg="StartContainer for \"9493d0e6388483370f50c26ce151877f6b5c7d246fc8ae7447619e02c18aea76\" returns successfully" Feb 12 22:26:07.319000 audit[6143]: AVC avc: denied { watch } for pid=6143 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:07.319000 audit[6143]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000320a50 a2=fc6 a3=0 items=0 ppid=2510 pid=6143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:26:07.319000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:26:07.320000 audit[6143]: AVC avc: denied { watch } for pid=6143 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 22:26:07.320000 audit[6143]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001158040 a2=fc6 a3=0 items=0 ppid=2510 pid=6143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c180 key=(null) Feb 12 22:26:07.320000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 22:26:08.301000 audit[5602]: AVC avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_22_25_00.1586650647/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c41,c769 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c41,c769 tclass=file permissive=0 Feb 12 22:26:08.301000 audit[5602]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001736e60 a2=fc6 a3=0 items=0 ppid=5481 pid=5602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c41,c769 key=(null) Feb 12 22:26:08.301000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 22:26:08.485311 kubelet[2807]: E0212 22:26:08.484552 2807 controller.go:189] failed to update lease, error: Put "https://172.31.25.241:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-241?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 12 22:26:09.350925 systemd[1]: cri-containerd-bbb53d2800a5daf81febcbd9851cf68bfc59e29c4b2847abe2835e7f1cbe53fc.scope: Deactivated successfully. Feb 12 22:26:09.351243 systemd[1]: cri-containerd-bbb53d2800a5daf81febcbd9851cf68bfc59e29c4b2847abe2835e7f1cbe53fc.scope: Consumed 1.870s CPU time. Feb 12 22:26:09.354000 audit: BPF prog-id=85 op=UNLOAD Feb 12 22:26:09.354000 audit: BPF prog-id=104 op=UNLOAD Feb 12 22:26:09.380993 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-bbb53d2800a5daf81febcbd9851cf68bfc59e29c4b2847abe2835e7f1cbe53fc-rootfs.mount: Deactivated successfully. Feb 12 22:26:09.382716 env[1557]: time="2024-02-12T22:26:09.382669387Z" level=info msg="shim disconnected" id=bbb53d2800a5daf81febcbd9851cf68bfc59e29c4b2847abe2835e7f1cbe53fc Feb 12 22:26:09.383241 env[1557]: time="2024-02-12T22:26:09.382723105Z" level=warning msg="cleaning up after shim disconnected" id=bbb53d2800a5daf81febcbd9851cf68bfc59e29c4b2847abe2835e7f1cbe53fc namespace=k8s.io Feb 12 22:26:09.383241 env[1557]: time="2024-02-12T22:26:09.382735960Z" level=info msg="cleaning up dead shim" Feb 12 22:26:09.396516 env[1557]: time="2024-02-12T22:26:09.396463307Z" level=warning msg="cleanup warnings time=\"2024-02-12T22:26:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6186 runtime=io.containerd.runc.v2\n" Feb 12 22:26:09.621961 kubelet[2807]: I0212 22:26:09.619546 2807 scope.go:115] "RemoveContainer" containerID="bbb53d2800a5daf81febcbd9851cf68bfc59e29c4b2847abe2835e7f1cbe53fc" Feb 12 22:26:09.624437 env[1557]: time="2024-02-12T22:26:09.624398402Z" level=info msg="CreateContainer within sandbox \"4015aac93bf19a971dabbf8fd4ffcf268f41f8e699a5f7c0a891d885536c543d\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Feb 12 22:26:09.647268 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2773934800.mount: Deactivated successfully. Feb 12 22:26:09.659482 env[1557]: time="2024-02-12T22:26:09.659422975Z" level=info msg="CreateContainer within sandbox \"4015aac93bf19a971dabbf8fd4ffcf268f41f8e699a5f7c0a891d885536c543d\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"034ce4cc868fb0d7afa493b55376c1419bc2c3b8579fba081a3f8bbfd494d283\"" Feb 12 22:26:09.659992 env[1557]: time="2024-02-12T22:26:09.659956972Z" level=info msg="StartContainer for \"034ce4cc868fb0d7afa493b55376c1419bc2c3b8579fba081a3f8bbfd494d283\"" Feb 12 22:26:09.683581 systemd[1]: Started cri-containerd-034ce4cc868fb0d7afa493b55376c1419bc2c3b8579fba081a3f8bbfd494d283.scope. Feb 12 22:26:09.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.705000 audit: BPF prog-id=205 op=LOAD Feb 12 22:26:09.706000 audit[6205]: AVC avc: denied { bpf } for pid=6205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.706000 audit[6205]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2539 pid=6205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:26:09.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033346365346363383638666230643761666134393362353533373663 Feb 12 22:26:09.706000 audit[6205]: AVC avc: denied { perfmon } for pid=6205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.706000 audit[6205]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2539 pid=6205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:26:09.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033346365346363383638666230643761666134393362353533373663 Feb 12 22:26:09.706000 audit[6205]: AVC avc: denied { bpf } for pid=6205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.706000 audit[6205]: AVC avc: denied { bpf } for pid=6205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.706000 audit[6205]: AVC avc: denied { bpf } for pid=6205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.706000 audit[6205]: AVC avc: denied { perfmon } for pid=6205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.706000 audit[6205]: AVC avc: denied { perfmon } for pid=6205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.706000 audit[6205]: AVC avc: denied { perfmon } for pid=6205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.706000 audit[6205]: AVC avc: denied { perfmon } for pid=6205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.706000 audit[6205]: AVC avc: denied { perfmon } for pid=6205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.706000 audit[6205]: AVC avc: denied { bpf } for pid=6205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.706000 audit[6205]: AVC avc: denied { bpf } for pid=6205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.706000 audit: BPF prog-id=206 op=LOAD Feb 12 22:26:09.706000 audit[6205]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c4730 items=0 ppid=2539 pid=6205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:26:09.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033346365346363383638666230643761666134393362353533373663 Feb 12 22:26:09.707000 audit[6205]: AVC avc: denied { bpf } for pid=6205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.707000 audit[6205]: AVC avc: denied { bpf } for pid=6205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.707000 audit[6205]: AVC avc: denied { perfmon } for pid=6205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.707000 audit[6205]: AVC avc: denied { perfmon } for pid=6205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.707000 audit[6205]: AVC avc: denied { perfmon } for pid=6205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.707000 audit[6205]: AVC avc: denied { perfmon } for pid=6205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.707000 audit[6205]: AVC avc: denied { perfmon } for pid=6205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.707000 audit[6205]: AVC avc: denied { bpf } for pid=6205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.707000 audit[6205]: AVC avc: denied { bpf } for pid=6205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.707000 audit: BPF prog-id=207 op=LOAD Feb 12 22:26:09.707000 audit[6205]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c4778 items=0 ppid=2539 pid=6205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:26:09.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033346365346363383638666230643761666134393362353533373663 Feb 12 22:26:09.708000 audit: BPF prog-id=207 op=UNLOAD Feb 12 22:26:09.708000 audit: BPF prog-id=206 op=UNLOAD Feb 12 22:26:09.708000 audit[6205]: AVC avc: denied { bpf } for pid=6205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.708000 audit[6205]: AVC avc: denied { bpf } for pid=6205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.708000 audit[6205]: AVC avc: denied { bpf } for pid=6205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.708000 audit[6205]: AVC avc: denied { perfmon } for pid=6205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.708000 audit[6205]: AVC avc: denied { perfmon } for pid=6205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.708000 audit[6205]: AVC avc: denied { perfmon } for pid=6205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.708000 audit[6205]: AVC avc: denied { perfmon } for pid=6205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.708000 audit[6205]: AVC avc: denied { perfmon } for pid=6205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.708000 audit[6205]: AVC avc: denied { bpf } for pid=6205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.708000 audit[6205]: AVC avc: denied { bpf } for pid=6205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 22:26:09.708000 audit: BPF prog-id=208 op=LOAD Feb 12 22:26:09.708000 audit[6205]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c4b88 items=0 ppid=2539 pid=6205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 22:26:09.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033346365346363383638666230643761666134393362353533373663 Feb 12 22:26:09.747605 env[1557]: time="2024-02-12T22:26:09.747549396Z" level=info msg="StartContainer for \"034ce4cc868fb0d7afa493b55376c1419bc2c3b8579fba081a3f8bbfd494d283\" returns successfully" Feb 12 22:26:18.486601 kubelet[2807]: E0212 22:26:18.486486 2807 controller.go:189] failed to update lease, error: Put "https://172.31.25.241:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-25-241?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers)