Feb 9 09:47:08.971158 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Feb 9 09:47:08.971198 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Feb 9 08:56:26 -00 2024 Feb 9 09:47:08.971221 kernel: efi: EFI v2.70 by EDK II Feb 9 09:47:08.971237 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7ac1aa98 MEMRESERVE=0x71a8cf98 Feb 9 09:47:08.971250 kernel: ACPI: Early table checksum verification disabled Feb 9 09:47:08.971264 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Feb 9 09:47:08.971280 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Feb 9 09:47:08.971294 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Feb 9 09:47:08.971308 kernel: ACPI: DSDT 0x0000000078640000 00154F (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Feb 9 09:47:08.971322 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Feb 9 09:47:08.971341 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Feb 9 09:47:08.971355 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Feb 9 09:47:08.971369 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Feb 9 09:47:08.971383 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Feb 9 09:47:08.971400 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Feb 9 09:47:08.971465 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Feb 9 09:47:08.971482 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Feb 9 09:47:08.971497 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Feb 9 09:47:08.971512 kernel: printk: bootconsole [uart0] enabled Feb 9 09:47:08.971526 kernel: NUMA: Failed to initialise from firmware Feb 9 09:47:08.971542 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Feb 9 09:47:08.971556 kernel: NUMA: NODE_DATA [mem 0x4b5841900-0x4b5846fff] Feb 9 09:47:08.971571 kernel: Zone ranges: Feb 9 09:47:08.971586 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Feb 9 09:47:08.971601 kernel: DMA32 empty Feb 9 09:47:08.971615 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Feb 9 09:47:08.971636 kernel: Movable zone start for each node Feb 9 09:47:08.971650 kernel: Early memory node ranges Feb 9 09:47:08.971665 kernel: node 0: [mem 0x0000000040000000-0x00000000786effff] Feb 9 09:47:08.971679 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Feb 9 09:47:08.971693 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Feb 9 09:47:08.971708 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Feb 9 09:47:08.971722 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Feb 9 09:47:08.971737 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Feb 9 09:47:08.971751 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Feb 9 09:47:08.971765 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Feb 9 09:47:08.971780 kernel: psci: probing for conduit method from ACPI. Feb 9 09:47:08.971794 kernel: psci: PSCIv1.0 detected in firmware. Feb 9 09:47:08.971814 kernel: psci: Using standard PSCI v0.2 function IDs Feb 9 09:47:08.971828 kernel: psci: Trusted OS migration not required Feb 9 09:47:08.971850 kernel: psci: SMC Calling Convention v1.1 Feb 9 09:47:08.971866 kernel: ACPI: SRAT not present Feb 9 09:47:08.971881 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 9 09:47:08.971901 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 9 09:47:08.971917 kernel: pcpu-alloc: [0] 0 [0] 1 Feb 9 09:47:08.971932 kernel: Detected PIPT I-cache on CPU0 Feb 9 09:47:08.971947 kernel: CPU features: detected: GIC system register CPU interface Feb 9 09:47:08.971963 kernel: CPU features: detected: Spectre-v2 Feb 9 09:47:08.971978 kernel: CPU features: detected: Spectre-v3a Feb 9 09:47:08.971993 kernel: CPU features: detected: Spectre-BHB Feb 9 09:47:08.972008 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 9 09:47:08.972024 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 9 09:47:08.972039 kernel: CPU features: detected: ARM erratum 1742098 Feb 9 09:47:08.972054 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Feb 9 09:47:08.972073 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Feb 9 09:47:08.972089 kernel: Policy zone: Normal Feb 9 09:47:08.972107 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=14ffd9340f674a8d04c9d43eed85484d8b2b7e2bcd8b36a975c9ac66063d537d Feb 9 09:47:08.972123 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 09:47:08.972138 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 09:47:08.972153 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 09:47:08.972168 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 09:47:08.972184 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Feb 9 09:47:08.972200 kernel: Memory: 3826316K/4030464K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 204148K reserved, 0K cma-reserved) Feb 9 09:47:08.972216 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 09:47:08.972235 kernel: trace event string verifier disabled Feb 9 09:47:08.972250 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 9 09:47:08.972266 kernel: rcu: RCU event tracing is enabled. Feb 9 09:47:08.972282 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 09:47:08.972298 kernel: Trampoline variant of Tasks RCU enabled. Feb 9 09:47:08.972314 kernel: Tracing variant of Tasks RCU enabled. Feb 9 09:47:08.972330 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 09:47:08.972345 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 09:47:08.972361 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 9 09:47:08.972376 kernel: GICv3: 96 SPIs implemented Feb 9 09:47:08.972391 kernel: GICv3: 0 Extended SPIs implemented Feb 9 09:47:08.972407 kernel: GICv3: Distributor has no Range Selector support Feb 9 09:47:08.972454 kernel: Root IRQ handler: gic_handle_irq Feb 9 09:47:08.972470 kernel: GICv3: 16 PPIs implemented Feb 9 09:47:08.972486 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Feb 9 09:47:08.972501 kernel: ACPI: SRAT not present Feb 9 09:47:08.972516 kernel: ITS [mem 0x10080000-0x1009ffff] Feb 9 09:47:08.972531 kernel: ITS@0x0000000010080000: allocated 8192 Devices @4000a0000 (indirect, esz 8, psz 64K, shr 1) Feb 9 09:47:08.972547 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000b0000 (flat, esz 8, psz 64K, shr 1) Feb 9 09:47:08.972562 kernel: GICv3: using LPI property table @0x00000004000c0000 Feb 9 09:47:08.972578 kernel: ITS: Using hypervisor restricted LPI range [128] Feb 9 09:47:08.972593 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Feb 9 09:47:08.972608 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Feb 9 09:47:08.972628 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Feb 9 09:47:08.972644 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Feb 9 09:47:08.972660 kernel: Console: colour dummy device 80x25 Feb 9 09:47:08.972676 kernel: printk: console [tty1] enabled Feb 9 09:47:08.972691 kernel: ACPI: Core revision 20210730 Feb 9 09:47:08.972707 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Feb 9 09:47:08.972723 kernel: pid_max: default: 32768 minimum: 301 Feb 9 09:47:08.972739 kernel: LSM: Security Framework initializing Feb 9 09:47:08.972755 kernel: SELinux: Initializing. Feb 9 09:47:08.972771 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 09:47:08.972791 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 09:47:08.972807 kernel: rcu: Hierarchical SRCU implementation. Feb 9 09:47:08.972823 kernel: Platform MSI: ITS@0x10080000 domain created Feb 9 09:47:08.972838 kernel: PCI/MSI: ITS@0x10080000 domain created Feb 9 09:47:08.972854 kernel: Remapping and enabling EFI services. Feb 9 09:47:08.972870 kernel: smp: Bringing up secondary CPUs ... Feb 9 09:47:08.972885 kernel: Detected PIPT I-cache on CPU1 Feb 9 09:47:08.972902 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Feb 9 09:47:08.972918 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Feb 9 09:47:08.972938 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Feb 9 09:47:08.972953 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 09:47:08.972969 kernel: SMP: Total of 2 processors activated. Feb 9 09:47:08.972985 kernel: CPU features: detected: 32-bit EL0 Support Feb 9 09:47:08.973000 kernel: CPU features: detected: 32-bit EL1 Support Feb 9 09:47:08.973016 kernel: CPU features: detected: CRC32 instructions Feb 9 09:47:08.973031 kernel: CPU: All CPU(s) started at EL1 Feb 9 09:47:08.973047 kernel: alternatives: patching kernel code Feb 9 09:47:08.973062 kernel: devtmpfs: initialized Feb 9 09:47:08.973082 kernel: KASLR disabled due to lack of seed Feb 9 09:47:08.973098 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 09:47:08.973114 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 09:47:08.973141 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 09:47:08.973161 kernel: SMBIOS 3.0.0 present. Feb 9 09:47:08.973177 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Feb 9 09:47:08.973193 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 09:47:08.973209 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 9 09:47:08.973226 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 9 09:47:08.973242 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 9 09:47:08.973258 kernel: audit: initializing netlink subsys (disabled) Feb 9 09:47:08.973275 kernel: audit: type=2000 audit(0.249:1): state=initialized audit_enabled=0 res=1 Feb 9 09:47:08.973296 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 09:47:08.973312 kernel: cpuidle: using governor menu Feb 9 09:47:08.973328 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 9 09:47:08.973345 kernel: ASID allocator initialised with 32768 entries Feb 9 09:47:08.973361 kernel: ACPI: bus type PCI registered Feb 9 09:47:08.973381 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 09:47:08.973398 kernel: Serial: AMBA PL011 UART driver Feb 9 09:47:08.973433 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 09:47:08.973454 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 9 09:47:08.973471 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 09:47:08.973487 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 9 09:47:08.973504 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 09:47:08.973520 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 9 09:47:08.973536 kernel: ACPI: Added _OSI(Module Device) Feb 9 09:47:08.973558 kernel: ACPI: Added _OSI(Processor Device) Feb 9 09:47:08.973575 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 09:47:08.973591 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 09:47:08.973607 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 09:47:08.973624 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 09:47:08.973640 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 09:47:08.973656 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 09:47:08.973673 kernel: ACPI: Interpreter enabled Feb 9 09:47:08.973689 kernel: ACPI: Using GIC for interrupt routing Feb 9 09:47:08.973709 kernel: ACPI: MCFG table detected, 1 entries Feb 9 09:47:08.973726 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Feb 9 09:47:08.974029 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 09:47:08.974229 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Feb 9 09:47:08.974442 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Feb 9 09:47:08.976560 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Feb 9 09:47:08.976776 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Feb 9 09:47:08.976807 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Feb 9 09:47:08.976825 kernel: acpiphp: Slot [1] registered Feb 9 09:47:08.976842 kernel: acpiphp: Slot [2] registered Feb 9 09:47:08.976858 kernel: acpiphp: Slot [3] registered Feb 9 09:47:08.976874 kernel: acpiphp: Slot [4] registered Feb 9 09:47:08.976891 kernel: acpiphp: Slot [5] registered Feb 9 09:47:08.976907 kernel: acpiphp: Slot [6] registered Feb 9 09:47:08.976923 kernel: acpiphp: Slot [7] registered Feb 9 09:47:08.976939 kernel: acpiphp: Slot [8] registered Feb 9 09:47:08.976959 kernel: acpiphp: Slot [9] registered Feb 9 09:47:08.976976 kernel: acpiphp: Slot [10] registered Feb 9 09:47:08.976992 kernel: acpiphp: Slot [11] registered Feb 9 09:47:08.977008 kernel: acpiphp: Slot [12] registered Feb 9 09:47:08.977024 kernel: acpiphp: Slot [13] registered Feb 9 09:47:08.977041 kernel: acpiphp: Slot [14] registered Feb 9 09:47:08.977057 kernel: acpiphp: Slot [15] registered Feb 9 09:47:08.977073 kernel: acpiphp: Slot [16] registered Feb 9 09:47:08.977089 kernel: acpiphp: Slot [17] registered Feb 9 09:47:08.977105 kernel: acpiphp: Slot [18] registered Feb 9 09:47:08.977125 kernel: acpiphp: Slot [19] registered Feb 9 09:47:08.977141 kernel: acpiphp: Slot [20] registered Feb 9 09:47:08.977157 kernel: acpiphp: Slot [21] registered Feb 9 09:47:08.977173 kernel: acpiphp: Slot [22] registered Feb 9 09:47:08.977189 kernel: acpiphp: Slot [23] registered Feb 9 09:47:08.977205 kernel: acpiphp: Slot [24] registered Feb 9 09:47:08.977221 kernel: acpiphp: Slot [25] registered Feb 9 09:47:08.977238 kernel: acpiphp: Slot [26] registered Feb 9 09:47:08.977254 kernel: acpiphp: Slot [27] registered Feb 9 09:47:08.977274 kernel: acpiphp: Slot [28] registered Feb 9 09:47:08.977291 kernel: acpiphp: Slot [29] registered Feb 9 09:47:08.977307 kernel: acpiphp: Slot [30] registered Feb 9 09:47:08.977323 kernel: acpiphp: Slot [31] registered Feb 9 09:47:08.977339 kernel: PCI host bridge to bus 0000:00 Feb 9 09:47:08.977984 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Feb 9 09:47:08.994235 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Feb 9 09:47:08.994477 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Feb 9 09:47:08.994667 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Feb 9 09:47:08.994895 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Feb 9 09:47:08.995137 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Feb 9 09:47:08.995339 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Feb 9 09:47:08.995579 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Feb 9 09:47:08.995780 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Feb 9 09:47:08.995984 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 09:47:08.996198 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Feb 9 09:47:08.996395 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Feb 9 09:47:08.996624 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Feb 9 09:47:08.996826 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Feb 9 09:47:08.997026 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 09:47:08.997219 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Feb 9 09:47:09.012811 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Feb 9 09:47:09.013068 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Feb 9 09:47:09.013272 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Feb 9 09:47:09.013537 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Feb 9 09:47:09.013725 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Feb 9 09:47:09.013901 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Feb 9 09:47:09.014078 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Feb 9 09:47:09.014110 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Feb 9 09:47:09.014129 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Feb 9 09:47:09.014146 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Feb 9 09:47:09.014163 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Feb 9 09:47:09.014180 kernel: iommu: Default domain type: Translated Feb 9 09:47:09.014197 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 9 09:47:09.014213 kernel: vgaarb: loaded Feb 9 09:47:09.014230 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 09:47:09.014247 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 09:47:09.014267 kernel: PTP clock support registered Feb 9 09:47:09.014284 kernel: Registered efivars operations Feb 9 09:47:09.014301 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 9 09:47:09.014317 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 09:47:09.014333 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 09:47:09.014350 kernel: pnp: PnP ACPI init Feb 9 09:47:09.014587 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Feb 9 09:47:09.014614 kernel: pnp: PnP ACPI: found 1 devices Feb 9 09:47:09.014631 kernel: NET: Registered PF_INET protocol family Feb 9 09:47:09.014653 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 09:47:09.014670 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 9 09:47:09.014687 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 09:47:09.014704 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 09:47:09.014721 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 9 09:47:09.014737 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 9 09:47:09.014754 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 09:47:09.014770 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 09:47:09.014787 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 09:47:09.014807 kernel: PCI: CLS 0 bytes, default 64 Feb 9 09:47:09.014824 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Feb 9 09:47:09.014840 kernel: kvm [1]: HYP mode not available Feb 9 09:47:09.014856 kernel: Initialise system trusted keyrings Feb 9 09:47:09.014873 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 9 09:47:09.014889 kernel: Key type asymmetric registered Feb 9 09:47:09.014905 kernel: Asymmetric key parser 'x509' registered Feb 9 09:47:09.014941 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 09:47:09.014959 kernel: io scheduler mq-deadline registered Feb 9 09:47:09.014981 kernel: io scheduler kyber registered Feb 9 09:47:09.014998 kernel: io scheduler bfq registered Feb 9 09:47:09.015205 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Feb 9 09:47:09.015231 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Feb 9 09:47:09.015248 kernel: ACPI: button: Power Button [PWRB] Feb 9 09:47:09.015266 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 09:47:09.015283 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Feb 9 09:47:09.015524 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Feb 9 09:47:09.015554 kernel: printk: console [ttyS0] disabled Feb 9 09:47:09.015572 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Feb 9 09:47:09.015588 kernel: printk: console [ttyS0] enabled Feb 9 09:47:09.015604 kernel: printk: bootconsole [uart0] disabled Feb 9 09:47:09.015621 kernel: thunder_xcv, ver 1.0 Feb 9 09:47:09.015637 kernel: thunder_bgx, ver 1.0 Feb 9 09:47:09.015653 kernel: nicpf, ver 1.0 Feb 9 09:47:09.015669 kernel: nicvf, ver 1.0 Feb 9 09:47:09.015875 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 9 09:47:09.016069 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-09T09:47:08 UTC (1707472028) Feb 9 09:47:09.016092 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 09:47:09.016109 kernel: NET: Registered PF_INET6 protocol family Feb 9 09:47:09.016125 kernel: Segment Routing with IPv6 Feb 9 09:47:09.016141 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 09:47:09.016158 kernel: NET: Registered PF_PACKET protocol family Feb 9 09:47:09.016174 kernel: Key type dns_resolver registered Feb 9 09:47:09.016190 kernel: registered taskstats version 1 Feb 9 09:47:09.016212 kernel: Loading compiled-in X.509 certificates Feb 9 09:47:09.016229 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: ca91574208414224935c9cea513398977daf917d' Feb 9 09:47:09.016245 kernel: Key type .fscrypt registered Feb 9 09:47:09.016261 kernel: Key type fscrypt-provisioning registered Feb 9 09:47:09.016277 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 09:47:09.016293 kernel: ima: Allocated hash algorithm: sha1 Feb 9 09:47:09.016310 kernel: ima: No architecture policies found Feb 9 09:47:09.016326 kernel: Freeing unused kernel memory: 34688K Feb 9 09:47:09.016342 kernel: Run /init as init process Feb 9 09:47:09.016362 kernel: with arguments: Feb 9 09:47:09.016378 kernel: /init Feb 9 09:47:09.016394 kernel: with environment: Feb 9 09:47:09.016438 kernel: HOME=/ Feb 9 09:47:09.016461 kernel: TERM=linux Feb 9 09:47:09.016477 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 09:47:09.016499 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 09:47:09.016520 systemd[1]: Detected virtualization amazon. Feb 9 09:47:09.016543 systemd[1]: Detected architecture arm64. Feb 9 09:47:09.016561 systemd[1]: Running in initrd. Feb 9 09:47:09.016579 systemd[1]: No hostname configured, using default hostname. Feb 9 09:47:09.016596 systemd[1]: Hostname set to . Feb 9 09:47:09.016614 systemd[1]: Initializing machine ID from VM UUID. Feb 9 09:47:09.016631 systemd[1]: Queued start job for default target initrd.target. Feb 9 09:47:09.016649 systemd[1]: Started systemd-ask-password-console.path. Feb 9 09:47:09.016667 systemd[1]: Reached target cryptsetup.target. Feb 9 09:47:09.016689 systemd[1]: Reached target paths.target. Feb 9 09:47:09.016706 systemd[1]: Reached target slices.target. Feb 9 09:47:09.016723 systemd[1]: Reached target swap.target. Feb 9 09:47:09.016741 systemd[1]: Reached target timers.target. Feb 9 09:47:09.016759 systemd[1]: Listening on iscsid.socket. Feb 9 09:47:09.016777 systemd[1]: Listening on iscsiuio.socket. Feb 9 09:47:09.016794 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 09:47:09.016812 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 09:47:09.016834 systemd[1]: Listening on systemd-journald.socket. Feb 9 09:47:09.016852 systemd[1]: Listening on systemd-networkd.socket. Feb 9 09:47:09.016869 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 09:47:09.016887 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 09:47:09.016904 systemd[1]: Reached target sockets.target. Feb 9 09:47:09.016922 systemd[1]: Starting kmod-static-nodes.service... Feb 9 09:47:09.016939 systemd[1]: Finished network-cleanup.service. Feb 9 09:47:09.016957 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 09:47:09.016974 systemd[1]: Starting systemd-journald.service... Feb 9 09:47:09.016996 systemd[1]: Starting systemd-modules-load.service... Feb 9 09:47:09.017014 systemd[1]: Starting systemd-resolved.service... Feb 9 09:47:09.017031 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 09:47:09.017049 systemd[1]: Finished kmod-static-nodes.service. Feb 9 09:47:09.017067 kernel: audit: type=1130 audit(1707472028.980:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:09.017085 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 09:47:09.017102 kernel: audit: type=1130 audit(1707472029.004:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:09.017119 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 09:47:09.017144 systemd-journald[308]: Journal started Feb 9 09:47:09.017231 systemd-journald[308]: Runtime Journal (/run/log/journal/ec27e34407ea36affe9125c503f86c35) is 8.0M, max 75.4M, 67.4M free. Feb 9 09:47:08.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:09.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:08.975084 systemd-modules-load[309]: Inserted module 'overlay' Feb 9 09:47:09.034439 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 09:47:09.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:09.038237 systemd-modules-load[309]: Inserted module 'br_netfilter' Feb 9 09:47:09.051270 kernel: Bridge firewalling registered Feb 9 09:47:09.051308 systemd[1]: Started systemd-journald.service. Feb 9 09:47:09.051334 kernel: audit: type=1130 audit(1707472029.035:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:09.063443 kernel: SCSI subsystem initialized Feb 9 09:47:09.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:09.086103 kernel: audit: type=1130 audit(1707472029.066:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:09.086191 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 09:47:09.086217 kernel: device-mapper: uevent: version 1.0.3 Feb 9 09:47:09.085148 systemd-resolved[310]: Positive Trust Anchors: Feb 9 09:47:09.097229 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 09:47:09.085175 systemd-resolved[310]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 09:47:09.085237 systemd-resolved[310]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 09:47:09.086328 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 09:47:09.135260 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 09:47:09.150251 systemd-modules-load[309]: Inserted module 'dm_multipath' Feb 9 09:47:09.158084 systemd[1]: Finished systemd-modules-load.service. Feb 9 09:47:09.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:09.167728 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 09:47:09.181590 kernel: audit: type=1130 audit(1707472029.165:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:09.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:09.182015 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 09:47:09.196103 kernel: audit: type=1130 audit(1707472029.180:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:09.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:09.204452 kernel: audit: type=1130 audit(1707472029.194:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:09.213865 systemd[1]: Starting dracut-cmdline.service... Feb 9 09:47:09.219799 systemd[1]: Starting systemd-sysctl.service... Feb 9 09:47:09.245529 dracut-cmdline[327]: dracut-dracut-053 Feb 9 09:47:09.247943 systemd[1]: Finished systemd-sysctl.service. Feb 9 09:47:09.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:09.260443 kernel: audit: type=1130 audit(1707472029.251:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:09.262536 dracut-cmdline[327]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=14ffd9340f674a8d04c9d43eed85484d8b2b7e2bcd8b36a975c9ac66063d537d Feb 9 09:47:09.368449 kernel: Loading iSCSI transport class v2.0-870. Feb 9 09:47:09.381446 kernel: iscsi: registered transport (tcp) Feb 9 09:47:09.406369 kernel: iscsi: registered transport (qla4xxx) Feb 9 09:47:09.406468 kernel: QLogic iSCSI HBA Driver Feb 9 09:47:09.578081 systemd-resolved[310]: Defaulting to hostname 'linux'. Feb 9 09:47:09.581672 kernel: random: crng init done Feb 9 09:47:09.580057 systemd[1]: Started systemd-resolved.service. Feb 9 09:47:09.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:09.586114 systemd[1]: Reached target nss-lookup.target. Feb 9 09:47:09.596962 kernel: audit: type=1130 audit(1707472029.584:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:09.615608 systemd[1]: Finished dracut-cmdline.service. Feb 9 09:47:09.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:09.620853 systemd[1]: Starting dracut-pre-udev.service... Feb 9 09:47:09.686450 kernel: raid6: neonx8 gen() 6367 MB/s Feb 9 09:47:09.704449 kernel: raid6: neonx8 xor() 4732 MB/s Feb 9 09:47:09.722444 kernel: raid6: neonx4 gen() 6414 MB/s Feb 9 09:47:09.740446 kernel: raid6: neonx4 xor() 4885 MB/s Feb 9 09:47:09.758443 kernel: raid6: neonx2 gen() 5720 MB/s Feb 9 09:47:09.776443 kernel: raid6: neonx2 xor() 4510 MB/s Feb 9 09:47:09.794443 kernel: raid6: neonx1 gen() 4444 MB/s Feb 9 09:47:09.812447 kernel: raid6: neonx1 xor() 3665 MB/s Feb 9 09:47:09.830444 kernel: raid6: int64x8 gen() 3392 MB/s Feb 9 09:47:09.848444 kernel: raid6: int64x8 xor() 2095 MB/s Feb 9 09:47:09.866444 kernel: raid6: int64x4 gen() 3777 MB/s Feb 9 09:47:09.884444 kernel: raid6: int64x4 xor() 2194 MB/s Feb 9 09:47:09.902458 kernel: raid6: int64x2 gen() 3568 MB/s Feb 9 09:47:09.920460 kernel: raid6: int64x2 xor() 1945 MB/s Feb 9 09:47:09.938449 kernel: raid6: int64x1 gen() 2768 MB/s Feb 9 09:47:09.957944 kernel: raid6: int64x1 xor() 1450 MB/s Feb 9 09:47:09.957978 kernel: raid6: using algorithm neonx4 gen() 6414 MB/s Feb 9 09:47:09.958002 kernel: raid6: .... xor() 4885 MB/s, rmw enabled Feb 9 09:47:09.959746 kernel: raid6: using neon recovery algorithm Feb 9 09:47:09.978451 kernel: xor: measuring software checksum speed Feb 9 09:47:09.981446 kernel: 8regs : 9291 MB/sec Feb 9 09:47:09.983443 kernel: 32regs : 11111 MB/sec Feb 9 09:47:09.987716 kernel: arm64_neon : 9338 MB/sec Feb 9 09:47:09.987748 kernel: xor: using function: 32regs (11111 MB/sec) Feb 9 09:47:10.078469 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 9 09:47:10.096203 systemd[1]: Finished dracut-pre-udev.service. Feb 9 09:47:10.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:10.100000 audit: BPF prog-id=7 op=LOAD Feb 9 09:47:10.100000 audit: BPF prog-id=8 op=LOAD Feb 9 09:47:10.102709 systemd[1]: Starting systemd-udevd.service... Feb 9 09:47:10.133125 systemd-udevd[507]: Using default interface naming scheme 'v252'. Feb 9 09:47:10.144831 systemd[1]: Started systemd-udevd.service. Feb 9 09:47:10.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:10.153026 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 09:47:10.183365 dracut-pre-trigger[514]: rd.md=0: removing MD RAID activation Feb 9 09:47:10.245525 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 09:47:10.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:10.249912 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 09:47:10.355328 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 09:47:10.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:10.478772 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Feb 9 09:47:10.478832 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Feb 9 09:47:10.491639 kernel: ena 0000:00:05.0: ENA device version: 0.10 Feb 9 09:47:10.491991 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Feb 9 09:47:10.502442 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:61:eb:33:8b:a1 Feb 9 09:47:10.506539 (udev-worker)[565]: Network interface NamePolicy= disabled on kernel command line. Feb 9 09:47:10.512140 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Feb 9 09:47:10.512203 kernel: nvme nvme0: pci function 0000:00:04.0 Feb 9 09:47:10.522879 kernel: nvme nvme0: 2/0/0 default/read/poll queues Feb 9 09:47:10.529433 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 09:47:10.529501 kernel: GPT:9289727 != 16777215 Feb 9 09:47:10.529526 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 09:47:10.532884 kernel: GPT:9289727 != 16777215 Feb 9 09:47:10.532915 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 09:47:10.536260 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 09:47:10.611446 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (566) Feb 9 09:47:10.632237 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 09:47:10.692536 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 09:47:10.721971 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 09:47:10.744932 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 09:47:10.753157 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 09:47:10.768918 systemd[1]: Starting disk-uuid.service... Feb 9 09:47:10.799050 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 09:47:10.799242 disk-uuid[671]: Primary Header is updated. Feb 9 09:47:10.799242 disk-uuid[671]: Secondary Entries is updated. Feb 9 09:47:10.799242 disk-uuid[671]: Secondary Header is updated. Feb 9 09:47:10.813142 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 09:47:11.809672 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 09:47:11.809746 disk-uuid[672]: The operation has completed successfully. Feb 9 09:47:11.969077 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 09:47:11.969279 systemd[1]: Finished disk-uuid.service. Feb 9 09:47:11.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:11.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:12.001315 systemd[1]: Starting verity-setup.service... Feb 9 09:47:12.039464 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 9 09:47:12.119672 systemd[1]: Found device dev-mapper-usr.device. Feb 9 09:47:12.127328 systemd[1]: Finished verity-setup.service. Feb 9 09:47:12.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:12.132565 systemd[1]: Mounting sysusr-usr.mount... Feb 9 09:47:12.215512 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 09:47:12.216167 systemd[1]: Mounted sysusr-usr.mount. Feb 9 09:47:12.219654 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 09:47:12.224261 systemd[1]: Starting ignition-setup.service... Feb 9 09:47:12.234829 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 09:47:12.253673 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Feb 9 09:47:12.253742 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 9 09:47:12.256219 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 9 09:47:12.264445 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 9 09:47:12.282213 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 09:47:12.318111 systemd[1]: Finished ignition-setup.service. Feb 9 09:47:12.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:12.335211 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 09:47:12.399166 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 09:47:12.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:12.404000 audit: BPF prog-id=9 op=LOAD Feb 9 09:47:12.406597 systemd[1]: Starting systemd-networkd.service... Feb 9 09:47:12.458665 systemd-networkd[1100]: lo: Link UP Feb 9 09:47:12.460971 systemd-networkd[1100]: lo: Gained carrier Feb 9 09:47:12.464057 systemd-networkd[1100]: Enumeration completed Feb 9 09:47:12.464217 systemd[1]: Started systemd-networkd.service. Feb 9 09:47:12.469085 systemd-networkd[1100]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 09:47:12.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:12.479268 systemd[1]: Reached target network.target. Feb 9 09:47:12.493320 systemd-networkd[1100]: eth0: Link UP Feb 9 09:47:12.493328 systemd-networkd[1100]: eth0: Gained carrier Feb 9 09:47:12.495335 systemd[1]: Starting iscsiuio.service... Feb 9 09:47:12.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:12.507542 systemd[1]: Started iscsiuio.service. Feb 9 09:47:12.512812 systemd[1]: Starting iscsid.service... Feb 9 09:47:12.524452 iscsid[1106]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 09:47:12.524452 iscsid[1106]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 09:47:12.524452 iscsid[1106]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 09:47:12.524452 iscsid[1106]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 09:47:12.524452 iscsid[1106]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 09:47:12.524452 iscsid[1106]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 09:47:12.528073 systemd-networkd[1100]: eth0: DHCPv4 address 172.31.21.69/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 9 09:47:12.556646 systemd[1]: Started iscsid.service. Feb 9 09:47:12.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:12.575126 systemd[1]: Starting dracut-initqueue.service... Feb 9 09:47:12.598594 systemd[1]: Finished dracut-initqueue.service. Feb 9 09:47:12.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:12.602707 systemd[1]: Reached target remote-fs-pre.target. Feb 9 09:47:12.606486 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 09:47:12.610598 systemd[1]: Reached target remote-fs.target. Feb 9 09:47:12.615697 systemd[1]: Starting dracut-pre-mount.service... Feb 9 09:47:12.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:12.640564 systemd[1]: Finished dracut-pre-mount.service. Feb 9 09:47:12.912861 ignition[1048]: Ignition 2.14.0 Feb 9 09:47:12.912907 ignition[1048]: Stage: fetch-offline Feb 9 09:47:12.913212 ignition[1048]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:47:12.913275 ignition[1048]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 09:47:12.934545 ignition[1048]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 09:47:12.937851 ignition[1048]: Ignition finished successfully Feb 9 09:47:12.941256 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 09:47:12.958619 kernel: kauditd_printk_skb: 18 callbacks suppressed Feb 9 09:47:12.958660 kernel: audit: type=1130 audit(1707472032.943:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:12.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:12.946091 systemd[1]: Starting ignition-fetch.service... Feb 9 09:47:12.963326 ignition[1125]: Ignition 2.14.0 Feb 9 09:47:12.963341 ignition[1125]: Stage: fetch Feb 9 09:47:12.963744 ignition[1125]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:47:12.963802 ignition[1125]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 09:47:12.983613 ignition[1125]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 09:47:12.986646 ignition[1125]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 09:47:12.995928 ignition[1125]: INFO : PUT result: OK Feb 9 09:47:12.999748 ignition[1125]: DEBUG : parsed url from cmdline: "" Feb 9 09:47:12.999748 ignition[1125]: INFO : no config URL provided Feb 9 09:47:12.999748 ignition[1125]: INFO : reading system config file "/usr/lib/ignition/user.ign" Feb 9 09:47:13.007175 ignition[1125]: INFO : no config at "/usr/lib/ignition/user.ign" Feb 9 09:47:13.007175 ignition[1125]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 09:47:13.007175 ignition[1125]: INFO : PUT result: OK Feb 9 09:47:13.007175 ignition[1125]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Feb 9 09:47:13.023946 ignition[1125]: INFO : GET result: OK Feb 9 09:47:13.023946 ignition[1125]: DEBUG : parsing config with SHA512: 0d05d52a36d2a222f3be9136d331b64206142f5169db45aa8cd8fc4d9bc82788de9dac43c89d09516f2f4895e987a2f1d4e06c04351bfe504d1bd7fe5bd57d79 Feb 9 09:47:13.083065 unknown[1125]: fetched base config from "system" Feb 9 09:47:13.083093 unknown[1125]: fetched base config from "system" Feb 9 09:47:13.083109 unknown[1125]: fetched user config from "aws" Feb 9 09:47:13.088902 ignition[1125]: fetch: fetch complete Feb 9 09:47:13.088917 ignition[1125]: fetch: fetch passed Feb 9 09:47:13.089006 ignition[1125]: Ignition finished successfully Feb 9 09:47:13.096752 systemd[1]: Finished ignition-fetch.service. Feb 9 09:47:13.107535 kernel: audit: type=1130 audit(1707472033.097:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:13.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:13.108901 systemd[1]: Starting ignition-kargs.service... Feb 9 09:47:13.127510 ignition[1131]: Ignition 2.14.0 Feb 9 09:47:13.127538 ignition[1131]: Stage: kargs Feb 9 09:47:13.127838 ignition[1131]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:47:13.127896 ignition[1131]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 09:47:13.143170 ignition[1131]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 09:47:13.146079 ignition[1131]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 09:47:13.149542 ignition[1131]: INFO : PUT result: OK Feb 9 09:47:13.156116 ignition[1131]: kargs: kargs passed Feb 9 09:47:13.157886 ignition[1131]: Ignition finished successfully Feb 9 09:47:13.161537 systemd[1]: Finished ignition-kargs.service. Feb 9 09:47:13.174507 kernel: audit: type=1130 audit(1707472033.162:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:13.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:13.165079 systemd[1]: Starting ignition-disks.service... Feb 9 09:47:13.184034 ignition[1137]: Ignition 2.14.0 Feb 9 09:47:13.184060 ignition[1137]: Stage: disks Feb 9 09:47:13.184370 ignition[1137]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:47:13.184448 ignition[1137]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 09:47:13.202179 ignition[1137]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 09:47:13.205110 ignition[1137]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 09:47:13.209183 ignition[1137]: INFO : PUT result: OK Feb 9 09:47:13.214990 ignition[1137]: disks: disks passed Feb 9 09:47:13.215098 ignition[1137]: Ignition finished successfully Feb 9 09:47:13.219275 systemd[1]: Finished ignition-disks.service. Feb 9 09:47:13.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:13.223686 systemd[1]: Reached target initrd-root-device.target. Feb 9 09:47:13.234817 kernel: audit: type=1130 audit(1707472033.222:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:13.232817 systemd[1]: Reached target local-fs-pre.target. Feb 9 09:47:13.236876 systemd[1]: Reached target local-fs.target. Feb 9 09:47:13.238832 systemd[1]: Reached target sysinit.target. Feb 9 09:47:13.240760 systemd[1]: Reached target basic.target. Feb 9 09:47:13.244036 systemd[1]: Starting systemd-fsck-root.service... Feb 9 09:47:13.291112 systemd-fsck[1145]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 9 09:47:13.302400 systemd[1]: Finished systemd-fsck-root.service. Feb 9 09:47:13.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:13.314549 systemd[1]: Mounting sysroot.mount... Feb 9 09:47:13.321669 kernel: audit: type=1130 audit(1707472033.301:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:13.333620 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 09:47:13.334589 systemd[1]: Mounted sysroot.mount. Feb 9 09:47:13.336602 systemd[1]: Reached target initrd-root-fs.target. Feb 9 09:47:13.340850 systemd[1]: Mounting sysroot-usr.mount... Feb 9 09:47:13.341708 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 9 09:47:13.341804 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 09:47:13.341875 systemd[1]: Reached target ignition-diskful.target. Feb 9 09:47:13.348313 systemd[1]: Mounted sysroot-usr.mount. Feb 9 09:47:13.367387 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 09:47:13.378056 systemd[1]: Starting initrd-setup-root.service... Feb 9 09:47:13.403025 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1157) Feb 9 09:47:13.403088 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Feb 9 09:47:13.403114 initrd-setup-root[1167]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 09:47:13.408517 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 9 09:47:13.410656 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 9 09:47:13.417456 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 9 09:47:13.421773 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 09:47:13.439263 initrd-setup-root[1193]: cut: /sysroot/etc/group: No such file or directory Feb 9 09:47:13.448049 initrd-setup-root[1201]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 09:47:13.456621 initrd-setup-root[1209]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 09:47:13.630463 systemd[1]: Finished initrd-setup-root.service. Feb 9 09:47:13.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:13.636696 systemd[1]: Starting ignition-mount.service... Feb 9 09:47:13.649144 kernel: audit: type=1130 audit(1707472033.633:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:13.650592 systemd[1]: Starting sysroot-boot.service... Feb 9 09:47:13.662918 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 09:47:13.667363 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 09:47:13.692306 systemd[1]: Finished sysroot-boot.service. Feb 9 09:47:13.700131 ignition[1230]: INFO : Ignition 2.14.0 Feb 9 09:47:13.700131 ignition[1230]: INFO : Stage: mount Feb 9 09:47:13.700131 ignition[1230]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:47:13.700131 ignition[1230]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 09:47:13.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:13.724512 kernel: audit: type=1130 audit(1707472033.713:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:13.725983 ignition[1230]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 09:47:13.729396 ignition[1230]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 09:47:13.733563 ignition[1230]: INFO : PUT result: OK Feb 9 09:47:13.739298 ignition[1230]: INFO : mount: mount passed Feb 9 09:47:13.741301 ignition[1230]: INFO : Ignition finished successfully Feb 9 09:47:13.744823 systemd[1]: Finished ignition-mount.service. Feb 9 09:47:13.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:13.749879 systemd[1]: Starting ignition-files.service... Feb 9 09:47:13.761392 kernel: audit: type=1130 audit(1707472033.747:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:13.755754 systemd-networkd[1100]: eth0: Gained IPv6LL Feb 9 09:47:13.769205 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 09:47:13.787572 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1237) Feb 9 09:47:13.792923 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Feb 9 09:47:13.792956 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 9 09:47:13.792981 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 9 09:47:13.801452 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 9 09:47:13.806054 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 09:47:13.822443 ignition[1256]: INFO : Ignition 2.14.0 Feb 9 09:47:13.826533 ignition[1256]: INFO : Stage: files Feb 9 09:47:13.826533 ignition[1256]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:47:13.826533 ignition[1256]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 09:47:13.847760 ignition[1256]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 09:47:13.847760 ignition[1256]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 09:47:13.847760 ignition[1256]: INFO : PUT result: OK Feb 9 09:47:13.859046 ignition[1256]: DEBUG : files: compiled without relabeling support, skipping Feb 9 09:47:13.862655 ignition[1256]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 09:47:13.862655 ignition[1256]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 09:47:13.898940 ignition[1256]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 09:47:13.902543 ignition[1256]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 09:47:13.905540 ignition[1256]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 09:47:13.904188 unknown[1256]: wrote ssh authorized keys file for user: core Feb 9 09:47:13.912133 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 9 09:47:13.912133 ignition[1256]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Feb 9 09:47:14.374210 ignition[1256]: INFO : GET result: OK Feb 9 09:47:14.956887 ignition[1256]: DEBUG : file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Feb 9 09:47:14.962954 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 9 09:47:14.962954 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 09:47:14.962954 ignition[1256]: INFO : GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Feb 9 09:47:15.012224 ignition[1256]: INFO : GET result: OK Feb 9 09:47:15.153624 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 09:47:15.158984 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 9 09:47:15.158984 ignition[1256]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Feb 9 09:47:15.530234 ignition[1256]: INFO : GET result: OK Feb 9 09:47:15.791596 ignition[1256]: DEBUG : file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Feb 9 09:47:15.798750 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 9 09:47:15.798750 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 09:47:15.798750 ignition[1256]: INFO : GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubectl: attempt #1 Feb 9 09:47:15.919390 ignition[1256]: INFO : GET result: OK Feb 9 09:47:16.520046 ignition[1256]: DEBUG : file matches expected sum of: 14be61ec35669a27acf2df0380afb85b9b42311d50ca1165718421c5f605df1119ec9ae314696a674051712e80deeaa65e62d2d62ed4d107fe99d0aaf419dafc Feb 9 09:47:16.526220 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 09:47:16.526220 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 9 09:47:16.526220 ignition[1256]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 09:47:16.557395 ignition[1256]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2518517906" Feb 9 09:47:16.565546 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1259) Feb 9 09:47:16.565594 ignition[1256]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2518517906": device or resource busy Feb 9 09:47:16.565594 ignition[1256]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2518517906", trying btrfs: device or resource busy Feb 9 09:47:16.565594 ignition[1256]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2518517906" Feb 9 09:47:16.584085 ignition[1256]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2518517906" Feb 9 09:47:16.597080 ignition[1256]: INFO : op(3): [started] unmounting "/mnt/oem2518517906" Feb 9 09:47:16.601133 ignition[1256]: INFO : op(3): [finished] unmounting "/mnt/oem2518517906" Feb 9 09:47:16.601133 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 9 09:47:16.601133 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 09:47:16.601133 ignition[1256]: INFO : GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubeadm: attempt #1 Feb 9 09:47:16.599515 systemd[1]: mnt-oem2518517906.mount: Deactivated successfully. Feb 9 09:47:16.665448 ignition[1256]: INFO : GET result: OK Feb 9 09:47:17.222927 ignition[1256]: DEBUG : file matches expected sum of: 45b3100984c979ba0f1c0df8f4211474c2d75ebe916e677dff5fc8e3b3697cf7a953da94e356f39684cc860dff6878b772b7514c55651c2f866d9efeef23f970 Feb 9 09:47:17.229789 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 09:47:17.229789 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 09:47:17.229789 ignition[1256]: INFO : GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubelet: attempt #1 Feb 9 09:47:17.288671 ignition[1256]: INFO : GET result: OK Feb 9 09:47:18.522723 ignition[1256]: DEBUG : file matches expected sum of: 71857ff499ae135fa478e1827a0ed8865e578a8d2b1e25876e914fd0beba03733801c0654bcd4c0567bafeb16887dafb2dbbe8d1116e6ea28dcd8366c142d348 Feb 9 09:47:18.533070 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 09:47:18.533070 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 09:47:18.533070 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 09:47:18.533070 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" Feb 9 09:47:18.533070 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 09:47:18.533070 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 09:47:18.533070 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 09:47:18.533070 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 09:47:18.533070 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 09:47:18.533070 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 09:47:18.533070 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 09:47:18.533070 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 09:47:18.533070 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 09:47:18.533070 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 09:47:18.533070 ignition[1256]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 09:47:18.603823 ignition[1256]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3295336246" Feb 9 09:47:18.608671 ignition[1256]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3295336246": device or resource busy Feb 9 09:47:18.608671 ignition[1256]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3295336246", trying btrfs: device or resource busy Feb 9 09:47:18.608671 ignition[1256]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3295336246" Feb 9 09:47:18.608671 ignition[1256]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3295336246" Feb 9 09:47:18.608671 ignition[1256]: INFO : op(6): [started] unmounting "/mnt/oem3295336246" Feb 9 09:47:18.608671 ignition[1256]: INFO : op(6): [finished] unmounting "/mnt/oem3295336246" Feb 9 09:47:18.608671 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 09:47:18.608671 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 9 09:47:18.608671 ignition[1256]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 09:47:18.647739 systemd[1]: mnt-oem3295336246.mount: Deactivated successfully. Feb 9 09:47:18.665221 ignition[1256]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3892092784" Feb 9 09:47:18.670767 ignition[1256]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3892092784": device or resource busy Feb 9 09:47:18.670767 ignition[1256]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3892092784", trying btrfs: device or resource busy Feb 9 09:47:18.670767 ignition[1256]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3892092784" Feb 9 09:47:18.682638 ignition[1256]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3892092784" Feb 9 09:47:18.682638 ignition[1256]: INFO : op(9): [started] unmounting "/mnt/oem3892092784" Feb 9 09:47:18.682638 ignition[1256]: INFO : op(9): [finished] unmounting "/mnt/oem3892092784" Feb 9 09:47:18.682638 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 9 09:47:18.682638 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 9 09:47:18.682638 ignition[1256]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 09:47:18.716883 ignition[1256]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2637211702" Feb 9 09:47:18.720406 ignition[1256]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2637211702": device or resource busy Feb 9 09:47:18.720406 ignition[1256]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2637211702", trying btrfs: device or resource busy Feb 9 09:47:18.720406 ignition[1256]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2637211702" Feb 9 09:47:18.732202 ignition[1256]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2637211702" Feb 9 09:47:18.737618 ignition[1256]: INFO : op(c): [started] unmounting "/mnt/oem2637211702" Feb 9 09:47:18.737618 ignition[1256]: INFO : op(c): [finished] unmounting "/mnt/oem2637211702" Feb 9 09:47:18.737618 ignition[1256]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 9 09:47:18.737618 ignition[1256]: INFO : files: op(13): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 09:47:18.737618 ignition[1256]: INFO : files: op(13): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 09:47:18.737618 ignition[1256]: INFO : files: op(14): [started] processing unit "amazon-ssm-agent.service" Feb 9 09:47:18.737618 ignition[1256]: INFO : files: op(14): op(15): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 9 09:47:18.737618 ignition[1256]: INFO : files: op(14): op(15): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 9 09:47:18.737618 ignition[1256]: INFO : files: op(14): [finished] processing unit "amazon-ssm-agent.service" Feb 9 09:47:18.737618 ignition[1256]: INFO : files: op(16): [started] processing unit "nvidia.service" Feb 9 09:47:18.737618 ignition[1256]: INFO : files: op(16): [finished] processing unit "nvidia.service" Feb 9 09:47:18.737618 ignition[1256]: INFO : files: op(17): [started] processing unit "prepare-critools.service" Feb 9 09:47:18.737618 ignition[1256]: INFO : files: op(17): op(18): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 09:47:18.737618 ignition[1256]: INFO : files: op(17): op(18): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 09:47:18.737618 ignition[1256]: INFO : files: op(17): [finished] processing unit "prepare-critools.service" Feb 9 09:47:18.737618 ignition[1256]: INFO : files: op(19): [started] processing unit "prepare-helm.service" Feb 9 09:47:18.737618 ignition[1256]: INFO : files: op(19): op(1a): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 09:47:18.737618 ignition[1256]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 09:47:18.737618 ignition[1256]: INFO : files: op(19): [finished] processing unit "prepare-helm.service" Feb 9 09:47:18.737618 ignition[1256]: INFO : files: op(1b): [started] processing unit "prepare-cni-plugins.service" Feb 9 09:47:18.808937 ignition[1256]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 09:47:18.808937 ignition[1256]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 09:47:18.808937 ignition[1256]: INFO : files: op(1b): [finished] processing unit "prepare-cni-plugins.service" Feb 9 09:47:18.808937 ignition[1256]: INFO : files: op(1d): [started] setting preset to enabled for "nvidia.service" Feb 9 09:47:18.808937 ignition[1256]: INFO : files: op(1d): [finished] setting preset to enabled for "nvidia.service" Feb 9 09:47:18.808937 ignition[1256]: INFO : files: op(1e): [started] setting preset to enabled for "prepare-critools.service" Feb 9 09:47:18.808937 ignition[1256]: INFO : files: op(1e): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 09:47:18.808937 ignition[1256]: INFO : files: op(1f): [started] setting preset to enabled for "prepare-helm.service" Feb 9 09:47:18.808937 ignition[1256]: INFO : files: op(1f): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 09:47:18.808937 ignition[1256]: INFO : files: op(20): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 09:47:18.808937 ignition[1256]: INFO : files: op(20): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 09:47:18.808937 ignition[1256]: INFO : files: op(21): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 09:47:18.808937 ignition[1256]: INFO : files: op(21): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 09:47:18.808937 ignition[1256]: INFO : files: op(22): [started] setting preset to enabled for "amazon-ssm-agent.service" Feb 9 09:47:18.808937 ignition[1256]: INFO : files: op(22): [finished] setting preset to enabled for "amazon-ssm-agent.service" Feb 9 09:47:18.872269 ignition[1256]: INFO : files: createResultFile: createFiles: op(23): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 09:47:18.876858 ignition[1256]: INFO : files: createResultFile: createFiles: op(23): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 09:47:18.880996 ignition[1256]: INFO : files: files passed Feb 9 09:47:18.882940 ignition[1256]: INFO : Ignition finished successfully Feb 9 09:47:18.910913 kernel: audit: type=1130 audit(1707472038.893:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:18.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:18.893207 systemd[1]: Finished ignition-files.service. Feb 9 09:47:18.907227 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 09:47:18.910423 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 09:47:18.916770 systemd[1]: Starting ignition-quench.service... Feb 9 09:47:18.928953 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 09:47:18.929555 systemd[1]: Finished ignition-quench.service. Feb 9 09:47:18.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:18.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:18.944774 initrd-setup-root-after-ignition[1281]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 09:47:18.953990 kernel: audit: type=1130 audit(1707472038.934:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:18.954038 kernel: audit: type=1131 audit(1707472038.934:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:18.954273 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 09:47:18.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:18.968471 kernel: audit: type=1130 audit(1707472038.952:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:18.958982 systemd[1]: Reached target ignition-complete.target. Feb 9 09:47:18.971543 systemd[1]: Starting initrd-parse-etc.service... Feb 9 09:47:19.002010 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 09:47:19.004511 systemd[1]: Finished initrd-parse-etc.service. Feb 9 09:47:19.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.008773 systemd[1]: Reached target initrd-fs.target. Feb 9 09:47:19.039307 kernel: audit: type=1130 audit(1707472039.007:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.039346 kernel: audit: type=1131 audit(1707472039.007:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.026173 systemd[1]: Reached target initrd.target. Feb 9 09:47:19.028155 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 09:47:19.029594 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 09:47:19.058901 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 09:47:19.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.064240 systemd[1]: Starting initrd-cleanup.service... Feb 9 09:47:19.073586 kernel: audit: type=1130 audit(1707472039.060:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.086117 systemd[1]: Stopped target nss-lookup.target. Feb 9 09:47:19.090290 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 09:47:19.094796 systemd[1]: Stopped target timers.target. Feb 9 09:47:19.098649 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 09:47:19.101248 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 09:47:19.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.110662 systemd[1]: Stopped target initrd.target. Feb 9 09:47:19.114457 systemd[1]: Stopped target basic.target. Feb 9 09:47:19.116452 systemd[1]: Stopped target ignition-complete.target. Feb 9 09:47:19.118744 systemd[1]: Stopped target ignition-diskful.target. Feb 9 09:47:19.120980 systemd[1]: Stopped target initrd-root-device.target. Feb 9 09:47:19.123278 systemd[1]: Stopped target remote-fs.target. Feb 9 09:47:19.125383 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 09:47:19.129927 systemd[1]: Stopped target sysinit.target. Feb 9 09:47:19.146679 systemd[1]: Stopped target local-fs.target. Feb 9 09:47:19.148740 systemd[1]: Stopped target local-fs-pre.target. Feb 9 09:47:19.150794 systemd[1]: Stopped target swap.target. Feb 9 09:47:19.152654 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 09:47:19.152866 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 09:47:19.155171 systemd[1]: Stopped target cryptsetup.target. Feb 9 09:47:19.157230 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 09:47:19.157447 systemd[1]: Stopped dracut-initqueue.service. Feb 9 09:47:19.159712 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 09:47:19.159916 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 09:47:19.164757 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 09:47:19.164968 systemd[1]: Stopped ignition-files.service. Feb 9 09:47:19.194566 systemd[1]: Stopping ignition-mount.service... Feb 9 09:47:19.228722 kernel: audit: type=1131 audit(1707472039.104:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.228771 kernel: audit: type=1131 audit(1707472039.151:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.228799 kernel: audit: type=1131 audit(1707472039.156:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.229075 iscsid[1106]: iscsid shutting down. Feb 9 09:47:19.214387 systemd[1]: Stopping iscsid.service... Feb 9 09:47:19.246552 ignition[1294]: INFO : Ignition 2.14.0 Feb 9 09:47:19.246552 ignition[1294]: INFO : Stage: umount Feb 9 09:47:19.246552 ignition[1294]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:47:19.246552 ignition[1294]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 09:47:19.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.228817 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 09:47:19.297657 ignition[1294]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 09:47:19.297657 ignition[1294]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 09:47:19.297657 ignition[1294]: INFO : PUT result: OK Feb 9 09:47:19.297657 ignition[1294]: INFO : umount: umount passed Feb 9 09:47:19.297657 ignition[1294]: INFO : Ignition finished successfully Feb 9 09:47:19.229191 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 09:47:19.235441 systemd[1]: Stopping sysroot-boot.service... Feb 9 09:47:19.248294 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 09:47:19.248619 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 09:47:19.252680 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 09:47:19.252956 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 09:47:19.259250 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 09:47:19.259461 systemd[1]: Stopped iscsid.service. Feb 9 09:47:19.272615 systemd[1]: Stopping iscsiuio.service... Feb 9 09:47:19.290816 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 09:47:19.291693 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 09:47:19.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.291881 systemd[1]: Stopped iscsiuio.service. Feb 9 09:47:19.317601 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 09:47:19.317784 systemd[1]: Finished initrd-cleanup.service. Feb 9 09:47:19.318405 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 09:47:19.318580 systemd[1]: Stopped ignition-mount.service. Feb 9 09:47:19.318906 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 09:47:19.318987 systemd[1]: Stopped ignition-disks.service. Feb 9 09:47:19.319103 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 09:47:19.319174 systemd[1]: Stopped ignition-kargs.service. Feb 9 09:47:19.319495 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 09:47:19.319567 systemd[1]: Stopped ignition-fetch.service. Feb 9 09:47:19.319803 systemd[1]: Stopped target network.target. Feb 9 09:47:19.320077 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 09:47:19.320151 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 09:47:19.320505 systemd[1]: Stopped target paths.target. Feb 9 09:47:19.320767 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 09:47:19.379519 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 09:47:19.381369 systemd[1]: Stopped target slices.target. Feb 9 09:47:19.394969 systemd[1]: Stopped target sockets.target. Feb 9 09:47:19.405245 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 09:47:19.405330 systemd[1]: Closed iscsid.socket. Feb 9 09:47:19.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.412701 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 09:47:19.412777 systemd[1]: Closed iscsiuio.socket. Feb 9 09:47:19.412948 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 09:47:19.413031 systemd[1]: Stopped ignition-setup.service. Feb 9 09:47:19.413553 systemd[1]: Stopping systemd-networkd.service... Feb 9 09:47:19.413754 systemd[1]: Stopping systemd-resolved.service... Feb 9 09:47:19.414403 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 09:47:19.414634 systemd[1]: Stopped sysroot-boot.service. Feb 9 09:47:19.415196 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 09:47:19.415273 systemd[1]: Stopped initrd-setup-root.service. Feb 9 09:47:19.445484 systemd-networkd[1100]: eth0: DHCPv6 lease lost Feb 9 09:47:19.450483 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 09:47:19.450709 systemd[1]: Stopped systemd-networkd.service. Feb 9 09:47:19.452000 audit: BPF prog-id=9 op=UNLOAD Feb 9 09:47:19.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.468000 audit: BPF prog-id=6 op=UNLOAD Feb 9 09:47:19.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.455887 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 09:47:19.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.456092 systemd[1]: Stopped systemd-resolved.service. Feb 9 09:47:19.458610 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 09:47:19.458690 systemd[1]: Closed systemd-networkd.socket. Feb 9 09:47:19.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.461695 systemd[1]: Stopping network-cleanup.service... Feb 9 09:47:19.464220 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 09:47:19.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:19.464337 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 09:47:19.468224 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 09:47:19.468497 systemd[1]: Stopped systemd-sysctl.service. Feb 9 09:47:19.470642 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 09:47:19.470729 systemd[1]: Stopped systemd-modules-load.service. Feb 9 09:47:19.472069 systemd[1]: Stopping systemd-udevd.service... Feb 9 09:47:19.483455 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 09:47:19.483673 systemd[1]: Stopped network-cleanup.service. Feb 9 09:47:19.490629 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 09:47:19.490926 systemd[1]: Stopped systemd-udevd.service. Feb 9 09:47:19.497230 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 09:47:19.497309 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 09:47:19.499481 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 09:47:19.588513 systemd-journald[308]: Received SIGTERM from PID 1 (systemd). Feb 9 09:47:19.499554 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 09:47:19.501618 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 09:47:19.501702 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 09:47:19.503746 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 09:47:19.503823 systemd[1]: Stopped dracut-cmdline.service. Feb 9 09:47:19.505824 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 09:47:19.505897 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 09:47:19.509200 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 09:47:19.517560 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 09:47:19.517683 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 09:47:19.525008 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 09:47:19.525220 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 09:47:19.527869 systemd[1]: Reached target initrd-switch-root.target. Feb 9 09:47:19.531323 systemd[1]: Starting initrd-switch-root.service... Feb 9 09:47:19.552012 systemd[1]: Switching root. Feb 9 09:47:19.608978 systemd-journald[308]: Journal stopped Feb 9 09:47:24.720028 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 09:47:24.720136 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 09:47:24.720169 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 09:47:24.720208 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 09:47:24.720239 kernel: SELinux: policy capability open_perms=1 Feb 9 09:47:24.720277 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 09:47:24.720309 kernel: SELinux: policy capability always_check_network=0 Feb 9 09:47:24.720339 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 09:47:24.720387 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 09:47:24.720534 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 09:47:24.724013 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 09:47:24.724073 systemd[1]: Successfully loaded SELinux policy in 74.759ms. Feb 9 09:47:24.724155 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 19.691ms. Feb 9 09:47:24.724196 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 09:47:24.724228 systemd[1]: Detected virtualization amazon. Feb 9 09:47:24.724262 systemd[1]: Detected architecture arm64. Feb 9 09:47:24.724293 systemd[1]: Detected first boot. Feb 9 09:47:24.724331 systemd[1]: Initializing machine ID from VM UUID. Feb 9 09:47:24.724361 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 09:47:24.724666 systemd[1]: Populated /etc with preset unit settings. Feb 9 09:47:24.724703 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:47:24.724739 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:47:24.724775 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:47:24.724808 kernel: kauditd_printk_skb: 48 callbacks suppressed Feb 9 09:47:24.724842 kernel: audit: type=1334 audit(1707472044.287:88): prog-id=12 op=LOAD Feb 9 09:47:24.724879 kernel: audit: type=1334 audit(1707472044.289:89): prog-id=3 op=UNLOAD Feb 9 09:47:24.724910 kernel: audit: type=1334 audit(1707472044.292:90): prog-id=13 op=LOAD Feb 9 09:47:24.724937 kernel: audit: type=1334 audit(1707472044.292:91): prog-id=14 op=LOAD Feb 9 09:47:24.724964 kernel: audit: type=1334 audit(1707472044.292:92): prog-id=4 op=UNLOAD Feb 9 09:47:24.724997 kernel: audit: type=1334 audit(1707472044.292:93): prog-id=5 op=UNLOAD Feb 9 09:47:24.725029 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 09:47:24.725062 kernel: audit: type=1334 audit(1707472044.294:94): prog-id=15 op=LOAD Feb 9 09:47:24.725094 systemd[1]: Stopped initrd-switch-root.service. Feb 9 09:47:24.725126 kernel: audit: type=1334 audit(1707472044.294:95): prog-id=12 op=UNLOAD Feb 9 09:47:24.725157 kernel: audit: type=1334 audit(1707472044.297:96): prog-id=16 op=LOAD Feb 9 09:47:24.725185 kernel: audit: type=1334 audit(1707472044.299:97): prog-id=17 op=LOAD Feb 9 09:47:24.725213 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 09:47:24.725243 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 09:47:24.725275 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 09:47:24.725305 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 09:47:24.725336 systemd[1]: Created slice system-getty.slice. Feb 9 09:47:24.725371 systemd[1]: Created slice system-modprobe.slice. Feb 9 09:47:24.725402 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 09:47:24.725453 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 09:47:24.725487 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 09:47:24.725522 systemd[1]: Created slice user.slice. Feb 9 09:47:24.725551 systemd[1]: Started systemd-ask-password-console.path. Feb 9 09:47:24.725581 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 09:47:24.725612 systemd[1]: Set up automount boot.automount. Feb 9 09:47:24.725648 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 09:47:24.725679 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 09:47:24.725710 systemd[1]: Stopped target initrd-fs.target. Feb 9 09:47:24.725740 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 09:47:24.725772 systemd[1]: Reached target integritysetup.target. Feb 9 09:47:24.725802 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 09:47:24.725835 systemd[1]: Reached target remote-fs.target. Feb 9 09:47:24.725865 systemd[1]: Reached target slices.target. Feb 9 09:47:24.725896 systemd[1]: Reached target swap.target. Feb 9 09:47:24.725930 systemd[1]: Reached target torcx.target. Feb 9 09:47:24.725962 systemd[1]: Reached target veritysetup.target. Feb 9 09:47:24.725993 systemd[1]: Listening on systemd-coredump.socket. Feb 9 09:47:24.726022 systemd[1]: Listening on systemd-initctl.socket. Feb 9 09:47:24.726053 systemd[1]: Listening on systemd-networkd.socket. Feb 9 09:47:24.726084 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 09:47:24.726115 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 09:47:24.726146 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 09:47:24.726175 systemd[1]: Mounting dev-hugepages.mount... Feb 9 09:47:24.726206 systemd[1]: Mounting dev-mqueue.mount... Feb 9 09:47:24.726244 systemd[1]: Mounting media.mount... Feb 9 09:47:24.726273 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 09:47:24.726303 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 09:47:24.726334 systemd[1]: Mounting tmp.mount... Feb 9 09:47:24.726364 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 09:47:24.726395 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 09:47:24.726447 systemd[1]: Starting kmod-static-nodes.service... Feb 9 09:47:24.726479 systemd[1]: Starting modprobe@configfs.service... Feb 9 09:47:24.726510 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 09:47:24.730664 systemd[1]: Starting modprobe@drm.service... Feb 9 09:47:24.730754 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 09:47:24.730805 systemd[1]: Starting modprobe@fuse.service... Feb 9 09:47:24.730842 systemd[1]: Starting modprobe@loop.service... Feb 9 09:47:24.730873 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 09:47:24.730904 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 09:47:24.730933 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 09:47:24.730966 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 09:47:24.730996 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 09:47:24.731032 systemd[1]: Stopped systemd-journald.service. Feb 9 09:47:24.731061 systemd[1]: Starting systemd-journald.service... Feb 9 09:47:24.731091 systemd[1]: Starting systemd-modules-load.service... Feb 9 09:47:24.731123 systemd[1]: Starting systemd-network-generator.service... Feb 9 09:47:24.731152 kernel: fuse: init (API version 7.34) Feb 9 09:47:24.731183 systemd[1]: Starting systemd-remount-fs.service... Feb 9 09:47:24.731212 kernel: loop: module loaded Feb 9 09:47:24.731240 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 09:47:24.731269 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 09:47:24.731303 systemd[1]: Stopped verity-setup.service. Feb 9 09:47:24.731333 systemd[1]: Mounted dev-hugepages.mount. Feb 9 09:47:24.731365 systemd[1]: Mounted dev-mqueue.mount. Feb 9 09:47:24.731399 systemd[1]: Mounted media.mount. Feb 9 09:47:24.731485 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 09:47:24.731520 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 09:47:24.731550 systemd[1]: Mounted tmp.mount. Feb 9 09:47:24.731579 systemd[1]: Finished kmod-static-nodes.service. Feb 9 09:47:24.731614 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 09:47:24.731650 systemd[1]: Finished modprobe@configfs.service. Feb 9 09:47:24.731693 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 09:47:24.731725 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 09:47:24.731755 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 09:47:24.731784 systemd[1]: Finished modprobe@drm.service. Feb 9 09:47:24.731820 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 09:47:24.731849 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 09:47:24.731879 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 09:47:24.731912 systemd-journald[1407]: Journal started Feb 9 09:47:24.732011 systemd-journald[1407]: Runtime Journal (/run/log/journal/ec27e34407ea36affe9125c503f86c35) is 8.0M, max 75.4M, 67.4M free. Feb 9 09:47:20.241000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 09:47:20.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 09:47:20.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 09:47:20.416000 audit: BPF prog-id=10 op=LOAD Feb 9 09:47:20.416000 audit: BPF prog-id=10 op=UNLOAD Feb 9 09:47:20.416000 audit: BPF prog-id=11 op=LOAD Feb 9 09:47:20.416000 audit: BPF prog-id=11 op=UNLOAD Feb 9 09:47:20.535000 audit[1329]: AVC avc: denied { associate } for pid=1329 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 09:47:20.535000 audit[1329]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458b2 a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1312 pid=1329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:20.535000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 09:47:20.539000 audit[1329]: AVC avc: denied { associate } for pid=1329 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 09:47:20.539000 audit[1329]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145989 a2=1ed a3=0 items=2 ppid=1312 pid=1329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:20.539000 audit: CWD cwd="/" Feb 9 09:47:20.539000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:47:20.539000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:47:20.539000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 09:47:24.287000 audit: BPF prog-id=12 op=LOAD Feb 9 09:47:24.289000 audit: BPF prog-id=3 op=UNLOAD Feb 9 09:47:24.292000 audit: BPF prog-id=13 op=LOAD Feb 9 09:47:24.292000 audit: BPF prog-id=14 op=LOAD Feb 9 09:47:24.292000 audit: BPF prog-id=4 op=UNLOAD Feb 9 09:47:24.292000 audit: BPF prog-id=5 op=UNLOAD Feb 9 09:47:24.294000 audit: BPF prog-id=15 op=LOAD Feb 9 09:47:24.294000 audit: BPF prog-id=12 op=UNLOAD Feb 9 09:47:24.297000 audit: BPF prog-id=16 op=LOAD Feb 9 09:47:24.299000 audit: BPF prog-id=17 op=LOAD Feb 9 09:47:24.299000 audit: BPF prog-id=13 op=UNLOAD Feb 9 09:47:24.299000 audit: BPF prog-id=14 op=UNLOAD Feb 9 09:47:24.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:24.316000 audit: BPF prog-id=15 op=UNLOAD Feb 9 09:47:24.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:24.321000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:24.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:24.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:24.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:24.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:24.593000 audit: BPF prog-id=18 op=LOAD Feb 9 09:47:24.593000 audit: BPF prog-id=19 op=LOAD Feb 9 09:47:24.593000 audit: BPF prog-id=20 op=LOAD Feb 9 09:47:24.593000 audit: BPF prog-id=16 op=UNLOAD Feb 9 09:47:24.593000 audit: BPF prog-id=17 op=UNLOAD Feb 9 09:47:24.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:24.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:24.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:24.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:24.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:24.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:24.712000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 09:47:24.712000 audit[1407]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=4 a1=fffffdab50c0 a2=4000 a3=1 items=0 ppid=1 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:24.712000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 09:47:24.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:24.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:24.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:24.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:20.532700 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-02-09T09:47:20Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:47:24.284521 systemd[1]: Queued start job for default target multi-user.target. Feb 9 09:47:24.756636 systemd[1]: Finished modprobe@fuse.service. Feb 9 09:47:24.756724 systemd[1]: Started systemd-journald.service. Feb 9 09:47:24.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:24.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:24.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:24.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:24.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:24.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:24.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:20.534148 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-02-09T09:47:20Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 09:47:24.302043 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 09:47:20.534199 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-02-09T09:47:20Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 09:47:24.747387 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 09:47:24.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:20.534267 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-02-09T09:47:20Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 09:47:24.748621 systemd[1]: Finished modprobe@loop.service. Feb 9 09:47:20.534294 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-02-09T09:47:20Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 09:47:24.751515 systemd[1]: Finished systemd-modules-load.service. Feb 9 09:47:20.534366 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-02-09T09:47:20Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 09:47:24.754143 systemd[1]: Finished systemd-network-generator.service. Feb 9 09:47:20.534401 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-02-09T09:47:20Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 09:47:24.757250 systemd[1]: Finished systemd-remount-fs.service. Feb 9 09:47:20.534871 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-02-09T09:47:20Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 09:47:24.760376 systemd[1]: Reached target network-pre.target. Feb 9 09:47:20.534954 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-02-09T09:47:20Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 09:47:20.534990 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-02-09T09:47:20Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 09:47:20.535836 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-02-09T09:47:20Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 09:47:20.535918 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-02-09T09:47:20Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 09:47:20.535963 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-02-09T09:47:20Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 09:47:20.536003 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-02-09T09:47:20Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 09:47:20.536049 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-02-09T09:47:20Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 09:47:20.536087 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-02-09T09:47:20Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 09:47:23.469087 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-02-09T09:47:23Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:47:23.469669 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-02-09T09:47:23Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:47:24.765106 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 09:47:23.469917 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-02-09T09:47:23Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:47:24.772029 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 09:47:23.470361 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-02-09T09:47:23Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:47:24.774019 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 09:47:23.470495 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-02-09T09:47:23Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 09:47:24.777259 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 09:47:23.470632 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-02-09T09:47:23Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 09:47:24.781747 systemd[1]: Starting systemd-journal-flush.service... Feb 9 09:47:24.785280 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 09:47:24.788736 systemd[1]: Starting systemd-random-seed.service... Feb 9 09:47:24.790851 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 09:47:24.793074 systemd[1]: Starting systemd-sysctl.service... Feb 9 09:47:24.800564 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 09:47:24.803218 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 09:47:24.831477 systemd-journald[1407]: Time spent on flushing to /var/log/journal/ec27e34407ea36affe9125c503f86c35 is 85.848ms for 1169 entries. Feb 9 09:47:24.831477 systemd-journald[1407]: System Journal (/var/log/journal/ec27e34407ea36affe9125c503f86c35) is 8.0M, max 195.6M, 187.6M free. Feb 9 09:47:24.955678 systemd-journald[1407]: Received client request to flush runtime journal. Feb 9 09:47:24.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:24.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:24.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:24.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:24.840304 systemd[1]: Finished systemd-random-seed.service. Feb 9 09:47:24.842769 systemd[1]: Reached target first-boot-complete.target. Feb 9 09:47:24.868869 systemd[1]: Finished systemd-sysctl.service. Feb 9 09:47:24.872066 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 09:47:24.876611 systemd[1]: Starting systemd-sysusers.service... Feb 9 09:47:24.942930 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 09:47:24.949621 systemd[1]: Starting systemd-udev-settle.service... Feb 9 09:47:24.957860 systemd[1]: Finished systemd-journal-flush.service. Feb 9 09:47:24.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:24.968011 udevadm[1448]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 09:47:25.006719 systemd[1]: Finished systemd-sysusers.service. Feb 9 09:47:25.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:25.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:25.712559 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 09:47:25.714000 audit: BPF prog-id=21 op=LOAD Feb 9 09:47:25.714000 audit: BPF prog-id=22 op=LOAD Feb 9 09:47:25.714000 audit: BPF prog-id=7 op=UNLOAD Feb 9 09:47:25.714000 audit: BPF prog-id=8 op=UNLOAD Feb 9 09:47:25.716956 systemd[1]: Starting systemd-udevd.service... Feb 9 09:47:25.755128 systemd-udevd[1449]: Using default interface naming scheme 'v252'. Feb 9 09:47:25.787552 systemd[1]: Started systemd-udevd.service. Feb 9 09:47:25.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:25.790000 audit: BPF prog-id=23 op=LOAD Feb 9 09:47:25.792782 systemd[1]: Starting systemd-networkd.service... Feb 9 09:47:25.800000 audit: BPF prog-id=24 op=LOAD Feb 9 09:47:25.800000 audit: BPF prog-id=25 op=LOAD Feb 9 09:47:25.800000 audit: BPF prog-id=26 op=LOAD Feb 9 09:47:25.803597 systemd[1]: Starting systemd-userdbd.service... Feb 9 09:47:25.891663 systemd[1]: Started systemd-userdbd.service. Feb 9 09:47:25.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:25.909820 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 09:47:25.919939 (udev-worker)[1451]: Network interface NamePolicy= disabled on kernel command line. Feb 9 09:47:26.033048 systemd-networkd[1450]: lo: Link UP Feb 9 09:47:26.033612 systemd-networkd[1450]: lo: Gained carrier Feb 9 09:47:26.034685 systemd-networkd[1450]: Enumeration completed Feb 9 09:47:26.035070 systemd[1]: Started systemd-networkd.service. Feb 9 09:47:26.035249 systemd-networkd[1450]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 09:47:26.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:26.041465 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 09:47:26.045644 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:47:26.043174 systemd-networkd[1450]: eth0: Link UP Feb 9 09:47:26.043467 systemd-networkd[1450]: eth0: Gained carrier Feb 9 09:47:26.055645 systemd-networkd[1450]: eth0: DHCPv4 address 172.31.21.69/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 9 09:47:26.114461 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1470) Feb 9 09:47:26.259163 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 09:47:26.263194 systemd[1]: Finished systemd-udev-settle.service. Feb 9 09:47:26.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:26.269323 systemd[1]: Starting lvm2-activation-early.service... Feb 9 09:47:26.296561 lvm[1568]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 09:47:26.336110 systemd[1]: Finished lvm2-activation-early.service. Feb 9 09:47:26.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:26.338954 systemd[1]: Reached target cryptsetup.target. Feb 9 09:47:26.345315 systemd[1]: Starting lvm2-activation.service... Feb 9 09:47:26.352481 lvm[1569]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 09:47:26.386047 systemd[1]: Finished lvm2-activation.service. Feb 9 09:47:26.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:26.388729 systemd[1]: Reached target local-fs-pre.target. Feb 9 09:47:26.391513 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 09:47:26.391572 systemd[1]: Reached target local-fs.target. Feb 9 09:47:26.394223 systemd[1]: Reached target machines.target. Feb 9 09:47:26.398617 systemd[1]: Starting ldconfig.service... Feb 9 09:47:26.400773 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 09:47:26.400901 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 09:47:26.403114 systemd[1]: Starting systemd-boot-update.service... Feb 9 09:47:26.407405 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 09:47:26.414255 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 09:47:26.418309 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 09:47:26.418476 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 09:47:26.420886 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 09:47:26.437482 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1571 (bootctl) Feb 9 09:47:26.439864 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 09:47:26.469711 systemd-tmpfiles[1574]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 09:47:26.476342 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 09:47:26.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:26.480897 systemd-tmpfiles[1574]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 09:47:26.500011 systemd-tmpfiles[1574]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 09:47:26.557348 systemd-fsck[1580]: fsck.fat 4.2 (2021-01-31) Feb 9 09:47:26.557348 systemd-fsck[1580]: /dev/nvme0n1p1: 236 files, 113719/258078 clusters Feb 9 09:47:26.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:26.563475 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 09:47:26.570657 systemd[1]: Mounting boot.mount... Feb 9 09:47:26.593059 systemd[1]: Mounted boot.mount. Feb 9 09:47:26.618145 systemd[1]: Finished systemd-boot-update.service. Feb 9 09:47:26.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:26.821222 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 09:47:26.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:26.826286 systemd[1]: Starting audit-rules.service... Feb 9 09:47:26.833750 systemd[1]: Starting clean-ca-certificates.service... Feb 9 09:47:26.841791 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 09:47:26.845000 audit: BPF prog-id=27 op=LOAD Feb 9 09:47:26.851162 systemd[1]: Starting systemd-resolved.service... Feb 9 09:47:26.853000 audit: BPF prog-id=28 op=LOAD Feb 9 09:47:26.862332 systemd[1]: Starting systemd-timesyncd.service... Feb 9 09:47:26.868967 systemd[1]: Starting systemd-update-utmp.service... Feb 9 09:47:26.878369 systemd[1]: Finished clean-ca-certificates.service. Feb 9 09:47:26.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:26.881056 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 09:47:26.917000 audit[1600]: SYSTEM_BOOT pid=1600 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 09:47:26.925271 systemd[1]: Finished systemd-update-utmp.service. Feb 9 09:47:26.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:27.031203 systemd[1]: Started systemd-timesyncd.service. Feb 9 09:47:27.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:27.033718 systemd[1]: Reached target time-set.target. Feb 9 09:47:27.099337 systemd-resolved[1597]: Positive Trust Anchors: Feb 9 09:47:27.099361 systemd-resolved[1597]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 09:47:27.100058 systemd-resolved[1597]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 09:47:27.143099 systemd-timesyncd[1599]: Contacted time server 152.70.159.102:123 (0.flatcar.pool.ntp.org). Feb 9 09:47:27.144168 systemd-timesyncd[1599]: Initial clock synchronization to Fri 2024-02-09 09:47:27.398997 UTC. Feb 9 09:47:27.147916 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 09:47:27.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:27.185000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 09:47:27.185000 audit[1615]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc1ef1c70 a2=420 a3=0 items=0 ppid=1594 pid=1615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:27.185000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 09:47:27.187182 augenrules[1615]: No rules Feb 9 09:47:27.188818 systemd[1]: Finished audit-rules.service. Feb 9 09:47:27.261510 systemd-resolved[1597]: Defaulting to hostname 'linux'. Feb 9 09:47:27.264647 systemd[1]: Started systemd-resolved.service. Feb 9 09:47:27.266817 systemd[1]: Reached target network.target. Feb 9 09:47:27.269004 systemd[1]: Reached target nss-lookup.target. Feb 9 09:47:27.387604 systemd-networkd[1450]: eth0: Gained IPv6LL Feb 9 09:47:27.392868 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 09:47:27.395731 systemd[1]: Reached target network-online.target. Feb 9 09:47:27.811293 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 09:47:27.812321 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 09:47:27.928859 ldconfig[1570]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 09:47:27.935173 systemd[1]: Finished ldconfig.service. Feb 9 09:47:27.939863 systemd[1]: Starting systemd-update-done.service... Feb 9 09:47:27.955618 systemd[1]: Finished systemd-update-done.service. Feb 9 09:47:27.958030 systemd[1]: Reached target sysinit.target. Feb 9 09:47:27.960404 systemd[1]: Started motdgen.path. Feb 9 09:47:27.962255 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 09:47:27.965213 systemd[1]: Started logrotate.timer. Feb 9 09:47:27.967130 systemd[1]: Started mdadm.timer. Feb 9 09:47:27.968818 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 09:47:27.970895 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 09:47:27.970954 systemd[1]: Reached target paths.target. Feb 9 09:47:27.972746 systemd[1]: Reached target timers.target. Feb 9 09:47:27.975052 systemd[1]: Listening on dbus.socket. Feb 9 09:47:27.978517 systemd[1]: Starting docker.socket... Feb 9 09:47:27.984730 systemd[1]: Listening on sshd.socket. Feb 9 09:47:27.987006 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 09:47:27.988040 systemd[1]: Listening on docker.socket. Feb 9 09:47:27.990288 systemd[1]: Reached target sockets.target. Feb 9 09:47:27.992206 systemd[1]: Reached target basic.target. Feb 9 09:47:27.993995 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 09:47:27.994179 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 09:47:27.996348 systemd[1]: Started amazon-ssm-agent.service. Feb 9 09:47:28.004232 systemd[1]: Starting containerd.service... Feb 9 09:47:28.016542 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 09:47:28.031775 systemd[1]: Starting dbus.service... Feb 9 09:47:28.041341 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 09:47:28.059796 systemd[1]: Starting extend-filesystems.service... Feb 9 09:47:28.063838 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 09:47:28.070036 systemd[1]: Starting motdgen.service... Feb 9 09:47:28.077486 systemd[1]: Started nvidia.service. Feb 9 09:47:28.096131 jq[1628]: false Feb 9 09:47:28.085394 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 09:47:28.092648 systemd[1]: Starting prepare-critools.service... Feb 9 09:47:28.116652 systemd[1]: Starting prepare-helm.service... Feb 9 09:47:28.126144 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 09:47:28.136048 systemd[1]: Starting sshd-keygen.service... Feb 9 09:47:28.145243 systemd[1]: Starting systemd-logind.service... Feb 9 09:47:28.149761 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 09:47:28.149925 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 09:47:28.152172 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 09:47:28.153955 systemd[1]: Starting update-engine.service... Feb 9 09:47:28.160265 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 09:47:28.169708 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 09:47:28.170109 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 09:47:28.210834 tar[1650]: ./ Feb 9 09:47:28.210834 tar[1650]: ./loopback Feb 9 09:47:28.177364 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 09:47:28.177802 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 09:47:28.237256 jq[1647]: true Feb 9 09:47:28.253773 tar[1651]: crictl Feb 9 09:47:28.256194 tar[1653]: linux-arm64/helm Feb 9 09:47:28.298417 dbus-daemon[1627]: [system] SELinux support is enabled Feb 9 09:47:28.300812 jq[1664]: true Feb 9 09:47:28.307930 systemd[1]: Started dbus.service. Feb 9 09:47:28.315038 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 09:47:28.315102 systemd[1]: Reached target system-config.target. Feb 9 09:47:28.319554 dbus-daemon[1627]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1450 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Feb 9 09:47:28.319669 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 09:47:28.319715 systemd[1]: Reached target user-config.target. Feb 9 09:47:28.323018 extend-filesystems[1629]: Found nvme0n1 Feb 9 09:47:28.327167 extend-filesystems[1629]: Found nvme0n1p1 Feb 9 09:47:28.327167 extend-filesystems[1629]: Found nvme0n1p2 Feb 9 09:47:28.327167 extend-filesystems[1629]: Found nvme0n1p3 Feb 9 09:47:28.327167 extend-filesystems[1629]: Found usr Feb 9 09:47:28.327167 extend-filesystems[1629]: Found nvme0n1p4 Feb 9 09:47:28.327167 extend-filesystems[1629]: Found nvme0n1p6 Feb 9 09:47:28.327167 extend-filesystems[1629]: Found nvme0n1p7 Feb 9 09:47:28.327167 extend-filesystems[1629]: Found nvme0n1p9 Feb 9 09:47:28.327167 extend-filesystems[1629]: Checking size of /dev/nvme0n1p9 Feb 9 09:47:28.334719 dbus-daemon[1627]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 09:47:28.358271 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 09:47:28.358618 systemd[1]: Finished motdgen.service. Feb 9 09:47:28.376795 systemd[1]: Starting systemd-hostnamed.service... Feb 9 09:47:28.504155 extend-filesystems[1629]: Resized partition /dev/nvme0n1p9 Feb 9 09:47:28.514868 extend-filesystems[1693]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 09:47:28.540659 update_engine[1645]: I0209 09:47:28.539692 1645 main.cc:92] Flatcar Update Engine starting Feb 9 09:47:28.554518 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Feb 9 09:47:28.559540 systemd[1]: Started update-engine.service. Feb 9 09:47:28.560109 update_engine[1645]: I0209 09:47:28.560050 1645 update_check_scheduler.cc:74] Next update check in 6m46s Feb 9 09:47:28.566901 systemd[1]: Started locksmithd.service. Feb 9 09:47:28.632756 amazon-ssm-agent[1624]: 2024/02/09 09:47:28 Failed to load instance info from vault. RegistrationKey does not exist. Feb 9 09:47:28.637481 amazon-ssm-agent[1624]: Initializing new seelog logger Feb 9 09:47:28.639535 amazon-ssm-agent[1624]: New Seelog Logger Creation Complete Feb 9 09:47:28.648075 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Feb 9 09:47:28.669155 amazon-ssm-agent[1624]: 2024/02/09 09:47:28 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Feb 9 09:47:28.669155 amazon-ssm-agent[1624]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Feb 9 09:47:28.669155 amazon-ssm-agent[1624]: 2024/02/09 09:47:28 processing appconfig overrides Feb 9 09:47:28.670550 extend-filesystems[1693]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Feb 9 09:47:28.670550 extend-filesystems[1693]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 9 09:47:28.670550 extend-filesystems[1693]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Feb 9 09:47:28.716675 extend-filesystems[1629]: Resized filesystem in /dev/nvme0n1p9 Feb 9 09:47:28.722124 tar[1650]: ./bandwidth Feb 9 09:47:28.722198 env[1656]: time="2024-02-09T09:47:28.675130000Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 09:47:28.682203 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 09:47:28.728498 bash[1696]: Updated "/home/core/.ssh/authorized_keys" Feb 9 09:47:28.682567 systemd[1]: Finished extend-filesystems.service. Feb 9 09:47:28.695767 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 09:47:28.805936 systemd[1]: nvidia.service: Deactivated successfully. Feb 9 09:47:28.813085 systemd-logind[1641]: Watching system buttons on /dev/input/event0 (Power Button) Feb 9 09:47:28.815626 systemd-logind[1641]: New seat seat0. Feb 9 09:47:28.820374 systemd[1]: Started systemd-logind.service. Feb 9 09:47:28.889923 tar[1650]: ./ptp Feb 9 09:47:28.924151 env[1656]: time="2024-02-09T09:47:28.924022257Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 09:47:28.924418 env[1656]: time="2024-02-09T09:47:28.924360641Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:47:28.928595 env[1656]: time="2024-02-09T09:47:28.928512907Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 09:47:28.928595 env[1656]: time="2024-02-09T09:47:28.928588339Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:47:28.929106 env[1656]: time="2024-02-09T09:47:28.929026241Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 09:47:28.929106 env[1656]: time="2024-02-09T09:47:28.929094230Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 09:47:28.929250 env[1656]: time="2024-02-09T09:47:28.929129512Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 09:47:28.929250 env[1656]: time="2024-02-09T09:47:28.929155110Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 09:47:28.929375 env[1656]: time="2024-02-09T09:47:28.929351856Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:47:28.929926 env[1656]: time="2024-02-09T09:47:28.929874800Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:47:28.930248 env[1656]: time="2024-02-09T09:47:28.930184922Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 09:47:28.930327 env[1656]: time="2024-02-09T09:47:28.930244230Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 09:47:28.930421 env[1656]: time="2024-02-09T09:47:28.930377854Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 09:47:28.930528 env[1656]: time="2024-02-09T09:47:28.930413929Z" level=info msg="metadata content store policy set" policy=shared Feb 9 09:47:28.940079 env[1656]: time="2024-02-09T09:47:28.940006769Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 09:47:28.940233 env[1656]: time="2024-02-09T09:47:28.940087563Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 09:47:28.940233 env[1656]: time="2024-02-09T09:47:28.940129334Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 09:47:28.940406 env[1656]: time="2024-02-09T09:47:28.940357041Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 09:47:28.940749 env[1656]: time="2024-02-09T09:47:28.940697492Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 09:47:28.940826 env[1656]: time="2024-02-09T09:47:28.940755574Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 09:47:28.940826 env[1656]: time="2024-02-09T09:47:28.940794646Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 09:47:28.941349 env[1656]: time="2024-02-09T09:47:28.941300041Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 09:47:28.941427 env[1656]: time="2024-02-09T09:47:28.941352785Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 09:47:28.941427 env[1656]: time="2024-02-09T09:47:28.941390172Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 09:47:28.941593 env[1656]: time="2024-02-09T09:47:28.941425529Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 09:47:28.941593 env[1656]: time="2024-02-09T09:47:28.941503338Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 09:47:28.941786 env[1656]: time="2024-02-09T09:47:28.941741485Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 09:47:28.941979 env[1656]: time="2024-02-09T09:47:28.941935271Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 09:47:28.942391 env[1656]: time="2024-02-09T09:47:28.942347848Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 09:47:28.942483 env[1656]: time="2024-02-09T09:47:28.942406858Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 09:47:28.942570 env[1656]: time="2024-02-09T09:47:28.942505683Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 09:47:28.942633 env[1656]: time="2024-02-09T09:47:28.942609487Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 09:47:28.942691 env[1656]: time="2024-02-09T09:47:28.942641623Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 09:47:28.942691 env[1656]: time="2024-02-09T09:47:28.942675940Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 09:47:28.942800 env[1656]: time="2024-02-09T09:47:28.942705662Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 09:47:28.942800 env[1656]: time="2024-02-09T09:47:28.942736164Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 09:47:28.942800 env[1656]: time="2024-02-09T09:47:28.942776202Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 09:47:28.942969 env[1656]: time="2024-02-09T09:47:28.942806629Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 09:47:28.942969 env[1656]: time="2024-02-09T09:47:28.942836698Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 09:47:28.942969 env[1656]: time="2024-02-09T09:47:28.942870123Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 09:47:28.943182 env[1656]: time="2024-02-09T09:47:28.943136926Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 09:47:28.943252 env[1656]: time="2024-02-09T09:47:28.943184555Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 09:47:28.943252 env[1656]: time="2024-02-09T09:47:28.943218302Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 09:47:28.943363 env[1656]: time="2024-02-09T09:47:28.943249064Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 09:47:28.943363 env[1656]: time="2024-02-09T09:47:28.943283232Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 09:47:28.943363 env[1656]: time="2024-02-09T09:47:28.943314192Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 09:47:28.943363 env[1656]: time="2024-02-09T09:47:28.943351245Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 09:47:28.943741 env[1656]: time="2024-02-09T09:47:28.943416249Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 09:47:28.948436 env[1656]: time="2024-02-09T09:47:28.948272738Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 09:47:28.948436 env[1656]: time="2024-02-09T09:47:28.948421484Z" level=info msg="Connect containerd service" Feb 9 09:47:28.949637 env[1656]: time="2024-02-09T09:47:28.948522414Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 09:47:28.958481 env[1656]: time="2024-02-09T09:47:28.958395010Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 09:47:28.961475 env[1656]: time="2024-02-09T09:47:28.959648777Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 09:47:28.961475 env[1656]: time="2024-02-09T09:47:28.959775962Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 09:47:28.959999 systemd[1]: Started containerd.service. Feb 9 09:47:28.964802 env[1656]: time="2024-02-09T09:47:28.964719598Z" level=info msg="containerd successfully booted in 0.352849s" Feb 9 09:47:28.964936 env[1656]: time="2024-02-09T09:47:28.964873186Z" level=info msg="Start subscribing containerd event" Feb 9 09:47:28.964997 env[1656]: time="2024-02-09T09:47:28.964963094Z" level=info msg="Start recovering state" Feb 9 09:47:28.965201 env[1656]: time="2024-02-09T09:47:28.965148633Z" level=info msg="Start event monitor" Feb 9 09:47:28.965278 env[1656]: time="2024-02-09T09:47:28.965236981Z" level=info msg="Start snapshots syncer" Feb 9 09:47:28.965337 env[1656]: time="2024-02-09T09:47:28.965270876Z" level=info msg="Start cni network conf syncer for default" Feb 9 09:47:28.965337 env[1656]: time="2024-02-09T09:47:28.965293056Z" level=info msg="Start streaming server" Feb 9 09:47:29.085250 dbus-daemon[1627]: [system] Successfully activated service 'org.freedesktop.hostname1' Feb 9 09:47:29.085584 systemd[1]: Started systemd-hostnamed.service. Feb 9 09:47:29.086726 dbus-daemon[1627]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1674 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Feb 9 09:47:29.095038 systemd[1]: Starting polkit.service... Feb 9 09:47:29.143164 polkitd[1756]: Started polkitd version 121 Feb 9 09:47:29.158380 tar[1650]: ./vlan Feb 9 09:47:29.174182 polkitd[1756]: Loading rules from directory /etc/polkit-1/rules.d Feb 9 09:47:29.174311 polkitd[1756]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 9 09:47:29.181071 polkitd[1756]: Finished loading, compiling and executing 2 rules Feb 9 09:47:29.183971 dbus-daemon[1627]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Feb 9 09:47:29.184251 systemd[1]: Started polkit.service. Feb 9 09:47:29.188679 polkitd[1756]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 9 09:47:29.230611 systemd-resolved[1597]: System hostname changed to 'ip-172-31-21-69'. Feb 9 09:47:29.230626 systemd-hostnamed[1674]: Hostname set to (transient) Feb 9 09:47:29.331028 tar[1650]: ./host-device Feb 9 09:47:29.499694 coreos-metadata[1626]: Feb 09 09:47:29.498 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Feb 9 09:47:29.516102 coreos-metadata[1626]: Feb 09 09:47:29.515 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Feb 9 09:47:29.518160 coreos-metadata[1626]: Feb 09 09:47:29.517 INFO Fetch successful Feb 9 09:47:29.518616 coreos-metadata[1626]: Feb 09 09:47:29.518 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Feb 9 09:47:29.520769 coreos-metadata[1626]: Feb 09 09:47:29.520 INFO Fetch successful Feb 9 09:47:29.526419 unknown[1626]: wrote ssh authorized keys file for user: core Feb 9 09:47:29.536195 tar[1650]: ./tuning Feb 9 09:47:29.554828 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO Create new startup processor Feb 9 09:47:29.570206 update-ssh-keys[1802]: Updated "/home/core/.ssh/authorized_keys" Feb 9 09:47:29.571750 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 09:47:29.576791 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [LongRunningPluginsManager] registered plugins: {} Feb 9 09:47:29.577526 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO Initializing bookkeeping folders Feb 9 09:47:29.577859 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO removing the completed state files Feb 9 09:47:29.577986 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO Initializing bookkeeping folders for long running plugins Feb 9 09:47:29.578244 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Feb 9 09:47:29.578605 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO Initializing healthcheck folders for long running plugins Feb 9 09:47:29.579010 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO Initializing locations for inventory plugin Feb 9 09:47:29.579154 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO Initializing default location for custom inventory Feb 9 09:47:29.579455 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO Initializing default location for file inventory Feb 9 09:47:29.579889 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO Initializing default location for role inventory Feb 9 09:47:29.580023 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO Init the cloudwatchlogs publisher Feb 9 09:47:29.580520 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [instanceID=i-0315e41be1981fb81] Successfully loaded platform independent plugin aws:configureDocker Feb 9 09:47:29.580852 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [instanceID=i-0315e41be1981fb81] Successfully loaded platform independent plugin aws:refreshAssociation Feb 9 09:47:29.580976 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [instanceID=i-0315e41be1981fb81] Successfully loaded platform independent plugin aws:runDocument Feb 9 09:47:29.581790 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [instanceID=i-0315e41be1981fb81] Successfully loaded platform independent plugin aws:runPowerShellScript Feb 9 09:47:29.581975 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [instanceID=i-0315e41be1981fb81] Successfully loaded platform independent plugin aws:updateSsmAgent Feb 9 09:47:29.582249 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [instanceID=i-0315e41be1981fb81] Successfully loaded platform independent plugin aws:runDockerAction Feb 9 09:47:29.582384 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [instanceID=i-0315e41be1981fb81] Successfully loaded platform independent plugin aws:configurePackage Feb 9 09:47:29.582772 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [instanceID=i-0315e41be1981fb81] Successfully loaded platform independent plugin aws:downloadContent Feb 9 09:47:29.583213 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [instanceID=i-0315e41be1981fb81] Successfully loaded platform independent plugin aws:softwareInventory Feb 9 09:47:29.583338 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [instanceID=i-0315e41be1981fb81] Successfully loaded platform dependent plugin aws:runShellScript Feb 9 09:47:29.583693 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Feb 9 09:47:29.585048 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO OS: linux, Arch: arm64 Feb 9 09:47:29.600195 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [MessagingDeliveryService] Starting document processing engine... Feb 9 09:47:29.660188 amazon-ssm-agent[1624]: datastore file /var/lib/amazon/ssm/i-0315e41be1981fb81/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Feb 9 09:47:29.707774 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [MessagingDeliveryService] [EngineProcessor] Starting Feb 9 09:47:29.745693 tar[1650]: ./vrf Feb 9 09:47:29.803000 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Feb 9 09:47:29.863433 tar[1650]: ./sbr Feb 9 09:47:29.898065 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [MessagingDeliveryService] Starting message polling Feb 9 09:47:29.963464 tar[1650]: ./tap Feb 9 09:47:29.992809 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [MessagingDeliveryService] Starting send replies to MDS Feb 9 09:47:30.087789 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [instanceID=i-0315e41be1981fb81] Starting association polling Feb 9 09:47:30.099003 tar[1650]: ./dhcp Feb 9 09:47:30.182866 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Feb 9 09:47:30.278184 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [MessagingDeliveryService] [Association] Launching response handler Feb 9 09:47:30.373746 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Feb 9 09:47:30.440830 tar[1650]: ./static Feb 9 09:47:30.469399 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Feb 9 09:47:30.539105 tar[1650]: ./firewall Feb 9 09:47:30.565316 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Feb 9 09:47:30.623237 tar[1653]: linux-arm64/LICENSE Feb 9 09:47:30.623860 tar[1653]: linux-arm64/README.md Feb 9 09:47:30.642233 systemd[1]: Finished prepare-helm.service. Feb 9 09:47:30.661455 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [HealthCheck] HealthCheck reporting agent health. Feb 9 09:47:30.683874 tar[1650]: ./macvlan Feb 9 09:47:30.757725 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [MessageGatewayService] Starting session document processing engine... Feb 9 09:47:30.777328 systemd[1]: Finished prepare-critools.service. Feb 9 09:47:30.802640 tar[1650]: ./dummy Feb 9 09:47:30.854215 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [MessageGatewayService] [EngineProcessor] Starting Feb 9 09:47:30.867383 tar[1650]: ./bridge Feb 9 09:47:30.937618 tar[1650]: ./ipvlan Feb 9 09:47:30.950892 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Feb 9 09:47:31.002151 tar[1650]: ./portmap Feb 9 09:47:31.047778 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0315e41be1981fb81, requestId: eddec6bb-c702-48a2-ab70-d40260dd1939 Feb 9 09:47:31.064279 tar[1650]: ./host-local Feb 9 09:47:31.140247 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 09:47:31.144855 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [OfflineService] Starting document processing engine... Feb 9 09:47:31.215996 locksmithd[1703]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 09:47:31.242114 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [OfflineService] [EngineProcessor] Starting Feb 9 09:47:31.252438 sshd_keygen[1666]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 09:47:31.288747 systemd[1]: Finished sshd-keygen.service. Feb 9 09:47:31.293811 systemd[1]: Starting issuegen.service... Feb 9 09:47:31.305199 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 09:47:31.305591 systemd[1]: Finished issuegen.service. Feb 9 09:47:31.310575 systemd[1]: Starting systemd-user-sessions.service... Feb 9 09:47:31.325030 systemd[1]: Finished systemd-user-sessions.service. Feb 9 09:47:31.330202 systemd[1]: Started getty@tty1.service. Feb 9 09:47:31.335354 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 09:47:31.337949 systemd[1]: Reached target getty.target. Feb 9 09:47:31.340021 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [OfflineService] [EngineProcessor] Initial processing Feb 9 09:47:31.340229 systemd[1]: Reached target multi-user.target. Feb 9 09:47:31.345068 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 09:47:31.360640 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 09:47:31.361030 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 09:47:31.366027 systemd[1]: Startup finished in 1.139s (kernel) + 11.542s (initrd) + 11.231s (userspace) = 23.913s. Feb 9 09:47:31.438391 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [OfflineService] Starting message polling Feb 9 09:47:31.537503 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [OfflineService] Starting send replies to MDS Feb 9 09:47:31.637481 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [LongRunningPluginsManager] starting long running plugin manager Feb 9 09:47:31.736742 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [MessageGatewayService] listening reply. Feb 9 09:47:31.836903 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [StartupProcessor] Executing startup processor tasks Feb 9 09:47:31.936090 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Feb 9 09:47:32.036991 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Feb 9 09:47:32.136344 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.2 Feb 9 09:47:32.236370 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Feb 9 09:47:32.337601 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Feb 9 09:47:32.437854 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0315e41be1981fb81?role=subscribe&stream=input Feb 9 09:47:32.538159 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0315e41be1981fb81?role=subscribe&stream=input Feb 9 09:47:32.638181 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [MessageGatewayService] Starting receiving message from control channel Feb 9 09:47:32.738951 amazon-ssm-agent[1624]: 2024-02-09 09:47:29 INFO [MessageGatewayService] [EngineProcessor] Initial processing Feb 9 09:47:36.416524 systemd[1]: Created slice system-sshd.slice. Feb 9 09:47:36.418961 systemd[1]: Started sshd@0-172.31.21.69:22-139.178.89.65:48362.service. Feb 9 09:47:36.436457 amazon-ssm-agent[1624]: 2024-02-09 09:47:36 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Feb 9 09:47:36.602240 sshd[1842]: Accepted publickey for core from 139.178.89.65 port 48362 ssh2: RSA SHA256:1++YWC0h0fEpfkRPeemtMi9ARVJF0YKl/HjB0qv5R1M Feb 9 09:47:36.606704 sshd[1842]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:47:36.623661 systemd[1]: Created slice user-500.slice. Feb 9 09:47:36.626781 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 09:47:36.633665 systemd-logind[1641]: New session 1 of user core. Feb 9 09:47:36.647074 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 09:47:36.651374 systemd[1]: Starting user@500.service... Feb 9 09:47:36.657764 (systemd)[1845]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:47:36.833462 systemd[1845]: Queued start job for default target default.target. Feb 9 09:47:36.835002 systemd[1845]: Reached target paths.target. Feb 9 09:47:36.835226 systemd[1845]: Reached target sockets.target. Feb 9 09:47:36.835391 systemd[1845]: Reached target timers.target. Feb 9 09:47:36.835625 systemd[1845]: Reached target basic.target. Feb 9 09:47:36.835871 systemd[1845]: Reached target default.target. Feb 9 09:47:36.835959 systemd[1]: Started user@500.service. Feb 9 09:47:36.836173 systemd[1845]: Startup finished in 166ms. Feb 9 09:47:36.840254 systemd[1]: Started session-1.scope. Feb 9 09:47:36.991962 systemd[1]: Started sshd@1-172.31.21.69:22-139.178.89.65:48370.service. Feb 9 09:47:37.173253 sshd[1854]: Accepted publickey for core from 139.178.89.65 port 48370 ssh2: RSA SHA256:1++YWC0h0fEpfkRPeemtMi9ARVJF0YKl/HjB0qv5R1M Feb 9 09:47:37.176272 sshd[1854]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:47:37.185253 systemd[1]: Started session-2.scope. Feb 9 09:47:37.186627 systemd-logind[1641]: New session 2 of user core. Feb 9 09:47:37.319961 sshd[1854]: pam_unix(sshd:session): session closed for user core Feb 9 09:47:37.325324 systemd-logind[1641]: Session 2 logged out. Waiting for processes to exit. Feb 9 09:47:37.325908 systemd[1]: sshd@1-172.31.21.69:22-139.178.89.65:48370.service: Deactivated successfully. Feb 9 09:47:37.327135 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 09:47:37.328651 systemd-logind[1641]: Removed session 2. Feb 9 09:47:37.347943 systemd[1]: Started sshd@2-172.31.21.69:22-139.178.89.65:48372.service. Feb 9 09:47:37.521199 sshd[1860]: Accepted publickey for core from 139.178.89.65 port 48372 ssh2: RSA SHA256:1++YWC0h0fEpfkRPeemtMi9ARVJF0YKl/HjB0qv5R1M Feb 9 09:47:37.524133 sshd[1860]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:47:37.531962 systemd-logind[1641]: New session 3 of user core. Feb 9 09:47:37.532829 systemd[1]: Started session-3.scope. Feb 9 09:47:37.656859 sshd[1860]: pam_unix(sshd:session): session closed for user core Feb 9 09:47:37.661774 systemd[1]: sshd@2-172.31.21.69:22-139.178.89.65:48372.service: Deactivated successfully. Feb 9 09:47:37.663000 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 09:47:37.664220 systemd-logind[1641]: Session 3 logged out. Waiting for processes to exit. Feb 9 09:47:37.665863 systemd-logind[1641]: Removed session 3. Feb 9 09:47:37.685331 systemd[1]: Started sshd@3-172.31.21.69:22-139.178.89.65:48380.service. Feb 9 09:47:37.856080 sshd[1866]: Accepted publickey for core from 139.178.89.65 port 48380 ssh2: RSA SHA256:1++YWC0h0fEpfkRPeemtMi9ARVJF0YKl/HjB0qv5R1M Feb 9 09:47:37.859035 sshd[1866]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:47:37.867628 systemd[1]: Started session-4.scope. Feb 9 09:47:37.868373 systemd-logind[1641]: New session 4 of user core. Feb 9 09:47:37.998890 sshd[1866]: pam_unix(sshd:session): session closed for user core Feb 9 09:47:38.004659 systemd-logind[1641]: Session 4 logged out. Waiting for processes to exit. Feb 9 09:47:38.004720 systemd[1]: sshd@3-172.31.21.69:22-139.178.89.65:48380.service: Deactivated successfully. Feb 9 09:47:38.005924 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 09:47:38.007968 systemd-logind[1641]: Removed session 4. Feb 9 09:47:38.027551 systemd[1]: Started sshd@4-172.31.21.69:22-139.178.89.65:49840.service. Feb 9 09:47:38.204153 sshd[1872]: Accepted publickey for core from 139.178.89.65 port 49840 ssh2: RSA SHA256:1++YWC0h0fEpfkRPeemtMi9ARVJF0YKl/HjB0qv5R1M Feb 9 09:47:38.206669 sshd[1872]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:47:38.214063 systemd-logind[1641]: New session 5 of user core. Feb 9 09:47:38.214952 systemd[1]: Started session-5.scope. Feb 9 09:47:38.331954 sudo[1875]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 09:47:38.332515 sudo[1875]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:47:38.342702 dbus-daemon[1627]: avc: received setenforce notice (enforcing=1) Feb 9 09:47:38.345457 sudo[1875]: pam_unix(sudo:session): session closed for user root Feb 9 09:47:38.370553 sshd[1872]: pam_unix(sshd:session): session closed for user core Feb 9 09:47:38.375316 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 09:47:38.376649 systemd-logind[1641]: Session 5 logged out. Waiting for processes to exit. Feb 9 09:47:38.377013 systemd[1]: sshd@4-172.31.21.69:22-139.178.89.65:49840.service: Deactivated successfully. Feb 9 09:47:38.380308 systemd-logind[1641]: Removed session 5. Feb 9 09:47:38.398708 systemd[1]: Started sshd@5-172.31.21.69:22-139.178.89.65:49848.service. Feb 9 09:47:38.571655 sshd[1879]: Accepted publickey for core from 139.178.89.65 port 49848 ssh2: RSA SHA256:1++YWC0h0fEpfkRPeemtMi9ARVJF0YKl/HjB0qv5R1M Feb 9 09:47:38.574991 sshd[1879]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:47:38.583040 systemd-logind[1641]: New session 6 of user core. Feb 9 09:47:38.583908 systemd[1]: Started session-6.scope. Feb 9 09:47:38.691840 sudo[1883]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 09:47:38.692934 sudo[1883]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:47:38.698372 sudo[1883]: pam_unix(sudo:session): session closed for user root Feb 9 09:47:38.707460 sudo[1882]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 09:47:38.708520 sudo[1882]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:47:38.725627 systemd[1]: Stopping audit-rules.service... Feb 9 09:47:38.726000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 09:47:38.730099 kernel: kauditd_printk_skb: 71 callbacks suppressed Feb 9 09:47:38.730248 kernel: audit: type=1305 audit(1707472058.726:165): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 09:47:38.730640 auditctl[1886]: No rules Feb 9 09:47:38.735739 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 09:47:38.736093 systemd[1]: Stopped audit-rules.service. Feb 9 09:47:38.726000 audit[1886]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffdc7ad70 a2=420 a3=0 items=0 ppid=1 pid=1886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:38.747475 kernel: audit: type=1300 audit(1707472058.726:165): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffdc7ad70 a2=420 a3=0 items=0 ppid=1 pid=1886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:38.743817 systemd[1]: Starting audit-rules.service... Feb 9 09:47:38.726000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 09:47:38.753463 kernel: audit: type=1327 audit(1707472058.726:165): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 09:47:38.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:38.761718 kernel: audit: type=1131 audit(1707472058.735:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:38.778042 augenrules[1903]: No rules Feb 9 09:47:38.779758 systemd[1]: Finished audit-rules.service. Feb 9 09:47:38.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:38.789275 sudo[1882]: pam_unix(sudo:session): session closed for user root Feb 9 09:47:38.787000 audit[1882]: USER_END pid=1882 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:47:38.799399 kernel: audit: type=1130 audit(1707472058.779:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:38.799535 kernel: audit: type=1106 audit(1707472058.787:168): pid=1882 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:47:38.788000 audit[1882]: CRED_DISP pid=1882 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:47:38.807691 kernel: audit: type=1104 audit(1707472058.788:169): pid=1882 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:47:38.812604 sshd[1879]: pam_unix(sshd:session): session closed for user core Feb 9 09:47:38.813000 audit[1879]: USER_END pid=1879 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:47:38.813000 audit[1879]: CRED_DISP pid=1879 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:47:38.817383 systemd[1]: sshd@5-172.31.21.69:22-139.178.89.65:49848.service: Deactivated successfully. Feb 9 09:47:38.818622 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 09:47:38.828776 systemd-logind[1641]: Session 6 logged out. Waiting for processes to exit. Feb 9 09:47:38.841202 kernel: audit: type=1106 audit(1707472058.813:170): pid=1879 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:47:38.841326 kernel: audit: type=1104 audit(1707472058.813:171): pid=1879 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:47:38.841385 kernel: audit: type=1131 audit(1707472058.816:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.21.69:22-139.178.89.65:49848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:38.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.21.69:22-139.178.89.65:49848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:38.839759 systemd[1]: Started sshd@6-172.31.21.69:22-139.178.89.65:49852.service. Feb 9 09:47:38.848435 systemd-logind[1641]: Removed session 6. Feb 9 09:47:38.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.21.69:22-139.178.89.65:49852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:39.013000 audit[1909]: USER_ACCT pid=1909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:47:39.014391 sshd[1909]: Accepted publickey for core from 139.178.89.65 port 49852 ssh2: RSA SHA256:1++YWC0h0fEpfkRPeemtMi9ARVJF0YKl/HjB0qv5R1M Feb 9 09:47:39.015000 audit[1909]: CRED_ACQ pid=1909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:47:39.015000 audit[1909]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd6af67d0 a2=3 a3=1 items=0 ppid=1 pid=1909 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:39.015000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:47:39.017332 sshd[1909]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:47:39.024520 systemd-logind[1641]: New session 7 of user core. Feb 9 09:47:39.026063 systemd[1]: Started session-7.scope. Feb 9 09:47:39.034000 audit[1909]: USER_START pid=1909 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:47:39.036000 audit[1911]: CRED_ACQ pid=1911 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:47:39.130000 audit[1912]: USER_ACCT pid=1912 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:47:39.131487 sudo[1912]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 09:47:39.131000 audit[1912]: CRED_REFR pid=1912 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:47:39.132868 sudo[1912]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:47:39.135000 audit[1912]: USER_START pid=1912 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:47:39.811663 systemd[1]: Starting docker.service... Feb 9 09:47:39.883391 env[1927]: time="2024-02-09T09:47:39.883293064Z" level=info msg="Starting up" Feb 9 09:47:39.885766 env[1927]: time="2024-02-09T09:47:39.885716683Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 09:47:39.885937 env[1927]: time="2024-02-09T09:47:39.885908393Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 09:47:39.886071 env[1927]: time="2024-02-09T09:47:39.886038755Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 09:47:39.886207 env[1927]: time="2024-02-09T09:47:39.886180322Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 09:47:39.889992 env[1927]: time="2024-02-09T09:47:39.889946687Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 09:47:39.890175 env[1927]: time="2024-02-09T09:47:39.890145021Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 09:47:39.890301 env[1927]: time="2024-02-09T09:47:39.890271055Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 09:47:39.890446 env[1927]: time="2024-02-09T09:47:39.890399809Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 09:47:39.900572 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport4118797275-merged.mount: Deactivated successfully. Feb 9 09:47:39.945494 env[1927]: time="2024-02-09T09:47:39.945375503Z" level=info msg="Loading containers: start." Feb 9 09:47:40.018000 audit[1957]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1957 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:47:40.018000 audit[1957]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffdc27ea00 a2=0 a3=1 items=0 ppid=1927 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:40.018000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 09:47:40.022000 audit[1959]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1959 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:47:40.022000 audit[1959]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffe3a33930 a2=0 a3=1 items=0 ppid=1927 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:40.022000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 09:47:40.025000 audit[1961]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1961 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:47:40.025000 audit[1961]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffff804b100 a2=0 a3=1 items=0 ppid=1927 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:40.025000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 09:47:40.029000 audit[1963]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1963 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:47:40.029000 audit[1963]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffff4f0f0a0 a2=0 a3=1 items=0 ppid=1927 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:40.029000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 09:47:40.034000 audit[1965]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1965 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:47:40.034000 audit[1965]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe6168850 a2=0 a3=1 items=0 ppid=1927 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:40.034000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 09:47:40.062000 audit[1970]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1970 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:47:40.062000 audit[1970]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffa338300 a2=0 a3=1 items=0 ppid=1927 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:40.062000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 09:47:40.090000 audit[1972]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1972 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:47:40.090000 audit[1972]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff69e3890 a2=0 a3=1 items=0 ppid=1927 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:40.090000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 09:47:40.094000 audit[1974]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1974 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:47:40.094000 audit[1974]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffd09ac560 a2=0 a3=1 items=0 ppid=1927 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:40.094000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 09:47:40.098000 audit[1976]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1976 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:47:40.098000 audit[1976]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=fffff6d7ead0 a2=0 a3=1 items=0 ppid=1927 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:40.098000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 09:47:40.113000 audit[1980]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1980 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:47:40.113000 audit[1980]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff909d2b0 a2=0 a3=1 items=0 ppid=1927 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:40.113000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 09:47:40.115000 audit[1981]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1981 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:47:40.115000 audit[1981]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffd1d5c9a0 a2=0 a3=1 items=0 ppid=1927 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:40.115000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 09:47:40.126461 kernel: Initializing XFRM netlink socket Feb 9 09:47:40.168564 env[1927]: time="2024-02-09T09:47:40.168487651Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 09:47:40.170197 (udev-worker)[1937]: Network interface NamePolicy= disabled on kernel command line. Feb 9 09:47:40.200000 audit[1990]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1990 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:47:40.200000 audit[1990]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffdb955070 a2=0 a3=1 items=0 ppid=1927 pid=1990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:40.200000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 09:47:40.215000 audit[1993]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1993 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:47:40.215000 audit[1993]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=fffff39def10 a2=0 a3=1 items=0 ppid=1927 pid=1993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:40.215000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 09:47:40.222000 audit[1996]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1996 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:47:40.222000 audit[1996]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff34e3190 a2=0 a3=1 items=0 ppid=1927 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:40.222000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 09:47:40.226000 audit[1998]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1998 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:47:40.226000 audit[1998]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff959b920 a2=0 a3=1 items=0 ppid=1927 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:40.226000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 09:47:40.231000 audit[2000]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2000 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:47:40.231000 audit[2000]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffd21edbe0 a2=0 a3=1 items=0 ppid=1927 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:40.231000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 09:47:40.235000 audit[2002]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2002 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:47:40.235000 audit[2002]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffc99fa6f0 a2=0 a3=1 items=0 ppid=1927 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:40.235000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 09:47:40.241000 audit[2004]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2004 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:47:40.241000 audit[2004]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffdbff1eb0 a2=0 a3=1 items=0 ppid=1927 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:40.241000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 09:47:40.254000 audit[2007]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2007 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:47:40.254000 audit[2007]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=fffff88b95c0 a2=0 a3=1 items=0 ppid=1927 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:40.254000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 09:47:40.258000 audit[2009]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2009 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:47:40.258000 audit[2009]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffc2d621b0 a2=0 a3=1 items=0 ppid=1927 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:40.258000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 09:47:40.262000 audit[2011]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2011 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:47:40.262000 audit[2011]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=fffff4200d00 a2=0 a3=1 items=0 ppid=1927 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:40.262000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 09:47:40.266000 audit[2013]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2013 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:47:40.266000 audit[2013]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdd23bab0 a2=0 a3=1 items=0 ppid=1927 pid=2013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:40.266000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 09:47:40.267880 systemd-networkd[1450]: docker0: Link UP Feb 9 09:47:40.282000 audit[2017]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2017 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:47:40.282000 audit[2017]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd36a59e0 a2=0 a3=1 items=0 ppid=1927 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:40.282000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 09:47:40.285000 audit[2018]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2018 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:47:40.285000 audit[2018]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffdd35fa80 a2=0 a3=1 items=0 ppid=1927 pid=2018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:47:40.285000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 09:47:40.286639 env[1927]: time="2024-02-09T09:47:40.286597619Z" level=info msg="Loading containers: done." Feb 9 09:47:40.309502 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1365363394-merged.mount: Deactivated successfully. Feb 9 09:47:40.327975 env[1927]: time="2024-02-09T09:47:40.327822244Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 09:47:40.329316 env[1927]: time="2024-02-09T09:47:40.329197361Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 09:47:40.330196 env[1927]: time="2024-02-09T09:47:40.330093103Z" level=info msg="Daemon has completed initialization" Feb 9 09:47:40.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:40.356087 systemd[1]: Started docker.service. Feb 9 09:47:40.376570 env[1927]: time="2024-02-09T09:47:40.376469836Z" level=info msg="API listen on /run/docker.sock" Feb 9 09:47:40.410707 systemd[1]: Reloading. Feb 9 09:47:40.559736 /usr/lib/systemd/system-generators/torcx-generator[2068]: time="2024-02-09T09:47:40Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:47:40.559800 /usr/lib/systemd/system-generators/torcx-generator[2068]: time="2024-02-09T09:47:40Z" level=info msg="torcx already run" Feb 9 09:47:40.713595 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:47:40.713635 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:47:40.752606 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:47:40.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.915000 audit: BPF prog-id=37 op=LOAD Feb 9 09:47:40.915000 audit: BPF prog-id=29 op=UNLOAD Feb 9 09:47:40.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.915000 audit: BPF prog-id=38 op=LOAD Feb 9 09:47:40.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.916000 audit: BPF prog-id=39 op=LOAD Feb 9 09:47:40.916000 audit: BPF prog-id=30 op=UNLOAD Feb 9 09:47:40.916000 audit: BPF prog-id=31 op=UNLOAD Feb 9 09:47:40.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.917000 audit: BPF prog-id=40 op=LOAD Feb 9 09:47:40.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.917000 audit: BPF prog-id=41 op=LOAD Feb 9 09:47:40.917000 audit: BPF prog-id=21 op=UNLOAD Feb 9 09:47:40.917000 audit: BPF prog-id=22 op=UNLOAD Feb 9 09:47:40.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.919000 audit: BPF prog-id=42 op=LOAD Feb 9 09:47:40.919000 audit: BPF prog-id=35 op=UNLOAD Feb 9 09:47:40.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.920000 audit: BPF prog-id=43 op=LOAD Feb 9 09:47:40.920000 audit: BPF prog-id=27 op=UNLOAD Feb 9 09:47:40.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.924000 audit: BPF prog-id=44 op=LOAD Feb 9 09:47:40.924000 audit: BPF prog-id=24 op=UNLOAD Feb 9 09:47:40.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.925000 audit: BPF prog-id=45 op=LOAD Feb 9 09:47:40.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.925000 audit: BPF prog-id=46 op=LOAD Feb 9 09:47:40.925000 audit: BPF prog-id=25 op=UNLOAD Feb 9 09:47:40.925000 audit: BPF prog-id=26 op=UNLOAD Feb 9 09:47:40.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.927000 audit: BPF prog-id=47 op=LOAD Feb 9 09:47:40.927000 audit: BPF prog-id=32 op=UNLOAD Feb 9 09:47:40.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.927000 audit: BPF prog-id=48 op=LOAD Feb 9 09:47:40.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.927000 audit: BPF prog-id=49 op=LOAD Feb 9 09:47:40.927000 audit: BPF prog-id=33 op=UNLOAD Feb 9 09:47:40.927000 audit: BPF prog-id=34 op=UNLOAD Feb 9 09:47:40.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.929000 audit: BPF prog-id=50 op=LOAD Feb 9 09:47:40.930000 audit: BPF prog-id=23 op=UNLOAD Feb 9 09:47:40.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.935000 audit: BPF prog-id=51 op=LOAD Feb 9 09:47:40.935000 audit: BPF prog-id=18 op=UNLOAD Feb 9 09:47:40.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.935000 audit: BPF prog-id=52 op=LOAD Feb 9 09:47:40.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.935000 audit: BPF prog-id=53 op=LOAD Feb 9 09:47:40.935000 audit: BPF prog-id=19 op=UNLOAD Feb 9 09:47:40.935000 audit: BPF prog-id=20 op=UNLOAD Feb 9 09:47:40.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:47:40.937000 audit: BPF prog-id=54 op=LOAD Feb 9 09:47:40.937000 audit: BPF prog-id=28 op=UNLOAD Feb 9 09:47:40.977171 systemd[1]: Started kubelet.service. Feb 9 09:47:40.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:41.111381 kubelet[2120]: E0209 09:47:41.111283 2120 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 09:47:41.115461 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 09:47:41.115789 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 09:47:41.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 09:47:41.533197 env[1656]: time="2024-02-09T09:47:41.533131070Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\"" Feb 9 09:47:42.146077 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3104528991.mount: Deactivated successfully. Feb 9 09:47:45.093731 env[1656]: time="2024-02-09T09:47:45.093626087Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:45.096750 env[1656]: time="2024-02-09T09:47:45.096653971Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d19178cf7413f0942a116deaaea447983d297afb5dc7f62456c43839e7aaecfa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:45.100447 env[1656]: time="2024-02-09T09:47:45.100372378Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:45.104583 env[1656]: time="2024-02-09T09:47:45.104518652Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:cfcebda74d6e665b68931d3589ee69fde81cd503ff3169888e4502af65579d98,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:45.106316 env[1656]: time="2024-02-09T09:47:45.106269896Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\" returns image reference \"sha256:d19178cf7413f0942a116deaaea447983d297afb5dc7f62456c43839e7aaecfa\"" Feb 9 09:47:45.124510 env[1656]: time="2024-02-09T09:47:45.124461156Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\"" Feb 9 09:47:48.430946 env[1656]: time="2024-02-09T09:47:48.430875023Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:48.435608 env[1656]: time="2024-02-09T09:47:48.433619862Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6b9759f115be4c68b4a500b8c1d7bbeaf16e8e887b01eaf79c135b7b267baf95,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:48.438255 env[1656]: time="2024-02-09T09:47:48.438169398Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:48.443639 env[1656]: time="2024-02-09T09:47:48.443587590Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fa168ebca1f6dbfe86ef0a690e007531c1f53569274fc7dc2774fe228b6ce8c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:48.445115 env[1656]: time="2024-02-09T09:47:48.445041448Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\" returns image reference \"sha256:6b9759f115be4c68b4a500b8c1d7bbeaf16e8e887b01eaf79c135b7b267baf95\"" Feb 9 09:47:48.462480 env[1656]: time="2024-02-09T09:47:48.462406307Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\"" Feb 9 09:47:50.252371 env[1656]: time="2024-02-09T09:47:50.252297622Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:50.256630 env[1656]: time="2024-02-09T09:47:50.256565785Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:745369ed75bfc0dd1319e4c64383b4ef2cb163cec6630fa288ad3fb6bf6624eb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:50.259662 env[1656]: time="2024-02-09T09:47:50.259606453Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:50.264292 env[1656]: time="2024-02-09T09:47:50.264235756Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09294de61e63987f181077cbc2f5c82463878af9cd8ecc6110c54150c9ae3143,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:50.265837 env[1656]: time="2024-02-09T09:47:50.265790240Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\" returns image reference \"sha256:745369ed75bfc0dd1319e4c64383b4ef2cb163cec6630fa288ad3fb6bf6624eb\"" Feb 9 09:47:50.283912 env[1656]: time="2024-02-09T09:47:50.283853477Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 9 09:47:51.229243 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 09:47:51.229605 systemd[1]: Stopped kubelet.service. Feb 9 09:47:51.242230 kernel: kauditd_printk_skb: 292 callbacks suppressed Feb 9 09:47:51.242376 kernel: audit: type=1130 audit(1707472071.229:415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:51.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:51.233200 systemd[1]: Started kubelet.service. Feb 9 09:47:51.252039 kernel: audit: type=1131 audit(1707472071.229:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:51.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:51.262974 kernel: audit: type=1130 audit(1707472071.233:417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:51.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:51.374966 kubelet[2155]: E0209 09:47:51.374903 2155 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 09:47:51.382015 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 09:47:51.382343 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 09:47:51.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 09:47:51.391457 kernel: audit: type=1131 audit(1707472071.381:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 09:47:51.530841 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3077633689.mount: Deactivated successfully. Feb 9 09:47:52.293570 env[1656]: time="2024-02-09T09:47:52.293486961Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:52.297201 env[1656]: time="2024-02-09T09:47:52.297149551Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f17f9528c5073692925255c3de3f310109480873912e8b5ddc171ae1e64324ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:52.299493 env[1656]: time="2024-02-09T09:47:52.299431142Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:52.301968 env[1656]: time="2024-02-09T09:47:52.301909272Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:52.302996 env[1656]: time="2024-02-09T09:47:52.302952717Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:f17f9528c5073692925255c3de3f310109480873912e8b5ddc171ae1e64324ef\"" Feb 9 09:47:52.319536 env[1656]: time="2024-02-09T09:47:52.319489019Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 09:47:52.912382 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount162286352.mount: Deactivated successfully. Feb 9 09:47:52.923058 env[1656]: time="2024-02-09T09:47:52.922976699Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:52.927270 env[1656]: time="2024-02-09T09:47:52.927195791Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:52.929332 env[1656]: time="2024-02-09T09:47:52.929282838Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:52.932251 env[1656]: time="2024-02-09T09:47:52.932192098Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:52.933477 env[1656]: time="2024-02-09T09:47:52.933399136Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Feb 9 09:47:52.950098 env[1656]: time="2024-02-09T09:47:52.950048060Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Feb 9 09:47:53.994820 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount954371362.mount: Deactivated successfully. Feb 9 09:47:57.340404 env[1656]: time="2024-02-09T09:47:57.340342001Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:57.343238 env[1656]: time="2024-02-09T09:47:57.343186826Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24bc64e911039ecf00e263be2161797c758b7d82403ca5516ab64047a477f737,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:57.347045 env[1656]: time="2024-02-09T09:47:57.346996722Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:57.352057 env[1656]: time="2024-02-09T09:47:57.351996922Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:57.353344 env[1656]: time="2024-02-09T09:47:57.353300054Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:24bc64e911039ecf00e263be2161797c758b7d82403ca5516ab64047a477f737\"" Feb 9 09:47:57.368945 env[1656]: time="2024-02-09T09:47:57.368897788Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 9 09:47:57.917891 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1381822270.mount: Deactivated successfully. Feb 9 09:47:59.109683 env[1656]: time="2024-02-09T09:47:59.109623271Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:59.112671 env[1656]: time="2024-02-09T09:47:59.112581303Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:59.118150 env[1656]: time="2024-02-09T09:47:59.118082447Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:59.120876 env[1656]: time="2024-02-09T09:47:59.120801941Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:47:59.121382 env[1656]: time="2024-02-09T09:47:59.121322586Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\"" Feb 9 09:47:59.256604 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 9 09:47:59.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:59.266703 kernel: audit: type=1131 audit(1707472079.255:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:47:59.290000 audit: BPF prog-id=49 op=UNLOAD Feb 9 09:47:59.290000 audit: BPF prog-id=48 op=UNLOAD Feb 9 09:47:59.296656 kernel: audit: type=1334 audit(1707472079.290:420): prog-id=49 op=UNLOAD Feb 9 09:47:59.296716 kernel: audit: type=1334 audit(1707472079.290:421): prog-id=48 op=UNLOAD Feb 9 09:47:59.296759 kernel: audit: type=1334 audit(1707472079.290:422): prog-id=47 op=UNLOAD Feb 9 09:47:59.290000 audit: BPF prog-id=47 op=UNLOAD Feb 9 09:48:01.479218 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 9 09:48:01.479594 systemd[1]: Stopped kubelet.service. Feb 9 09:48:01.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:48:01.489855 systemd[1]: Started kubelet.service. Feb 9 09:48:01.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:48:01.506182 kernel: audit: type=1130 audit(1707472081.479:423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:48:01.506327 kernel: audit: type=1131 audit(1707472081.479:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:48:01.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:48:01.521232 kernel: audit: type=1130 audit(1707472081.489:425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:48:01.601027 kubelet[2242]: E0209 09:48:01.600965 2242 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 09:48:01.605719 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 09:48:01.606049 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 09:48:01.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 09:48:01.615457 kernel: audit: type=1131 audit(1707472081.606:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 09:48:06.462542 amazon-ssm-agent[1624]: 2024-02-09 09:48:06 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Feb 9 09:48:09.113797 systemd[1]: Stopped kubelet.service. Feb 9 09:48:09.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:48:09.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:48:09.131340 kernel: audit: type=1130 audit(1707472089.112:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:48:09.131511 kernel: audit: type=1131 audit(1707472089.112:428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:48:09.157282 systemd[1]: Reloading. Feb 9 09:48:09.285710 /usr/lib/systemd/system-generators/torcx-generator[2271]: time="2024-02-09T09:48:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:48:09.285778 /usr/lib/systemd/system-generators/torcx-generator[2271]: time="2024-02-09T09:48:09Z" level=info msg="torcx already run" Feb 9 09:48:09.439499 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:48:09.439804 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:48:09.478513 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:48:09.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.650809 kernel: audit: type=1400 audit(1707472089.633:429): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.650923 kernel: audit: type=1400 audit(1707472089.642:430): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.658493 kernel: audit: type=1400 audit(1707472089.642:431): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.666152 kernel: audit: type=1400 audit(1707472089.642:432): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.685723 kernel: audit: type=1400 audit(1707472089.642:433): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.685820 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 09:48:09.685871 kernel: audit: type=1400 audit(1707472089.642:434): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.685921 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 09:48:09.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.642000 audit: BPF prog-id=55 op=LOAD Feb 9 09:48:09.642000 audit: BPF prog-id=37 op=UNLOAD Feb 9 09:48:09.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.649000 audit: BPF prog-id=56 op=LOAD Feb 9 09:48:09.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.649000 audit: BPF prog-id=57 op=LOAD Feb 9 09:48:09.649000 audit: BPF prog-id=38 op=UNLOAD Feb 9 09:48:09.649000 audit: BPF prog-id=39 op=UNLOAD Feb 9 09:48:09.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.657000 audit: BPF prog-id=58 op=LOAD Feb 9 09:48:09.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.657000 audit: BPF prog-id=59 op=LOAD Feb 9 09:48:09.657000 audit: BPF prog-id=40 op=UNLOAD Feb 9 09:48:09.657000 audit: BPF prog-id=41 op=UNLOAD Feb 9 09:48:09.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.664000 audit: BPF prog-id=60 op=LOAD Feb 9 09:48:09.664000 audit: BPF prog-id=42 op=UNLOAD Feb 9 09:48:09.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.685000 audit: BPF prog-id=62 op=LOAD Feb 9 09:48:09.685000 audit: BPF prog-id=44 op=UNLOAD Feb 9 09:48:09.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.686000 audit: BPF prog-id=45 op=UNLOAD Feb 9 09:48:09.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.689000 audit: BPF prog-id=65 op=LOAD Feb 9 09:48:09.689000 audit: BPF prog-id=50 op=UNLOAD Feb 9 09:48:09.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.695000 audit: BPF prog-id=66 op=LOAD Feb 9 09:48:09.695000 audit: BPF prog-id=51 op=UNLOAD Feb 9 09:48:09.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.695000 audit: BPF prog-id=67 op=LOAD Feb 9 09:48:09.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.695000 audit: BPF prog-id=68 op=LOAD Feb 9 09:48:09.695000 audit: BPF prog-id=52 op=UNLOAD Feb 9 09:48:09.695000 audit: BPF prog-id=53 op=UNLOAD Feb 9 09:48:09.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:09.697000 audit: BPF prog-id=69 op=LOAD Feb 9 09:48:09.697000 audit: BPF prog-id=54 op=UNLOAD Feb 9 09:48:09.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:48:09.730262 systemd[1]: Started kubelet.service. Feb 9 09:48:09.838776 kubelet[2327]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 09:48:09.838776 kubelet[2327]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 09:48:09.838776 kubelet[2327]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 09:48:09.839403 kubelet[2327]: I0209 09:48:09.838866 2327 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 09:48:11.804203 kubelet[2327]: I0209 09:48:11.804161 2327 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 9 09:48:11.804851 kubelet[2327]: I0209 09:48:11.804827 2327 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 09:48:11.805301 kubelet[2327]: I0209 09:48:11.805276 2327 server.go:837] "Client rotation is on, will bootstrap in background" Feb 9 09:48:11.812833 kubelet[2327]: E0209 09:48:11.812775 2327 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.21.69:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.21.69:6443: connect: connection refused Feb 9 09:48:11.813015 kubelet[2327]: I0209 09:48:11.812871 2327 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 09:48:11.815828 kubelet[2327]: W0209 09:48:11.815800 2327 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 09:48:11.817142 kubelet[2327]: I0209 09:48:11.817105 2327 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 09:48:11.817790 kubelet[2327]: I0209 09:48:11.817768 2327 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 09:48:11.818013 kubelet[2327]: I0209 09:48:11.817986 2327 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 09:48:11.818229 kubelet[2327]: I0209 09:48:11.818202 2327 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 09:48:11.818341 kubelet[2327]: I0209 09:48:11.818321 2327 container_manager_linux.go:302] "Creating device plugin manager" Feb 9 09:48:11.818678 kubelet[2327]: I0209 09:48:11.818656 2327 state_mem.go:36] "Initialized new in-memory state store" Feb 9 09:48:11.823876 kubelet[2327]: I0209 09:48:11.823816 2327 kubelet.go:405] "Attempting to sync node with API server" Feb 9 09:48:11.823876 kubelet[2327]: I0209 09:48:11.823868 2327 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 09:48:11.824129 kubelet[2327]: I0209 09:48:11.823919 2327 kubelet.go:309] "Adding apiserver pod source" Feb 9 09:48:11.824129 kubelet[2327]: I0209 09:48:11.823963 2327 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 09:48:11.825159 kubelet[2327]: I0209 09:48:11.825125 2327 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 09:48:11.825838 kubelet[2327]: W0209 09:48:11.825812 2327 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 09:48:11.826849 kubelet[2327]: I0209 09:48:11.826817 2327 server.go:1168] "Started kubelet" Feb 9 09:48:11.829000 audit[2327]: AVC avc: denied { mac_admin } for pid=2327 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:11.829000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:48:11.829000 audit[2327]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000a056b0 a1=4000a54840 a2=4000a05680 a3=25 items=0 ppid=1 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:11.829000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:48:11.830603 kubelet[2327]: I0209 09:48:11.830569 2327 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 09:48:11.830000 audit[2327]: AVC avc: denied { mac_admin } for pid=2327 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:11.830000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:48:11.830000 audit[2327]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000e7cfc0 a1=4000a54858 a2=4000a05740 a3=25 items=0 ppid=1 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:11.830000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:48:11.831108 kubelet[2327]: I0209 09:48:11.831082 2327 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 09:48:11.831355 kubelet[2327]: I0209 09:48:11.831332 2327 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 09:48:11.833405 kubelet[2327]: I0209 09:48:11.833367 2327 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 09:48:11.834036 kubelet[2327]: E0209 09:48:11.833849 2327 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-21-69.17b228d2293a5610", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-21-69", UID:"ip-172-31-21-69", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-21-69"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 48, 11, 826771472, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 48, 11, 826771472, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://172.31.21.69:6443/api/v1/namespaces/default/events": dial tcp 172.31.21.69:6443: connect: connection refused'(may retry after sleeping) Feb 9 09:48:11.835896 kubelet[2327]: W0209 09:48:11.835820 2327 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.21.69:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-21-69&limit=500&resourceVersion=0": dial tcp 172.31.21.69:6443: connect: connection refused Feb 9 09:48:11.836137 kubelet[2327]: E0209 09:48:11.836113 2327 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.21.69:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-21-69&limit=500&resourceVersion=0": dial tcp 172.31.21.69:6443: connect: connection refused Feb 9 09:48:11.836532 kubelet[2327]: I0209 09:48:11.836507 2327 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 09:48:11.842402 kubelet[2327]: E0209 09:48:11.842348 2327 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 09:48:11.842402 kubelet[2327]: E0209 09:48:11.842406 2327 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 09:48:11.842672 kubelet[2327]: W0209 09:48:11.842611 2327 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.21.69:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.21.69:6443: connect: connection refused Feb 9 09:48:11.842741 kubelet[2327]: E0209 09:48:11.842690 2327 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.21.69:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.21.69:6443: connect: connection refused Feb 9 09:48:11.843000 audit[2338]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:11.843000 audit[2338]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffcf4443a0 a2=0 a3=1 items=0 ppid=2327 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:11.843000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 09:48:11.847000 audit[2339]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:11.847000 audit[2339]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd62dff10 a2=0 a3=1 items=0 ppid=2327 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:11.847000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 09:48:11.851733 kubelet[2327]: I0209 09:48:11.851694 2327 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 9 09:48:11.853501 kubelet[2327]: E0209 09:48:11.853444 2327 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.69:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-69?timeout=10s\": dial tcp 172.31.21.69:6443: connect: connection refused" interval="200ms" Feb 9 09:48:11.854159 kubelet[2327]: I0209 09:48:11.853955 2327 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 9 09:48:11.855053 kubelet[2327]: I0209 09:48:11.855019 2327 server.go:461] "Adding debug handlers to kubelet server" Feb 9 09:48:11.869000 audit[2341]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:11.869000 audit[2341]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd668d120 a2=0 a3=1 items=0 ppid=2327 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:11.869000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 09:48:11.874000 audit[2343]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:11.874000 audit[2343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffcf4402d0 a2=0 a3=1 items=0 ppid=2327 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:11.874000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 09:48:11.884000 audit[2346]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2346 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:11.884000 audit[2346]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffe6683240 a2=0 a3=1 items=0 ppid=2327 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:11.884000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 09:48:11.885932 kubelet[2327]: I0209 09:48:11.885888 2327 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 09:48:11.887000 audit[2347]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:11.887000 audit[2347]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdb6d4e10 a2=0 a3=1 items=0 ppid=2327 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:11.887000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 09:48:11.887916 kubelet[2327]: I0209 09:48:11.887868 2327 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 09:48:11.888014 kubelet[2327]: I0209 09:48:11.887926 2327 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 9 09:48:11.888014 kubelet[2327]: I0209 09:48:11.887962 2327 kubelet.go:2257] "Starting kubelet main sync loop" Feb 9 09:48:11.888168 kubelet[2327]: E0209 09:48:11.888056 2327 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 09:48:11.889000 audit[2349]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2349 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:11.889000 audit[2349]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcb90e560 a2=0 a3=1 items=0 ppid=2327 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:11.889000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 09:48:11.891000 audit[2350]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:11.891000 audit[2350]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd127fc70 a2=0 a3=1 items=0 ppid=2327 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:11.891000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 09:48:11.893000 audit[2351]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:11.893000 audit[2351]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc6961630 a2=0 a3=1 items=0 ppid=2327 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:11.893000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 09:48:11.895753 kubelet[2327]: W0209 09:48:11.895704 2327 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.21.69:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.21.69:6443: connect: connection refused Feb 9 09:48:11.896000 audit[2353]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:11.896000 audit[2353]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc55ae2b0 a2=0 a3=1 items=0 ppid=2327 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:11.896000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 09:48:11.906047 kubelet[2327]: E0209 09:48:11.906003 2327 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.21.69:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.21.69:6443: connect: connection refused Feb 9 09:48:11.907000 audit[2355]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=2355 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:11.907000 audit[2355]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffd59b7400 a2=0 a3=1 items=0 ppid=2327 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:11.907000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 09:48:11.909000 audit[2356]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:11.909000 audit[2356]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe0f82ed0 a2=0 a3=1 items=0 ppid=2327 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:11.909000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 09:48:11.910125 kubelet[2327]: W0209 09:48:11.910043 2327 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.21.69:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.69:6443: connect: connection refused Feb 9 09:48:11.910272 kubelet[2327]: E0209 09:48:11.910139 2327 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.21.69:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.69:6443: connect: connection refused Feb 9 09:48:11.925749 kubelet[2327]: I0209 09:48:11.925698 2327 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 09:48:11.925749 kubelet[2327]: I0209 09:48:11.925737 2327 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 09:48:11.925940 kubelet[2327]: I0209 09:48:11.925771 2327 state_mem.go:36] "Initialized new in-memory state store" Feb 9 09:48:11.928656 kubelet[2327]: I0209 09:48:11.928605 2327 policy_none.go:49] "None policy: Start" Feb 9 09:48:11.929862 kubelet[2327]: I0209 09:48:11.929821 2327 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 09:48:11.930087 kubelet[2327]: I0209 09:48:11.929894 2327 state_mem.go:35] "Initializing new in-memory state store" Feb 9 09:48:11.938904 systemd[1]: Created slice kubepods.slice. Feb 9 09:48:11.948151 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 09:48:11.955096 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 09:48:11.958714 kubelet[2327]: I0209 09:48:11.958678 2327 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-69" Feb 9 09:48:11.960089 kubelet[2327]: E0209 09:48:11.960052 2327 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.21.69:6443/api/v1/nodes\": dial tcp 172.31.21.69:6443: connect: connection refused" node="ip-172-31-21-69" Feb 9 09:48:11.963094 kubelet[2327]: I0209 09:48:11.963063 2327 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 09:48:11.962000 audit[2327]: AVC avc: denied { mac_admin } for pid=2327 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:11.962000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:48:11.962000 audit[2327]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d688a0 a1=4000db8d38 a2=4000d68870 a3=25 items=0 ppid=1 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:11.962000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:48:11.963785 kubelet[2327]: I0209 09:48:11.963759 2327 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 09:48:11.964483 kubelet[2327]: I0209 09:48:11.964457 2327 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 09:48:11.967735 kubelet[2327]: E0209 09:48:11.966519 2327 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-21-69\" not found" Feb 9 09:48:11.989185 kubelet[2327]: I0209 09:48:11.989087 2327 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:48:11.991369 kubelet[2327]: I0209 09:48:11.991335 2327 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:48:11.994189 kubelet[2327]: I0209 09:48:11.994156 2327 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:48:12.002601 systemd[1]: Created slice kubepods-burstable-pod0cb7d9ec479954cc4adad57bd2dc5d29.slice. Feb 9 09:48:12.017450 systemd[1]: Created slice kubepods-burstable-pod86cf1d40ca89d05432d12087da428fb5.slice. Feb 9 09:48:12.025705 systemd[1]: Created slice kubepods-burstable-pod8c259380ca74386965c80a47048300c8.slice. Feb 9 09:48:12.055978 kubelet[2327]: E0209 09:48:12.054605 2327 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.69:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-69?timeout=10s\": dial tcp 172.31.21.69:6443: connect: connection refused" interval="400ms" Feb 9 09:48:12.058110 kubelet[2327]: I0209 09:48:12.058068 2327 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8c259380ca74386965c80a47048300c8-k8s-certs\") pod \"kube-apiserver-ip-172-31-21-69\" (UID: \"8c259380ca74386965c80a47048300c8\") " pod="kube-system/kube-apiserver-ip-172-31-21-69" Feb 9 09:48:12.058304 kubelet[2327]: I0209 09:48:12.058271 2327 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0cb7d9ec479954cc4adad57bd2dc5d29-ca-certs\") pod \"kube-controller-manager-ip-172-31-21-69\" (UID: \"0cb7d9ec479954cc4adad57bd2dc5d29\") " pod="kube-system/kube-controller-manager-ip-172-31-21-69" Feb 9 09:48:12.058533 kubelet[2327]: I0209 09:48:12.058512 2327 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0cb7d9ec479954cc4adad57bd2dc5d29-kubeconfig\") pod \"kube-controller-manager-ip-172-31-21-69\" (UID: \"0cb7d9ec479954cc4adad57bd2dc5d29\") " pod="kube-system/kube-controller-manager-ip-172-31-21-69" Feb 9 09:48:12.058710 kubelet[2327]: I0209 09:48:12.058689 2327 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/86cf1d40ca89d05432d12087da428fb5-kubeconfig\") pod \"kube-scheduler-ip-172-31-21-69\" (UID: \"86cf1d40ca89d05432d12087da428fb5\") " pod="kube-system/kube-scheduler-ip-172-31-21-69" Feb 9 09:48:12.059047 kubelet[2327]: I0209 09:48:12.059025 2327 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8c259380ca74386965c80a47048300c8-ca-certs\") pod \"kube-apiserver-ip-172-31-21-69\" (UID: \"8c259380ca74386965c80a47048300c8\") " pod="kube-system/kube-apiserver-ip-172-31-21-69" Feb 9 09:48:12.059282 kubelet[2327]: I0209 09:48:12.059261 2327 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8c259380ca74386965c80a47048300c8-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-21-69\" (UID: \"8c259380ca74386965c80a47048300c8\") " pod="kube-system/kube-apiserver-ip-172-31-21-69" Feb 9 09:48:12.059570 kubelet[2327]: I0209 09:48:12.059548 2327 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/0cb7d9ec479954cc4adad57bd2dc5d29-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-21-69\" (UID: \"0cb7d9ec479954cc4adad57bd2dc5d29\") " pod="kube-system/kube-controller-manager-ip-172-31-21-69" Feb 9 09:48:12.059794 kubelet[2327]: I0209 09:48:12.059773 2327 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0cb7d9ec479954cc4adad57bd2dc5d29-k8s-certs\") pod \"kube-controller-manager-ip-172-31-21-69\" (UID: \"0cb7d9ec479954cc4adad57bd2dc5d29\") " pod="kube-system/kube-controller-manager-ip-172-31-21-69" Feb 9 09:48:12.060012 kubelet[2327]: I0209 09:48:12.059991 2327 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0cb7d9ec479954cc4adad57bd2dc5d29-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-21-69\" (UID: \"0cb7d9ec479954cc4adad57bd2dc5d29\") " pod="kube-system/kube-controller-manager-ip-172-31-21-69" Feb 9 09:48:12.162928 kubelet[2327]: I0209 09:48:12.162895 2327 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-69" Feb 9 09:48:12.163807 kubelet[2327]: E0209 09:48:12.163758 2327 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.21.69:6443/api/v1/nodes\": dial tcp 172.31.21.69:6443: connect: connection refused" node="ip-172-31-21-69" Feb 9 09:48:12.312744 env[1656]: time="2024-02-09T09:48:12.312550988Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-21-69,Uid:0cb7d9ec479954cc4adad57bd2dc5d29,Namespace:kube-system,Attempt:0,}" Feb 9 09:48:12.323776 env[1656]: time="2024-02-09T09:48:12.323704845Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-21-69,Uid:86cf1d40ca89d05432d12087da428fb5,Namespace:kube-system,Attempt:0,}" Feb 9 09:48:12.332634 env[1656]: time="2024-02-09T09:48:12.332552597Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-21-69,Uid:8c259380ca74386965c80a47048300c8,Namespace:kube-system,Attempt:0,}" Feb 9 09:48:12.455195 kubelet[2327]: E0209 09:48:12.455113 2327 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.69:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-69?timeout=10s\": dial tcp 172.31.21.69:6443: connect: connection refused" interval="800ms" Feb 9 09:48:12.566184 kubelet[2327]: I0209 09:48:12.566014 2327 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-69" Feb 9 09:48:12.567004 kubelet[2327]: E0209 09:48:12.566969 2327 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.21.69:6443/api/v1/nodes\": dial tcp 172.31.21.69:6443: connect: connection refused" node="ip-172-31-21-69" Feb 9 09:48:12.808954 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount751304119.mount: Deactivated successfully. Feb 9 09:48:12.816089 env[1656]: time="2024-02-09T09:48:12.816036200Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:12.820843 env[1656]: time="2024-02-09T09:48:12.820301905Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:12.824452 env[1656]: time="2024-02-09T09:48:12.822755762Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:12.826627 env[1656]: time="2024-02-09T09:48:12.826557555Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:12.829101 env[1656]: time="2024-02-09T09:48:12.829042850Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:12.833579 env[1656]: time="2024-02-09T09:48:12.833529036Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:12.838674 env[1656]: time="2024-02-09T09:48:12.838623776Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:12.844927 env[1656]: time="2024-02-09T09:48:12.844857580Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:12.849790 env[1656]: time="2024-02-09T09:48:12.849732476Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:12.858715 env[1656]: time="2024-02-09T09:48:12.858628866Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:12.863565 env[1656]: time="2024-02-09T09:48:12.863509920Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:12.864397 kubelet[2327]: W0209 09:48:12.864324 2327 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.21.69:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-21-69&limit=500&resourceVersion=0": dial tcp 172.31.21.69:6443: connect: connection refused Feb 9 09:48:12.864397 kubelet[2327]: E0209 09:48:12.864426 2327 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.21.69:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-21-69&limit=500&resourceVersion=0": dial tcp 172.31.21.69:6443: connect: connection refused Feb 9 09:48:12.868272 env[1656]: time="2024-02-09T09:48:12.867605547Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:12.868484 kubelet[2327]: W0209 09:48:12.868185 2327 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.21.69:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.69:6443: connect: connection refused Feb 9 09:48:12.868484 kubelet[2327]: E0209 09:48:12.868238 2327 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.21.69:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.69:6443: connect: connection refused Feb 9 09:48:12.898262 kubelet[2327]: W0209 09:48:12.898161 2327 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.21.69:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.21.69:6443: connect: connection refused Feb 9 09:48:12.898262 kubelet[2327]: E0209 09:48:12.898227 2327 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.21.69:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.21.69:6443: connect: connection refused Feb 9 09:48:12.925994 env[1656]: time="2024-02-09T09:48:12.925853212Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:48:12.925994 env[1656]: time="2024-02-09T09:48:12.925926602Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:48:12.926395 env[1656]: time="2024-02-09T09:48:12.926302937Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:48:12.929056 env[1656]: time="2024-02-09T09:48:12.926991291Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d330053d9f0debec06bacffaee606a6dffe9600af43a88191de03ffd298b5dec pid=2375 runtime=io.containerd.runc.v2 Feb 9 09:48:12.931002 env[1656]: time="2024-02-09T09:48:12.930598291Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:48:12.931002 env[1656]: time="2024-02-09T09:48:12.930683948Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:48:12.931002 env[1656]: time="2024-02-09T09:48:12.930710872Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:48:12.931578 env[1656]: time="2024-02-09T09:48:12.931453914Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a7166ce5622791d2bc4911a0dd6fae04a5a980066013ad859860adebda2f7b9d pid=2373 runtime=io.containerd.runc.v2 Feb 9 09:48:12.935164 env[1656]: time="2024-02-09T09:48:12.935026079Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:48:12.935164 env[1656]: time="2024-02-09T09:48:12.935104859Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:48:12.935489 env[1656]: time="2024-02-09T09:48:12.935131326Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:48:12.935489 env[1656]: time="2024-02-09T09:48:12.935351999Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5add2ca4e9b0087fd68de17c25890d6943741b7c924e55a171ab5a23cc28b0d4 pid=2396 runtime=io.containerd.runc.v2 Feb 9 09:48:12.970024 systemd[1]: Started cri-containerd-5add2ca4e9b0087fd68de17c25890d6943741b7c924e55a171ab5a23cc28b0d4.scope. Feb 9 09:48:12.984095 systemd[1]: Started cri-containerd-d330053d9f0debec06bacffaee606a6dffe9600af43a88191de03ffd298b5dec.scope. Feb 9 09:48:13.006188 systemd[1]: Started cri-containerd-a7166ce5622791d2bc4911a0dd6fae04a5a980066013ad859860adebda2f7b9d.scope. Feb 9 09:48:13.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.038000 audit: BPF prog-id=70 op=LOAD Feb 9 09:48:13.040000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.040000 audit[2411]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2396 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561646432636134653962303038376664363864653137633235383930 Feb 9 09:48:13.040000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.040000 audit[2411]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2396 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561646432636134653962303038376664363864653137633235383930 Feb 9 09:48:13.040000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.040000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.040000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.040000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.040000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.040000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.040000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.040000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.040000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.040000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.040000 audit: BPF prog-id=71 op=LOAD Feb 9 09:48:13.040000 audit[2411]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2396 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561646432636134653962303038376664363864653137633235383930 Feb 9 09:48:13.040000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.040000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.040000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.040000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.040000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.040000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.040000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.040000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.040000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.040000 audit: BPF prog-id=72 op=LOAD Feb 9 09:48:13.040000 audit[2411]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2396 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561646432636134653962303038376664363864653137633235383930 Feb 9 09:48:13.041000 audit: BPF prog-id=72 op=UNLOAD Feb 9 09:48:13.041000 audit: BPF prog-id=71 op=UNLOAD Feb 9 09:48:13.041000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.041000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.041000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.041000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.041000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.041000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.041000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.041000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.041000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.041000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.041000 audit: BPF prog-id=73 op=LOAD Feb 9 09:48:13.041000 audit[2411]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2396 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561646432636134653962303038376664363864653137633235383930 Feb 9 09:48:13.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.048000 audit: BPF prog-id=74 op=LOAD Feb 9 09:48:13.050000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.050000 audit[2404]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2373 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137313636636535363232373931643262633439313161306464366661 Feb 9 09:48:13.051000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.051000 audit[2404]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2373 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137313636636535363232373931643262633439313161306464366661 Feb 9 09:48:13.051000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.051000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.051000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.051000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.051000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.051000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.051000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.051000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.051000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.051000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.051000 audit: BPF prog-id=75 op=LOAD Feb 9 09:48:13.051000 audit[2404]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2373 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137313636636535363232373931643262633439313161306464366661 Feb 9 09:48:13.053000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.053000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.053000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.053000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.053000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.053000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.053000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.053000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.053000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.053000 audit: BPF prog-id=76 op=LOAD Feb 9 09:48:13.053000 audit[2404]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2373 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137313636636535363232373931643262633439313161306464366661 Feb 9 09:48:13.054000 audit: BPF prog-id=76 op=UNLOAD Feb 9 09:48:13.055000 audit: BPF prog-id=75 op=UNLOAD Feb 9 09:48:13.055000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.055000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.055000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.055000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.055000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.055000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.055000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.055000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.055000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.055000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.055000 audit: BPF prog-id=77 op=LOAD Feb 9 09:48:13.055000 audit[2404]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2373 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137313636636535363232373931643262633439313161306464366661 Feb 9 09:48:13.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.060000 audit: BPF prog-id=78 op=LOAD Feb 9 09:48:13.063000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.063000 audit[2408]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2375 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433333030353364396630646562656330366261636666616565363036 Feb 9 09:48:13.064000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.064000 audit[2408]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2375 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433333030353364396630646562656330366261636666616565363036 Feb 9 09:48:13.064000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.064000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.064000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.064000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.064000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.064000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.064000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.064000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.064000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.064000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.064000 audit: BPF prog-id=79 op=LOAD Feb 9 09:48:13.064000 audit[2408]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2375 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433333030353364396630646562656330366261636666616565363036 Feb 9 09:48:13.066000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.066000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.066000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.066000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.066000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.066000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.066000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.066000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.066000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.066000 audit: BPF prog-id=80 op=LOAD Feb 9 09:48:13.066000 audit[2408]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2375 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433333030353364396630646562656330366261636666616565363036 Feb 9 09:48:13.067000 audit: BPF prog-id=80 op=UNLOAD Feb 9 09:48:13.067000 audit: BPF prog-id=79 op=UNLOAD Feb 9 09:48:13.068000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.068000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.068000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.068000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.068000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.068000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.068000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.068000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.068000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.068000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.068000 audit: BPF prog-id=81 op=LOAD Feb 9 09:48:13.068000 audit[2408]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2375 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433333030353364396630646562656330366261636666616565363036 Feb 9 09:48:13.118969 env[1656]: time="2024-02-09T09:48:13.118907067Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-21-69,Uid:86cf1d40ca89d05432d12087da428fb5,Namespace:kube-system,Attempt:0,} returns sandbox id \"5add2ca4e9b0087fd68de17c25890d6943741b7c924e55a171ab5a23cc28b0d4\"" Feb 9 09:48:13.129796 env[1656]: time="2024-02-09T09:48:13.129721548Z" level=info msg="CreateContainer within sandbox \"5add2ca4e9b0087fd68de17c25890d6943741b7c924e55a171ab5a23cc28b0d4\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 09:48:13.160278 env[1656]: time="2024-02-09T09:48:13.160206140Z" level=info msg="CreateContainer within sandbox \"5add2ca4e9b0087fd68de17c25890d6943741b7c924e55a171ab5a23cc28b0d4\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"7675f5b4669fa12b75456787bba547bc6f961772b07567bd4b814a3f3f8e26e9\"" Feb 9 09:48:13.161351 env[1656]: time="2024-02-09T09:48:13.161297221Z" level=info msg="StartContainer for \"7675f5b4669fa12b75456787bba547bc6f961772b07567bd4b814a3f3f8e26e9\"" Feb 9 09:48:13.172833 env[1656]: time="2024-02-09T09:48:13.172759991Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-21-69,Uid:0cb7d9ec479954cc4adad57bd2dc5d29,Namespace:kube-system,Attempt:0,} returns sandbox id \"d330053d9f0debec06bacffaee606a6dffe9600af43a88191de03ffd298b5dec\"" Feb 9 09:48:13.178542 env[1656]: time="2024-02-09T09:48:13.178468834Z" level=info msg="CreateContainer within sandbox \"d330053d9f0debec06bacffaee606a6dffe9600af43a88191de03ffd298b5dec\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 09:48:13.188129 env[1656]: time="2024-02-09T09:48:13.188066667Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-21-69,Uid:8c259380ca74386965c80a47048300c8,Namespace:kube-system,Attempt:0,} returns sandbox id \"a7166ce5622791d2bc4911a0dd6fae04a5a980066013ad859860adebda2f7b9d\"" Feb 9 09:48:13.196217 env[1656]: time="2024-02-09T09:48:13.196150374Z" level=info msg="CreateContainer within sandbox \"a7166ce5622791d2bc4911a0dd6fae04a5a980066013ad859860adebda2f7b9d\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 09:48:13.215504 systemd[1]: Started cri-containerd-7675f5b4669fa12b75456787bba547bc6f961772b07567bd4b814a3f3f8e26e9.scope. Feb 9 09:48:13.223119 env[1656]: time="2024-02-09T09:48:13.223057618Z" level=info msg="CreateContainer within sandbox \"d330053d9f0debec06bacffaee606a6dffe9600af43a88191de03ffd298b5dec\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"a78af8171896094cf05c405fd566f5608ee9985561f99a50f5b4ad6260a71e24\"" Feb 9 09:48:13.224560 env[1656]: time="2024-02-09T09:48:13.224478323Z" level=info msg="StartContainer for \"a78af8171896094cf05c405fd566f5608ee9985561f99a50f5b4ad6260a71e24\"" Feb 9 09:48:13.245769 env[1656]: time="2024-02-09T09:48:13.245701512Z" level=info msg="CreateContainer within sandbox \"a7166ce5622791d2bc4911a0dd6fae04a5a980066013ad859860adebda2f7b9d\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"b6436f7948e8d07a6b56655969f9863229cd16f72c05b09a8a9a31f1ab7a7f9e\"" Feb 9 09:48:13.246890 env[1656]: time="2024-02-09T09:48:13.246842527Z" level=info msg="StartContainer for \"b6436f7948e8d07a6b56655969f9863229cd16f72c05b09a8a9a31f1ab7a7f9e\"" Feb 9 09:48:13.256954 kubelet[2327]: E0209 09:48:13.256671 2327 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.69:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-69?timeout=10s\": dial tcp 172.31.21.69:6443: connect: connection refused" interval="1.6s" Feb 9 09:48:13.256954 kubelet[2327]: W0209 09:48:13.256827 2327 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.21.69:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.21.69:6443: connect: connection refused Feb 9 09:48:13.256954 kubelet[2327]: E0209 09:48:13.256869 2327 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.21.69:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.21.69:6443: connect: connection refused Feb 9 09:48:13.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.259000 audit: BPF prog-id=82 op=LOAD Feb 9 09:48:13.260000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.260000 audit[2496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2396 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736373566356234363639666131326237353435363738376262613534 Feb 9 09:48:13.261000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.261000 audit[2496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2396 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736373566356234363639666131326237353435363738376262613534 Feb 9 09:48:13.261000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.261000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.261000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.261000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.261000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.261000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.261000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.261000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.261000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.261000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.261000 audit: BPF prog-id=83 op=LOAD Feb 9 09:48:13.261000 audit[2496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2396 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736373566356234363639666131326237353435363738376262613534 Feb 9 09:48:13.263000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.263000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.263000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.263000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.263000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.263000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.263000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.263000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.263000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.263000 audit: BPF prog-id=84 op=LOAD Feb 9 09:48:13.263000 audit[2496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2396 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736373566356234363639666131326237353435363738376262613534 Feb 9 09:48:13.265000 audit: BPF prog-id=84 op=UNLOAD Feb 9 09:48:13.265000 audit: BPF prog-id=83 op=UNLOAD Feb 9 09:48:13.265000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.265000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.265000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.265000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.265000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.265000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.265000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.265000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.265000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.265000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.265000 audit: BPF prog-id=85 op=LOAD Feb 9 09:48:13.265000 audit[2496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2396 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736373566356234363639666131326237353435363738376262613534 Feb 9 09:48:13.292460 systemd[1]: Started cri-containerd-b6436f7948e8d07a6b56655969f9863229cd16f72c05b09a8a9a31f1ab7a7f9e.scope. Feb 9 09:48:13.320328 systemd[1]: Started cri-containerd-a78af8171896094cf05c405fd566f5608ee9985561f99a50f5b4ad6260a71e24.scope. Feb 9 09:48:13.348826 env[1656]: time="2024-02-09T09:48:13.348660983Z" level=info msg="StartContainer for \"7675f5b4669fa12b75456787bba547bc6f961772b07567bd4b814a3f3f8e26e9\" returns successfully" Feb 9 09:48:13.369819 kubelet[2327]: I0209 09:48:13.369780 2327 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-69" Feb 9 09:48:13.371763 kubelet[2327]: E0209 09:48:13.371299 2327 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.21.69:6443/api/v1/nodes\": dial tcp 172.31.21.69:6443: connect: connection refused" node="ip-172-31-21-69" Feb 9 09:48:13.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.373000 audit: BPF prog-id=86 op=LOAD Feb 9 09:48:13.374000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.374000 audit[2536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2373 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236343336663739343865386430376136623536363535393639663938 Feb 9 09:48:13.374000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.374000 audit[2536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2373 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236343336663739343865386430376136623536363535393639663938 Feb 9 09:48:13.375000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.375000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.375000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.375000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.375000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.375000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.375000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.375000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.375000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.375000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.375000 audit: BPF prog-id=87 op=LOAD Feb 9 09:48:13.375000 audit[2536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2373 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236343336663739343865386430376136623536363535393639663938 Feb 9 09:48:13.377000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.377000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.377000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.377000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.377000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.377000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.377000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.377000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.377000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.377000 audit: BPF prog-id=88 op=LOAD Feb 9 09:48:13.377000 audit[2536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2373 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236343336663739343865386430376136623536363535393639663938 Feb 9 09:48:13.381000 audit: BPF prog-id=88 op=UNLOAD Feb 9 09:48:13.381000 audit: BPF prog-id=87 op=UNLOAD Feb 9 09:48:13.381000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.381000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.381000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.381000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.381000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.381000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.381000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.381000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.381000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.381000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.381000 audit: BPF prog-id=89 op=LOAD Feb 9 09:48:13.381000 audit[2536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2373 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236343336663739343865386430376136623536363535393639663938 Feb 9 09:48:13.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.401000 audit: BPF prog-id=90 op=LOAD Feb 9 09:48:13.403000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.403000 audit[2523]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2375 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137386166383137313839363039346366303563343035666435363666 Feb 9 09:48:13.403000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.403000 audit[2523]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2375 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137386166383137313839363039346366303563343035666435363666 Feb 9 09:48:13.404000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.404000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.404000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.404000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.404000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.404000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.404000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.404000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.404000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.404000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.404000 audit: BPF prog-id=91 op=LOAD Feb 9 09:48:13.404000 audit[2523]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2375 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137386166383137313839363039346366303563343035666435363666 Feb 9 09:48:13.405000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.405000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.405000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.405000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.405000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.405000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.405000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.405000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.405000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.405000 audit: BPF prog-id=92 op=LOAD Feb 9 09:48:13.405000 audit[2523]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2375 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137386166383137313839363039346366303563343035666435363666 Feb 9 09:48:13.406000 audit: BPF prog-id=92 op=UNLOAD Feb 9 09:48:13.406000 audit: BPF prog-id=91 op=UNLOAD Feb 9 09:48:13.406000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.406000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.406000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.406000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.406000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.406000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.406000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.406000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.406000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.406000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:13.406000 audit: BPF prog-id=93 op=LOAD Feb 9 09:48:13.406000 audit[2523]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2375 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:13.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137386166383137313839363039346366303563343035666435363666 Feb 9 09:48:13.454091 update_engine[1645]: I0209 09:48:13.453586 1645 update_attempter.cc:509] Updating boot flags... Feb 9 09:48:13.478819 env[1656]: time="2024-02-09T09:48:13.478737205Z" level=info msg="StartContainer for \"b6436f7948e8d07a6b56655969f9863229cd16f72c05b09a8a9a31f1ab7a7f9e\" returns successfully" Feb 9 09:48:13.529913 env[1656]: time="2024-02-09T09:48:13.529841649Z" level=info msg="StartContainer for \"a78af8171896094cf05c405fd566f5608ee9985561f99a50f5b4ad6260a71e24\" returns successfully" Feb 9 09:48:14.974214 kubelet[2327]: I0209 09:48:14.974180 2327 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-69" Feb 9 09:48:17.582000 audit[2556]: AVC avc: denied { watch } for pid=2556 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:48:17.585877 kernel: kauditd_printk_skb: 599 callbacks suppressed Feb 9 09:48:17.585987 kernel: audit: type=1400 audit(1707472097.582:703): avc: denied { watch } for pid=2556 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:48:17.594000 audit[2556]: AVC avc: denied { watch } for pid=2556 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:48:17.607473 kernel: audit: type=1400 audit(1707472097.594:704): avc: denied { watch } for pid=2556 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:48:17.594000 audit[2556]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=400aa27240 a2=fc6 a3=0 items=0 ppid=2373 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 key=(null) Feb 9 09:48:17.623600 kernel: audit: type=1300 audit(1707472097.594:704): arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=400aa27240 a2=fc6 a3=0 items=0 ppid=2373 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 key=(null) Feb 9 09:48:17.594000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3639002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:48:17.637613 kernel: audit: type=1327 audit(1707472097.594:704): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3639002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:48:17.582000 audit[2556]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4005d16000 a2=fc6 a3=0 items=0 ppid=2373 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 key=(null) Feb 9 09:48:17.654887 kernel: audit: type=1300 audit(1707472097.582:703): arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4005d16000 a2=fc6 a3=0 items=0 ppid=2373 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 key=(null) Feb 9 09:48:17.582000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3639002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:48:17.667954 kernel: audit: type=1327 audit(1707472097.582:703): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3639002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:48:17.668072 kernel: audit: type=1400 audit(1707472097.606:705): avc: denied { watch } for pid=2556 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:48:17.606000 audit[2556]: AVC avc: denied { watch } for pid=2556 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:48:17.606000 audit[2556]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4005d161b0 a2=fc6 a3=0 items=0 ppid=2373 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 key=(null) Feb 9 09:48:17.695434 kernel: audit: type=1300 audit(1707472097.606:705): arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4005d161b0 a2=fc6 a3=0 items=0 ppid=2373 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 key=(null) Feb 9 09:48:17.695581 kernel: audit: type=1327 audit(1707472097.606:705): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3639002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:48:17.606000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3639002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:48:17.772000 audit[2556]: AVC avc: denied { watch } for pid=2556 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:48:17.794459 kernel: audit: type=1400 audit(1707472097.772:706): avc: denied { watch } for pid=2556 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:48:17.772000 audit[2556]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7f a1=4003b5c780 a2=fc6 a3=0 items=0 ppid=2373 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 key=(null) Feb 9 09:48:17.772000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3639002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:48:18.009000 audit[2556]: AVC avc: denied { watch } for pid=2556 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:48:18.009000 audit[2556]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=44 a1=40067018e0 a2=fc6 a3=0 items=0 ppid=2373 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 key=(null) Feb 9 09:48:18.009000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3639002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:48:18.010000 audit[2556]: AVC avc: denied { watch } for pid=2556 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:48:18.010000 audit[2556]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=44 a1=4003d415f0 a2=fc6 a3=0 items=0 ppid=2373 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 key=(null) Feb 9 09:48:18.010000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3639002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:48:18.046284 kubelet[2327]: E0209 09:48:18.046247 2327 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-21-69\" not found" node="ip-172-31-21-69" Feb 9 09:48:18.212576 kubelet[2327]: I0209 09:48:18.212520 2327 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-21-69" Feb 9 09:48:18.597000 audit[2566]: AVC avc: denied { watch } for pid=2566 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:48:18.597000 audit[2566]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40008a2480 a2=fc6 a3=0 items=0 ppid=2375 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 key=(null) Feb 9 09:48:18.597000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:48:18.598000 audit[2566]: AVC avc: denied { watch } for pid=2566 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:48:18.598000 audit[2566]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40011da0a0 a2=fc6 a3=0 items=0 ppid=2375 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 key=(null) Feb 9 09:48:18.598000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:48:18.837764 kubelet[2327]: I0209 09:48:18.837708 2327 apiserver.go:52] "Watching apiserver" Feb 9 09:48:18.854776 kubelet[2327]: I0209 09:48:18.854623 2327 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 9 09:48:18.907879 kubelet[2327]: I0209 09:48:18.907836 2327 reconciler.go:41] "Reconciler: start to sync state" Feb 9 09:48:20.899678 systemd[1]: Reloading. Feb 9 09:48:21.050350 /usr/lib/systemd/system-generators/torcx-generator[2716]: time="2024-02-09T09:48:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:48:21.050438 /usr/lib/systemd/system-generators/torcx-generator[2716]: time="2024-02-09T09:48:21Z" level=info msg="torcx already run" Feb 9 09:48:21.197846 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:48:21.197885 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:48:21.237275 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:48:21.419000 audit[2566]: AVC avc: denied { watch } for pid=2566 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 09:48:21.419000 audit[2566]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40010f2b00 a2=fc6 a3=0 items=0 ppid=2375 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 key=(null) Feb 9 09:48:21.419000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:48:21.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.441000 audit: BPF prog-id=94 op=LOAD Feb 9 09:48:21.441000 audit: BPF prog-id=55 op=UNLOAD Feb 9 09:48:21.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.441000 audit: BPF prog-id=95 op=LOAD Feb 9 09:48:21.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.441000 audit: BPF prog-id=96 op=LOAD Feb 9 09:48:21.441000 audit: BPF prog-id=56 op=UNLOAD Feb 9 09:48:21.441000 audit: BPF prog-id=57 op=UNLOAD Feb 9 09:48:21.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.443000 audit: BPF prog-id=97 op=LOAD Feb 9 09:48:21.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.443000 audit: BPF prog-id=98 op=LOAD Feb 9 09:48:21.443000 audit: BPF prog-id=58 op=UNLOAD Feb 9 09:48:21.443000 audit: BPF prog-id=59 op=UNLOAD Feb 9 09:48:21.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.446000 audit: BPF prog-id=99 op=LOAD Feb 9 09:48:21.446000 audit: BPF prog-id=90 op=UNLOAD Feb 9 09:48:21.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.448000 audit: BPF prog-id=100 op=LOAD Feb 9 09:48:21.448000 audit: BPF prog-id=82 op=UNLOAD Feb 9 09:48:21.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.450000 audit: BPF prog-id=101 op=LOAD Feb 9 09:48:21.450000 audit: BPF prog-id=60 op=UNLOAD Feb 9 09:48:21.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.451000 audit: BPF prog-id=102 op=LOAD Feb 9 09:48:21.451000 audit: BPF prog-id=61 op=UNLOAD Feb 9 09:48:21.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.453000 audit: BPF prog-id=103 op=LOAD Feb 9 09:48:21.453000 audit: BPF prog-id=74 op=UNLOAD Feb 9 09:48:21.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.456000 audit: BPF prog-id=104 op=LOAD Feb 9 09:48:21.456000 audit: BPF prog-id=86 op=UNLOAD Feb 9 09:48:21.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.458000 audit: BPF prog-id=105 op=LOAD Feb 9 09:48:21.458000 audit: BPF prog-id=62 op=UNLOAD Feb 9 09:48:21.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.459000 audit: BPF prog-id=106 op=LOAD Feb 9 09:48:21.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.460000 audit: BPF prog-id=107 op=LOAD Feb 9 09:48:21.460000 audit: BPF prog-id=63 op=UNLOAD Feb 9 09:48:21.460000 audit: BPF prog-id=64 op=UNLOAD Feb 9 09:48:21.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.465000 audit: BPF prog-id=108 op=LOAD Feb 9 09:48:21.466000 audit: BPF prog-id=65 op=UNLOAD Feb 9 09:48:21.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.472000 audit: BPF prog-id=109 op=LOAD Feb 9 09:48:21.472000 audit: BPF prog-id=66 op=UNLOAD Feb 9 09:48:21.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.472000 audit: BPF prog-id=110 op=LOAD Feb 9 09:48:21.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.472000 audit: BPF prog-id=111 op=LOAD Feb 9 09:48:21.472000 audit: BPF prog-id=67 op=UNLOAD Feb 9 09:48:21.472000 audit: BPF prog-id=68 op=UNLOAD Feb 9 09:48:21.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.474000 audit: BPF prog-id=112 op=LOAD Feb 9 09:48:21.474000 audit: BPF prog-id=69 op=UNLOAD Feb 9 09:48:21.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.476000 audit: BPF prog-id=113 op=LOAD Feb 9 09:48:21.476000 audit: BPF prog-id=70 op=UNLOAD Feb 9 09:48:21.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.478000 audit: BPF prog-id=114 op=LOAD Feb 9 09:48:21.478000 audit: BPF prog-id=78 op=UNLOAD Feb 9 09:48:21.512256 systemd[1]: Stopping kubelet.service... Feb 9 09:48:21.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:48:21.533176 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 09:48:21.533631 systemd[1]: Stopped kubelet.service. Feb 9 09:48:21.533718 systemd[1]: kubelet.service: Consumed 2.614s CPU time. Feb 9 09:48:21.538605 systemd[1]: Started kubelet.service. Feb 9 09:48:21.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:48:21.677573 kubelet[2771]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 09:48:21.679007 kubelet[2771]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 09:48:21.679212 kubelet[2771]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 09:48:21.679586 kubelet[2771]: I0209 09:48:21.679488 2771 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 09:48:21.688947 kubelet[2771]: I0209 09:48:21.688905 2771 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 9 09:48:21.689634 kubelet[2771]: I0209 09:48:21.689600 2771 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 09:48:21.690237 kubelet[2771]: I0209 09:48:21.690207 2771 server.go:837] "Client rotation is on, will bootstrap in background" Feb 9 09:48:21.696340 kubelet[2771]: I0209 09:48:21.695580 2771 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 09:48:21.698367 kubelet[2771]: I0209 09:48:21.698323 2771 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 09:48:21.702648 kubelet[2771]: W0209 09:48:21.702614 2771 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 09:48:21.704559 kubelet[2771]: I0209 09:48:21.704390 2771 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 09:48:21.705457 kubelet[2771]: I0209 09:48:21.705385 2771 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 09:48:21.705778 kubelet[2771]: I0209 09:48:21.705755 2771 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 09:48:21.706028 kubelet[2771]: I0209 09:48:21.706005 2771 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 09:48:21.706181 kubelet[2771]: I0209 09:48:21.706160 2771 container_manager_linux.go:302] "Creating device plugin manager" Feb 9 09:48:21.706359 kubelet[2771]: I0209 09:48:21.706325 2771 state_mem.go:36] "Initialized new in-memory state store" Feb 9 09:48:21.714785 kubelet[2771]: I0209 09:48:21.714749 2771 kubelet.go:405] "Attempting to sync node with API server" Feb 9 09:48:21.715006 kubelet[2771]: I0209 09:48:21.714983 2771 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 09:48:21.715200 kubelet[2771]: I0209 09:48:21.715180 2771 kubelet.go:309] "Adding apiserver pod source" Feb 9 09:48:21.715346 kubelet[2771]: I0209 09:48:21.715324 2771 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 09:48:21.717199 kubelet[2771]: I0209 09:48:21.717153 2771 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 09:48:21.718635 kubelet[2771]: I0209 09:48:21.718579 2771 server.go:1168] "Started kubelet" Feb 9 09:48:21.722000 audit[2771]: AVC avc: denied { mac_admin } for pid=2771 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.722000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:48:21.722000 audit[2771]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40008a34a0 a1=40008d08b8 a2=40008a3470 a3=25 items=0 ppid=1 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:21.722000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:48:21.727526 kubelet[2771]: I0209 09:48:21.721049 2771 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 09:48:21.728268 kubelet[2771]: I0209 09:48:21.724481 2771 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 09:48:21.729973 kubelet[2771]: I0209 09:48:21.729935 2771 server.go:461] "Adding debug handlers to kubelet server" Feb 9 09:48:21.733216 kubelet[2771]: I0209 09:48:21.732786 2771 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 09:48:21.731000 audit[2771]: AVC avc: denied { mac_admin } for pid=2771 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:21.731000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:48:21.731000 audit[2771]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000adff80 a1=40009233e0 a2=4000911c50 a3=25 items=0 ppid=1 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:21.731000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:48:21.756559 kubelet[2771]: E0209 09:48:21.756521 2771 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 09:48:21.756806 kubelet[2771]: E0209 09:48:21.756783 2771 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 09:48:21.767712 kubelet[2771]: I0209 09:48:21.767655 2771 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 09:48:21.767867 kubelet[2771]: I0209 09:48:21.767730 2771 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 09:48:21.781751 kubelet[2771]: I0209 09:48:21.781713 2771 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 9 09:48:21.782350 kubelet[2771]: I0209 09:48:21.782325 2771 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 9 09:48:21.851080 kubelet[2771]: I0209 09:48:21.851045 2771 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 09:48:21.853476 kubelet[2771]: I0209 09:48:21.853406 2771 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 09:48:21.853986 kubelet[2771]: I0209 09:48:21.853959 2771 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 9 09:48:21.854141 kubelet[2771]: I0209 09:48:21.854119 2771 kubelet.go:2257] "Starting kubelet main sync loop" Feb 9 09:48:21.854327 kubelet[2771]: E0209 09:48:21.854305 2771 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 09:48:21.890466 kubelet[2771]: I0209 09:48:21.890387 2771 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-21-69" Feb 9 09:48:21.917390 kubelet[2771]: I0209 09:48:21.916803 2771 kubelet_node_status.go:108] "Node was previously registered" node="ip-172-31-21-69" Feb 9 09:48:21.917390 kubelet[2771]: I0209 09:48:21.916930 2771 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-21-69" Feb 9 09:48:21.955993 kubelet[2771]: E0209 09:48:21.954872 2771 kubelet.go:2281] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 9 09:48:21.996208 kubelet[2771]: I0209 09:48:21.996169 2771 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 09:48:21.996436 kubelet[2771]: I0209 09:48:21.996392 2771 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 09:48:21.996615 kubelet[2771]: I0209 09:48:21.996593 2771 state_mem.go:36] "Initialized new in-memory state store" Feb 9 09:48:21.997281 kubelet[2771]: I0209 09:48:21.997252 2771 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 09:48:21.997495 kubelet[2771]: I0209 09:48:21.997473 2771 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 9 09:48:21.997609 kubelet[2771]: I0209 09:48:21.997589 2771 policy_none.go:49] "None policy: Start" Feb 9 09:48:21.999495 kubelet[2771]: I0209 09:48:21.999460 2771 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 09:48:21.999727 kubelet[2771]: I0209 09:48:21.999705 2771 state_mem.go:35] "Initializing new in-memory state store" Feb 9 09:48:22.000233 kubelet[2771]: I0209 09:48:22.000203 2771 state_mem.go:75] "Updated machine memory state" Feb 9 09:48:22.016358 kubelet[2771]: I0209 09:48:22.016305 2771 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 09:48:22.017000 audit[2771]: AVC avc: denied { mac_admin } for pid=2771 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:22.017000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:48:22.017000 audit[2771]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40010b8840 a1=40010dfdd0 a2=40010b8810 a3=25 items=0 ppid=1 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:22.017000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:48:22.021615 kubelet[2771]: I0209 09:48:22.021584 2771 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 09:48:22.030883 kubelet[2771]: I0209 09:48:22.030848 2771 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 09:48:22.156560 kubelet[2771]: I0209 09:48:22.156514 2771 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:48:22.156870 kubelet[2771]: I0209 09:48:22.156846 2771 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:48:22.157037 kubelet[2771]: I0209 09:48:22.157015 2771 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:48:22.188695 kubelet[2771]: I0209 09:48:22.188641 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8c259380ca74386965c80a47048300c8-ca-certs\") pod \"kube-apiserver-ip-172-31-21-69\" (UID: \"8c259380ca74386965c80a47048300c8\") " pod="kube-system/kube-apiserver-ip-172-31-21-69" Feb 9 09:48:22.188949 kubelet[2771]: I0209 09:48:22.188914 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8c259380ca74386965c80a47048300c8-k8s-certs\") pod \"kube-apiserver-ip-172-31-21-69\" (UID: \"8c259380ca74386965c80a47048300c8\") " pod="kube-system/kube-apiserver-ip-172-31-21-69" Feb 9 09:48:22.189150 kubelet[2771]: I0209 09:48:22.189116 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8c259380ca74386965c80a47048300c8-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-21-69\" (UID: \"8c259380ca74386965c80a47048300c8\") " pod="kube-system/kube-apiserver-ip-172-31-21-69" Feb 9 09:48:22.189300 kubelet[2771]: I0209 09:48:22.189279 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/0cb7d9ec479954cc4adad57bd2dc5d29-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-21-69\" (UID: \"0cb7d9ec479954cc4adad57bd2dc5d29\") " pod="kube-system/kube-controller-manager-ip-172-31-21-69" Feb 9 09:48:22.189513 kubelet[2771]: I0209 09:48:22.189491 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0cb7d9ec479954cc4adad57bd2dc5d29-k8s-certs\") pod \"kube-controller-manager-ip-172-31-21-69\" (UID: \"0cb7d9ec479954cc4adad57bd2dc5d29\") " pod="kube-system/kube-controller-manager-ip-172-31-21-69" Feb 9 09:48:22.189678 kubelet[2771]: I0209 09:48:22.189657 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0cb7d9ec479954cc4adad57bd2dc5d29-kubeconfig\") pod \"kube-controller-manager-ip-172-31-21-69\" (UID: \"0cb7d9ec479954cc4adad57bd2dc5d29\") " pod="kube-system/kube-controller-manager-ip-172-31-21-69" Feb 9 09:48:22.189874 kubelet[2771]: I0209 09:48:22.189841 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0cb7d9ec479954cc4adad57bd2dc5d29-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-21-69\" (UID: \"0cb7d9ec479954cc4adad57bd2dc5d29\") " pod="kube-system/kube-controller-manager-ip-172-31-21-69" Feb 9 09:48:22.190031 kubelet[2771]: I0209 09:48:22.190011 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0cb7d9ec479954cc4adad57bd2dc5d29-ca-certs\") pod \"kube-controller-manager-ip-172-31-21-69\" (UID: \"0cb7d9ec479954cc4adad57bd2dc5d29\") " pod="kube-system/kube-controller-manager-ip-172-31-21-69" Feb 9 09:48:22.190220 kubelet[2771]: I0209 09:48:22.190187 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/86cf1d40ca89d05432d12087da428fb5-kubeconfig\") pod \"kube-scheduler-ip-172-31-21-69\" (UID: \"86cf1d40ca89d05432d12087da428fb5\") " pod="kube-system/kube-scheduler-ip-172-31-21-69" Feb 9 09:48:22.716664 kubelet[2771]: I0209 09:48:22.716601 2771 apiserver.go:52] "Watching apiserver" Feb 9 09:48:22.783024 kubelet[2771]: I0209 09:48:22.782978 2771 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 9 09:48:22.793524 kubelet[2771]: I0209 09:48:22.793467 2771 reconciler.go:41] "Reconciler: start to sync state" Feb 9 09:48:22.907541 kubelet[2771]: I0209 09:48:22.907477 2771 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-21-69" podStartSLOduration=0.90736995 podCreationTimestamp="2024-02-09 09:48:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:48:22.887183197 +0000 UTC m=+1.339802769" watchObservedRunningTime="2024-02-09 09:48:22.90736995 +0000 UTC m=+1.359989534" Feb 9 09:48:22.935970 kubelet[2771]: I0209 09:48:22.935919 2771 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-21-69" podStartSLOduration=0.93584233 podCreationTimestamp="2024-02-09 09:48:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:48:22.908498217 +0000 UTC m=+1.361117801" watchObservedRunningTime="2024-02-09 09:48:22.93584233 +0000 UTC m=+1.388461914" Feb 9 09:48:22.950117 kubelet[2771]: I0209 09:48:22.950056 2771 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-21-69" podStartSLOduration=0.950002882 podCreationTimestamp="2024-02-09 09:48:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:48:22.936896448 +0000 UTC m=+1.389516032" watchObservedRunningTime="2024-02-09 09:48:22.950002882 +0000 UTC m=+1.402622466" Feb 9 09:48:28.033865 sudo[1912]: pam_unix(sudo:session): session closed for user root Feb 9 09:48:28.037449 kernel: kauditd_printk_skb: 275 callbacks suppressed Feb 9 09:48:28.037655 kernel: audit: type=1106 audit(1707472108.032:961): pid=1912 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:48:28.032000 audit[1912]: USER_END pid=1912 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:48:28.032000 audit[1912]: CRED_DISP pid=1912 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:48:28.053586 kernel: audit: type=1104 audit(1707472108.032:962): pid=1912 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:48:28.057777 sshd[1909]: pam_unix(sshd:session): session closed for user core Feb 9 09:48:28.062285 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 09:48:28.062664 systemd[1]: session-7.scope: Consumed 13.065s CPU time. Feb 9 09:48:28.063506 systemd-logind[1641]: Session 7 logged out. Waiting for processes to exit. Feb 9 09:48:28.063772 systemd[1]: sshd@6-172.31.21.69:22-139.178.89.65:49852.service: Deactivated successfully. Feb 9 09:48:28.058000 audit[1909]: USER_END pid=1909 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:48:28.079065 kernel: audit: type=1106 audit(1707472108.058:963): pid=1909 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:48:28.079194 kernel: audit: type=1104 audit(1707472108.058:964): pid=1909 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:48:28.058000 audit[1909]: CRED_DISP pid=1909 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:48:28.078148 systemd-logind[1641]: Removed session 7. Feb 9 09:48:28.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.21.69:22-139.178.89.65:49852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:48:28.096791 kernel: audit: type=1131 audit(1707472108.062:965): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.21.69:22-139.178.89.65:49852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:48:32.947000 audit[2566]: AVC avc: denied { watch } for pid=2566 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:48:32.947000 audit[2566]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40007847e0 a2=fc6 a3=0 items=0 ppid=2375 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 key=(null) Feb 9 09:48:32.969871 kernel: audit: type=1400 audit(1707472112.947:966): avc: denied { watch } for pid=2566 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:48:32.970004 kernel: audit: type=1300 audit(1707472112.947:966): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40007847e0 a2=fc6 a3=0 items=0 ppid=2375 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 key=(null) Feb 9 09:48:32.947000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:48:32.980368 kernel: audit: type=1327 audit(1707472112.947:966): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:48:32.947000 audit[2566]: AVC avc: denied { watch } for pid=2566 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:48:32.989877 kernel: audit: type=1400 audit(1707472112.947:967): avc: denied { watch } for pid=2566 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:48:32.947000 audit[2566]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000784920 a2=fc6 a3=0 items=0 ppid=2375 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 key=(null) Feb 9 09:48:33.002437 kernel: audit: type=1300 audit(1707472112.947:967): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000784920 a2=fc6 a3=0 items=0 ppid=2375 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 key=(null) Feb 9 09:48:32.947000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:48:32.947000 audit[2566]: AVC avc: denied { watch } for pid=2566 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:48:32.947000 audit[2566]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000784a60 a2=fc6 a3=0 items=0 ppid=2375 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 key=(null) Feb 9 09:48:32.947000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:48:32.953000 audit[2566]: AVC avc: denied { watch } for pid=2566 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:48:32.953000 audit[2566]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000784ba0 a2=fc6 a3=0 items=0 ppid=2375 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 key=(null) Feb 9 09:48:32.953000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:48:35.001219 kubelet[2771]: I0209 09:48:35.001171 2771 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 9 09:48:35.002638 env[1656]: time="2024-02-09T09:48:35.002562284Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 09:48:35.003265 kubelet[2771]: I0209 09:48:35.002944 2771 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 9 09:48:35.827868 kubelet[2771]: I0209 09:48:35.827798 2771 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:48:35.842199 systemd[1]: Created slice kubepods-besteffort-pod6e355742_9afb_4f34_ad97_5ffe32a99842.slice. Feb 9 09:48:35.874979 kubelet[2771]: I0209 09:48:35.874935 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/6e355742-9afb-4f34-ad97-5ffe32a99842-kube-proxy\") pod \"kube-proxy-qks4m\" (UID: \"6e355742-9afb-4f34-ad97-5ffe32a99842\") " pod="kube-system/kube-proxy-qks4m" Feb 9 09:48:35.875285 kubelet[2771]: I0209 09:48:35.875246 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-27kwp\" (UniqueName: \"kubernetes.io/projected/6e355742-9afb-4f34-ad97-5ffe32a99842-kube-api-access-27kwp\") pod \"kube-proxy-qks4m\" (UID: \"6e355742-9afb-4f34-ad97-5ffe32a99842\") " pod="kube-system/kube-proxy-qks4m" Feb 9 09:48:35.875488 kubelet[2771]: I0209 09:48:35.875461 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6e355742-9afb-4f34-ad97-5ffe32a99842-lib-modules\") pod \"kube-proxy-qks4m\" (UID: \"6e355742-9afb-4f34-ad97-5ffe32a99842\") " pod="kube-system/kube-proxy-qks4m" Feb 9 09:48:35.875695 kubelet[2771]: I0209 09:48:35.875659 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6e355742-9afb-4f34-ad97-5ffe32a99842-xtables-lock\") pod \"kube-proxy-qks4m\" (UID: \"6e355742-9afb-4f34-ad97-5ffe32a99842\") " pod="kube-system/kube-proxy-qks4m" Feb 9 09:48:35.966972 kubelet[2771]: I0209 09:48:35.966918 2771 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:48:35.977457 systemd[1]: Created slice kubepods-besteffort-pod33bbb133_78c4_4ca0_87d6_058df4f543d4.slice. Feb 9 09:48:36.081066 kubelet[2771]: I0209 09:48:36.080518 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/33bbb133-78c4-4ca0-87d6-058df4f543d4-var-lib-calico\") pod \"tigera-operator-7ff8dc855-cvgwc\" (UID: \"33bbb133-78c4-4ca0-87d6-058df4f543d4\") " pod="tigera-operator/tigera-operator-7ff8dc855-cvgwc" Feb 9 09:48:36.081066 kubelet[2771]: I0209 09:48:36.080602 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b2g9t\" (UniqueName: \"kubernetes.io/projected/33bbb133-78c4-4ca0-87d6-058df4f543d4-kube-api-access-b2g9t\") pod \"tigera-operator-7ff8dc855-cvgwc\" (UID: \"33bbb133-78c4-4ca0-87d6-058df4f543d4\") " pod="tigera-operator/tigera-operator-7ff8dc855-cvgwc" Feb 9 09:48:36.163360 env[1656]: time="2024-02-09T09:48:36.162845419Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-qks4m,Uid:6e355742-9afb-4f34-ad97-5ffe32a99842,Namespace:kube-system,Attempt:0,}" Feb 9 09:48:36.210465 env[1656]: time="2024-02-09T09:48:36.201543902Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:48:36.210465 env[1656]: time="2024-02-09T09:48:36.201615418Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:48:36.210465 env[1656]: time="2024-02-09T09:48:36.201642049Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:48:36.210465 env[1656]: time="2024-02-09T09:48:36.202131571Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8c1ce1d1c0c35724df04f081d312566635f2039f6e42392ffda734f566994226 pid=2853 runtime=io.containerd.runc.v2 Feb 9 09:48:36.246923 systemd[1]: Started cri-containerd-8c1ce1d1c0c35724df04f081d312566635f2039f6e42392ffda734f566994226.scope. Feb 9 09:48:36.289461 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 09:48:36.289596 kernel: audit: type=1400 audit(1707472116.279:970): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.298739 kernel: audit: type=1400 audit(1707472116.279:971): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.298878 kernel: audit: type=1400 audit(1707472116.279:972): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.305936 env[1656]: time="2024-02-09T09:48:36.305862013Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-cvgwc,Uid:33bbb133-78c4-4ca0-87d6-058df4f543d4,Namespace:tigera-operator,Attempt:0,}" Feb 9 09:48:36.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.313834 kernel: audit: type=1400 audit(1707472116.279:973): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.321547 kernel: audit: type=1400 audit(1707472116.279:974): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.330734 kernel: audit: type=1400 audit(1707472116.279:975): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.338837 kernel: audit: type=1400 audit(1707472116.279:976): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.347615 kernel: audit: type=1400 audit(1707472116.279:977): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.359577 kernel: audit: type=1400 audit(1707472116.279:978): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.369488 kernel: audit: type=1400 audit(1707472116.279:979): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.279000 audit: BPF prog-id=115 op=LOAD Feb 9 09:48:36.289000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.289000 audit[2866]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2853 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.289000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863316365316431633063333537323464663034663038316433313235 Feb 9 09:48:36.289000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.289000 audit[2866]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2853 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.289000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863316365316431633063333537323464663034663038316433313235 Feb 9 09:48:36.289000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.289000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.289000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.289000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.289000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.289000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.289000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.289000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.289000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.289000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.289000 audit: BPF prog-id=116 op=LOAD Feb 9 09:48:36.289000 audit[2866]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2853 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.289000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863316365316431633063333537323464663034663038316433313235 Feb 9 09:48:36.297000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.297000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.297000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.297000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.297000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.297000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.297000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.297000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.297000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.297000 audit: BPF prog-id=117 op=LOAD Feb 9 09:48:36.297000 audit[2866]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2853 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863316365316431633063333537323464663034663038316433313235 Feb 9 09:48:36.304000 audit: BPF prog-id=117 op=UNLOAD Feb 9 09:48:36.304000 audit: BPF prog-id=116 op=UNLOAD Feb 9 09:48:36.304000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.304000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.304000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.304000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.304000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.304000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.304000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.304000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.304000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.304000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.304000 audit: BPF prog-id=118 op=LOAD Feb 9 09:48:36.304000 audit[2866]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2853 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863316365316431633063333537323464663034663038316433313235 Feb 9 09:48:36.376517 env[1656]: time="2024-02-09T09:48:36.376141715Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:48:36.376517 env[1656]: time="2024-02-09T09:48:36.376213459Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:48:36.376517 env[1656]: time="2024-02-09T09:48:36.376239262Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:48:36.378199 env[1656]: time="2024-02-09T09:48:36.376752103Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9567fdabb4325653809084c24b886f7e423c2685fdf2af50433441e205cd183e pid=2897 runtime=io.containerd.runc.v2 Feb 9 09:48:36.398870 env[1656]: time="2024-02-09T09:48:36.398784107Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-qks4m,Uid:6e355742-9afb-4f34-ad97-5ffe32a99842,Namespace:kube-system,Attempt:0,} returns sandbox id \"8c1ce1d1c0c35724df04f081d312566635f2039f6e42392ffda734f566994226\"" Feb 9 09:48:36.407641 env[1656]: time="2024-02-09T09:48:36.407585507Z" level=info msg="CreateContainer within sandbox \"8c1ce1d1c0c35724df04f081d312566635f2039f6e42392ffda734f566994226\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 09:48:36.435684 env[1656]: time="2024-02-09T09:48:36.435614748Z" level=info msg="CreateContainer within sandbox \"8c1ce1d1c0c35724df04f081d312566635f2039f6e42392ffda734f566994226\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"af6c20d6b4d82ed28f07980fef2790a5b01535dc7f3f0f54c13b4b3f7554c30a\"" Feb 9 09:48:36.437184 env[1656]: time="2024-02-09T09:48:36.437107919Z" level=info msg="StartContainer for \"af6c20d6b4d82ed28f07980fef2790a5b01535dc7f3f0f54c13b4b3f7554c30a\"" Feb 9 09:48:36.439175 systemd[1]: Started cri-containerd-9567fdabb4325653809084c24b886f7e423c2685fdf2af50433441e205cd183e.scope. Feb 9 09:48:36.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.467000 audit: BPF prog-id=119 op=LOAD Feb 9 09:48:36.468000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.468000 audit[2907]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2897 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935363766646162623433323536353338303930383463323462383836 Feb 9 09:48:36.468000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.468000 audit[2907]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2897 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935363766646162623433323536353338303930383463323462383836 Feb 9 09:48:36.469000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.469000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.469000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.469000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.469000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.469000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.469000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.469000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.469000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.469000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.469000 audit: BPF prog-id=120 op=LOAD Feb 9 09:48:36.469000 audit[2907]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2897 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935363766646162623433323536353338303930383463323462383836 Feb 9 09:48:36.469000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.469000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.469000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.469000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.469000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.469000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.469000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.469000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.469000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.469000 audit: BPF prog-id=121 op=LOAD Feb 9 09:48:36.469000 audit[2907]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2897 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935363766646162623433323536353338303930383463323462383836 Feb 9 09:48:36.470000 audit: BPF prog-id=121 op=UNLOAD Feb 9 09:48:36.470000 audit: BPF prog-id=120 op=UNLOAD Feb 9 09:48:36.470000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.470000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.470000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.470000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.470000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.470000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.470000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.470000 audit[2907]: AVC avc: denied { perfmon } for pid=2907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.470000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.470000 audit[2907]: AVC avc: denied { bpf } for pid=2907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.470000 audit: BPF prog-id=122 op=LOAD Feb 9 09:48:36.470000 audit[2907]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2897 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935363766646162623433323536353338303930383463323462383836 Feb 9 09:48:36.505241 systemd[1]: Started cri-containerd-af6c20d6b4d82ed28f07980fef2790a5b01535dc7f3f0f54c13b4b3f7554c30a.scope. Feb 9 09:48:36.544096 env[1656]: time="2024-02-09T09:48:36.544025378Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-cvgwc,Uid:33bbb133-78c4-4ca0-87d6-058df4f543d4,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"9567fdabb4325653809084c24b886f7e423c2685fdf2af50433441e205cd183e\"" Feb 9 09:48:36.548975 env[1656]: time="2024-02-09T09:48:36.548910284Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 9 09:48:36.556000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.556000 audit[2932]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2853 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166366332306436623464383265643238663037393830666566323739 Feb 9 09:48:36.556000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.556000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.556000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.556000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.556000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.556000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.556000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.556000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.556000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.556000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.556000 audit: BPF prog-id=123 op=LOAD Feb 9 09:48:36.556000 audit[2932]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2853 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166366332306436623464383265643238663037393830666566323739 Feb 9 09:48:36.558000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.558000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.558000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.558000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.558000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.558000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.558000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.558000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.558000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.558000 audit: BPF prog-id=124 op=LOAD Feb 9 09:48:36.558000 audit[2932]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2853 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166366332306436623464383265643238663037393830666566323739 Feb 9 09:48:36.559000 audit: BPF prog-id=124 op=UNLOAD Feb 9 09:48:36.559000 audit: BPF prog-id=123 op=UNLOAD Feb 9 09:48:36.560000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.560000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.560000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.560000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.560000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.560000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.560000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.560000 audit[2932]: AVC avc: denied { perfmon } for pid=2932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.560000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.560000 audit[2932]: AVC avc: denied { bpf } for pid=2932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:36.560000 audit: BPF prog-id=125 op=LOAD Feb 9 09:48:36.560000 audit[2932]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2853 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166366332306436623464383265643238663037393830666566323739 Feb 9 09:48:36.595161 env[1656]: time="2024-02-09T09:48:36.595026184Z" level=info msg="StartContainer for \"af6c20d6b4d82ed28f07980fef2790a5b01535dc7f3f0f54c13b4b3f7554c30a\" returns successfully" Feb 9 09:48:36.706000 audit[2987]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2987 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:36.706000 audit[2987]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdbee48e0 a2=0 a3=ffffa4b8e6c0 items=0 ppid=2944 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.706000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 09:48:36.709000 audit[2988]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2988 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:36.709000 audit[2988]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd8c6c410 a2=0 a3=ffff9af976c0 items=0 ppid=2944 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.709000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 09:48:36.709000 audit[2989]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2989 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:36.709000 audit[2989]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffa0a9c70 a2=0 a3=ffffbec736c0 items=0 ppid=2944 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.709000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 09:48:36.711000 audit[2990]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2990 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:36.711000 audit[2990]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc94f7840 a2=0 a3=ffffa859e6c0 items=0 ppid=2944 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.711000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 09:48:36.712000 audit[2991]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2991 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:36.712000 audit[2991]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd61666d0 a2=0 a3=ffffbc88f6c0 items=0 ppid=2944 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.712000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 09:48:36.714000 audit[2992]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2992 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:36.714000 audit[2992]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff7f30900 a2=0 a3=ffffabc7a6c0 items=0 ppid=2944 pid=2992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.714000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 09:48:36.821000 audit[2993]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2993 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:36.821000 audit[2993]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe767f230 a2=0 a3=ffff8bbb66c0 items=0 ppid=2944 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.821000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 09:48:36.827000 audit[2995]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2995 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:36.827000 audit[2995]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd5fc3020 a2=0 a3=ffffb03266c0 items=0 ppid=2944 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.827000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 09:48:36.834000 audit[2998]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2998 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:36.834000 audit[2998]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffe3300230 a2=0 a3=ffff884166c0 items=0 ppid=2944 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.834000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 09:48:36.840000 audit[2999]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2999 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:36.840000 audit[2999]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc042c4e0 a2=0 a3=ffff8b3d86c0 items=0 ppid=2944 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.840000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 09:48:36.846000 audit[3001]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=3001 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:36.846000 audit[3001]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe6796390 a2=0 a3=ffffbd9f46c0 items=0 ppid=2944 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.846000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 09:48:36.850000 audit[3002]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=3002 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:36.850000 audit[3002]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff83a08d0 a2=0 a3=fffface786c0 items=0 ppid=2944 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.850000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 09:48:36.856000 audit[3004]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=3004 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:36.856000 audit[3004]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd6a0b9c0 a2=0 a3=ffffbd0686c0 items=0 ppid=2944 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.856000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 09:48:36.866000 audit[3007]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=3007 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:36.866000 audit[3007]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffdfb0ccd0 a2=0 a3=ffff868db6c0 items=0 ppid=2944 pid=3007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.866000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 09:48:36.868000 audit[3008]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=3008 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:36.868000 audit[3008]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd3f82270 a2=0 a3=ffff9887c6c0 items=0 ppid=2944 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.868000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 09:48:36.875000 audit[3010]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=3010 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:36.875000 audit[3010]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd533f930 a2=0 a3=ffffaaa0e6c0 items=0 ppid=2944 pid=3010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.875000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 09:48:36.878000 audit[3011]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=3011 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:36.878000 audit[3011]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe23c0540 a2=0 a3=ffffb6f416c0 items=0 ppid=2944 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.878000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 09:48:36.883000 audit[3013]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=3013 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:36.883000 audit[3013]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe2bd0410 a2=0 a3=ffff8f8296c0 items=0 ppid=2944 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.883000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 09:48:36.894000 audit[3016]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3016 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:36.894000 audit[3016]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd3abd7f0 a2=0 a3=ffff8f3f56c0 items=0 ppid=2944 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.894000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 09:48:36.901000 audit[3020]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3020 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:36.901000 audit[3020]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff5624e80 a2=0 a3=ffff957fb6c0 items=0 ppid=2944 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.901000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 09:48:36.904000 audit[3021]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3021 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:36.904000 audit[3021]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff3fdf8c0 a2=0 a3=ffffa14c16c0 items=0 ppid=2944 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.904000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 09:48:36.909000 audit[3023]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3023 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:36.909000 audit[3023]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffc2e60f00 a2=0 a3=ffffa6a036c0 items=0 ppid=2944 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.909000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:48:36.916000 audit[3026]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3026 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:36.916000 audit[3026]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff94076d0 a2=0 a3=ffff8e3b86c0 items=0 ppid=2944 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.916000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:48:36.927000 audit[3031]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3031 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:36.927000 audit[3031]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd62cb090 a2=0 a3=ffffa6d776c0 items=0 ppid=2944 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.927000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 09:48:36.932000 audit[3033]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3033 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:48:36.932000 audit[3033]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffce13d130 a2=0 a3=ffffb23516c0 items=0 ppid=2944 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.932000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 09:48:36.967240 kubelet[2771]: I0209 09:48:36.967196 2771 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-qks4m" podStartSLOduration=1.967140857 podCreationTimestamp="2024-02-09 09:48:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:48:36.965486328 +0000 UTC m=+15.418105924" watchObservedRunningTime="2024-02-09 09:48:36.967140857 +0000 UTC m=+15.419760429" Feb 9 09:48:36.969000 audit[3035]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3035 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:48:36.969000 audit[3035]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffdb3d1bc0 a2=0 a3=ffffa0f8d6c0 items=0 ppid=2944 pid=3035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.969000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:48:36.984000 audit[3035]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3035 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:48:36.984000 audit[3035]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffdb3d1bc0 a2=0 a3=ffffa0f8d6c0 items=0 ppid=2944 pid=3035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.984000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:48:36.986000 audit[3041]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3041 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:36.986000 audit[3041]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffeec5d440 a2=0 a3=ffff9c1f56c0 items=0 ppid=2944 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.986000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 09:48:36.994000 audit[3043]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3043 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:36.994000 audit[3043]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd1504380 a2=0 a3=ffff922a86c0 items=0 ppid=2944 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:36.994000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 09:48:37.003000 audit[3046]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3046 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:37.003000 audit[3046]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffffac40fc0 a2=0 a3=ffff9abf86c0 items=0 ppid=2944 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:37.003000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 09:48:37.006000 audit[3047]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3047 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:37.006000 audit[3047]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe40e0de0 a2=0 a3=ffff9b94a6c0 items=0 ppid=2944 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:37.006000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 09:48:37.011000 audit[3049]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3049 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:37.011000 audit[3049]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd055af20 a2=0 a3=ffffb12296c0 items=0 ppid=2944 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:37.011000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 09:48:37.014000 audit[3050]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3050 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:37.014000 audit[3050]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd3c6a8c0 a2=0 a3=ffff804c66c0 items=0 ppid=2944 pid=3050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:37.014000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 09:48:37.024683 systemd[1]: run-containerd-runc-k8s.io-8c1ce1d1c0c35724df04f081d312566635f2039f6e42392ffda734f566994226-runc.8bGL7q.mount: Deactivated successfully. Feb 9 09:48:37.031000 audit[3052]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3052 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:37.031000 audit[3052]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffecad1120 a2=0 a3=ffffab98f6c0 items=0 ppid=2944 pid=3052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:37.031000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 09:48:37.040000 audit[3055]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3055 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:37.040000 audit[3055]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffffb27bb00 a2=0 a3=ffff8b0a96c0 items=0 ppid=2944 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:37.040000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 09:48:37.042000 audit[3056]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3056 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:37.042000 audit[3056]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc95e60f0 a2=0 a3=ffff998c96c0 items=0 ppid=2944 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:37.042000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 09:48:37.047000 audit[3058]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3058 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:37.047000 audit[3058]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe67bb020 a2=0 a3=ffffb8f9d6c0 items=0 ppid=2944 pid=3058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:37.047000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 09:48:37.049000 audit[3059]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3059 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:37.049000 audit[3059]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe767e230 a2=0 a3=ffff9957b6c0 items=0 ppid=2944 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:37.049000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 09:48:37.055000 audit[3061]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3061 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:37.055000 audit[3061]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff34e3920 a2=0 a3=ffff825a36c0 items=0 ppid=2944 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:37.055000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 09:48:37.063000 audit[3064]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3064 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:37.063000 audit[3064]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffd155c80 a2=0 a3=ffff9eba86c0 items=0 ppid=2944 pid=3064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:37.063000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 09:48:37.071000 audit[3067]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3067 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:37.071000 audit[3067]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffaae3b40 a2=0 a3=ffff8c5a56c0 items=0 ppid=2944 pid=3067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:37.071000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 09:48:37.073000 audit[3068]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3068 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:37.073000 audit[3068]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffcedc7ec0 a2=0 a3=ffff88abc6c0 items=0 ppid=2944 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:37.073000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 09:48:37.078000 audit[3070]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3070 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:37.078000 audit[3070]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffce2d9ca0 a2=0 a3=ffff8fb0e6c0 items=0 ppid=2944 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:37.078000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:48:37.085000 audit[3073]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3073 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:37.085000 audit[3073]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe6973680 a2=0 a3=ffff9a7046c0 items=0 ppid=2944 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:37.085000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:48:37.087000 audit[3074]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_chain pid=3074 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:37.087000 audit[3074]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd4357a40 a2=0 a3=ffff843dd6c0 items=0 ppid=2944 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:37.087000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 09:48:37.092000 audit[3076]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=3076 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:37.092000 audit[3076]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcc849bc0 a2=0 a3=ffff8543b6c0 items=0 ppid=2944 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:37.092000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 09:48:37.101000 audit[3079]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=3079 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:37.101000 audit[3079]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffeb823c30 a2=0 a3=ffff8ecf16c0 items=0 ppid=2944 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:37.101000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 09:48:37.107000 audit[3080]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=3080 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:37.107000 audit[3080]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffce396dc0 a2=0 a3=ffff801c46c0 items=0 ppid=2944 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:37.107000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 09:48:37.112000 audit[3082]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=3082 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:48:37.112000 audit[3082]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff5e24020 a2=0 a3=ffff994086c0 items=0 ppid=2944 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:37.112000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 09:48:37.118000 audit[3084]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3084 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 09:48:37.118000 audit[3084]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffc907b6b0 a2=0 a3=ffff8ea976c0 items=0 ppid=2944 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:37.118000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:48:37.119000 audit[3084]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3084 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 09:48:37.119000 audit[3084]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffc907b6b0 a2=0 a3=ffff8ea976c0 items=0 ppid=2944 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:37.119000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:48:38.460914 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2996052349.mount: Deactivated successfully. Feb 9 09:48:39.433700 env[1656]: time="2024-02-09T09:48:39.433635139Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:39.436829 env[1656]: time="2024-02-09T09:48:39.436763850Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:39.439672 env[1656]: time="2024-02-09T09:48:39.439625245Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:39.442611 env[1656]: time="2024-02-09T09:48:39.442565740Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:39.443908 env[1656]: time="2024-02-09T09:48:39.443864910Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f\"" Feb 9 09:48:39.450643 env[1656]: time="2024-02-09T09:48:39.450589636Z" level=info msg="CreateContainer within sandbox \"9567fdabb4325653809084c24b886f7e423c2685fdf2af50433441e205cd183e\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 9 09:48:39.476223 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3295295515.mount: Deactivated successfully. Feb 9 09:48:39.484322 env[1656]: time="2024-02-09T09:48:39.484258438Z" level=info msg="CreateContainer within sandbox \"9567fdabb4325653809084c24b886f7e423c2685fdf2af50433441e205cd183e\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"3f6c58630ee085354f9e578d54ae135af68aaed9cd57d3a43accc12a6418cc35\"" Feb 9 09:48:39.486057 env[1656]: time="2024-02-09T09:48:39.485982943Z" level=info msg="StartContainer for \"3f6c58630ee085354f9e578d54ae135af68aaed9cd57d3a43accc12a6418cc35\"" Feb 9 09:48:39.531004 systemd[1]: Started cri-containerd-3f6c58630ee085354f9e578d54ae135af68aaed9cd57d3a43accc12a6418cc35.scope. Feb 9 09:48:39.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.563000 audit: BPF prog-id=126 op=LOAD Feb 9 09:48:39.563000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.563000 audit[3092]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2897 pid=3092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:39.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366366335383633306565303835333534663965353738643534616531 Feb 9 09:48:39.563000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.563000 audit[3092]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2897 pid=3092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:39.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366366335383633306565303835333534663965353738643534616531 Feb 9 09:48:39.563000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.563000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.563000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.563000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.563000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.563000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.563000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.563000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.563000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.563000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.563000 audit: BPF prog-id=127 op=LOAD Feb 9 09:48:39.563000 audit[3092]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2897 pid=3092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:39.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366366335383633306565303835333534663965353738643534616531 Feb 9 09:48:39.564000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.564000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.564000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.564000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.564000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.564000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.564000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.564000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.564000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.564000 audit: BPF prog-id=128 op=LOAD Feb 9 09:48:39.564000 audit[3092]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2897 pid=3092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:39.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366366335383633306565303835333534663965353738643534616531 Feb 9 09:48:39.564000 audit: BPF prog-id=128 op=UNLOAD Feb 9 09:48:39.564000 audit: BPF prog-id=127 op=UNLOAD Feb 9 09:48:39.564000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.564000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.564000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.564000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.564000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.564000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.564000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.564000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.564000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.564000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:39.564000 audit: BPF prog-id=129 op=LOAD Feb 9 09:48:39.564000 audit[3092]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2897 pid=3092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:39.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366366335383633306565303835333534663965353738643534616531 Feb 9 09:48:39.594975 env[1656]: time="2024-02-09T09:48:39.594791748Z" level=info msg="StartContainer for \"3f6c58630ee085354f9e578d54ae135af68aaed9cd57d3a43accc12a6418cc35\" returns successfully" Feb 9 09:48:41.876444 kubelet[2771]: I0209 09:48:41.876350 2771 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7ff8dc855-cvgwc" podStartSLOduration=3.97965018 podCreationTimestamp="2024-02-09 09:48:35 +0000 UTC" firstStartedPulling="2024-02-09 09:48:36.547847265 +0000 UTC m=+15.000466837" lastFinishedPulling="2024-02-09 09:48:39.44448481 +0000 UTC m=+17.897104382" observedRunningTime="2024-02-09 09:48:39.970989446 +0000 UTC m=+18.423609018" watchObservedRunningTime="2024-02-09 09:48:41.876287725 +0000 UTC m=+20.328907321" Feb 9 09:48:43.010000 audit[3128]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3128 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:48:43.013684 kernel: kauditd_printk_skb: 357 callbacks suppressed Feb 9 09:48:43.013850 kernel: audit: type=1325 audit(1707472123.010:1081): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3128 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:48:43.010000 audit[3128]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffc0f24460 a2=0 a3=ffffbdcda6c0 items=0 ppid=2944 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:43.031381 kernel: audit: type=1300 audit(1707472123.010:1081): arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffc0f24460 a2=0 a3=ffffbdcda6c0 items=0 ppid=2944 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:43.010000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:48:43.037278 kernel: audit: type=1327 audit(1707472123.010:1081): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:48:43.012000 audit[3128]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3128 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:48:43.044913 kernel: audit: type=1325 audit(1707472123.012:1082): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3128 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:48:43.012000 audit[3128]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffc0f24460 a2=0 a3=ffffbdcda6c0 items=0 ppid=2944 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:43.057750 kernel: audit: type=1300 audit(1707472123.012:1082): arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffc0f24460 a2=0 a3=ffffbdcda6c0 items=0 ppid=2944 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:43.058469 kernel: audit: type=1327 audit(1707472123.012:1082): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:48:43.012000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:48:43.064000 audit[3130]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3130 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:48:43.064000 audit[3130]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=fffff5b768d0 a2=0 a3=ffffae0d26c0 items=0 ppid=2944 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:43.082607 kernel: audit: type=1325 audit(1707472123.064:1083): table=filter:91 family=2 entries=16 op=nft_register_rule pid=3130 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:48:43.082704 kernel: audit: type=1300 audit(1707472123.064:1083): arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=fffff5b768d0 a2=0 a3=ffffae0d26c0 items=0 ppid=2944 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:43.082771 kernel: audit: type=1327 audit(1707472123.064:1083): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:48:43.064000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:48:43.065000 audit[3130]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3130 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:48:43.094067 kernel: audit: type=1325 audit(1707472123.065:1084): table=nat:92 family=2 entries=12 op=nft_register_rule pid=3130 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:48:43.065000 audit[3130]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=fffff5b768d0 a2=0 a3=ffffae0d26c0 items=0 ppid=2944 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:43.065000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:48:43.144052 kubelet[2771]: I0209 09:48:43.144006 2771 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:48:43.157317 systemd[1]: Created slice kubepods-besteffort-pod5e49c5d3_8e31_4d53_834b_b2159f76b701.slice. Feb 9 09:48:43.228810 kubelet[2771]: I0209 09:48:43.228768 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/5e49c5d3-8e31-4d53-834b-b2159f76b701-typha-certs\") pod \"calico-typha-75bf65c895-7cvdc\" (UID: \"5e49c5d3-8e31-4d53-834b-b2159f76b701\") " pod="calico-system/calico-typha-75bf65c895-7cvdc" Feb 9 09:48:43.229087 kubelet[2771]: I0209 09:48:43.229038 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kk5f6\" (UniqueName: \"kubernetes.io/projected/5e49c5d3-8e31-4d53-834b-b2159f76b701-kube-api-access-kk5f6\") pod \"calico-typha-75bf65c895-7cvdc\" (UID: \"5e49c5d3-8e31-4d53-834b-b2159f76b701\") " pod="calico-system/calico-typha-75bf65c895-7cvdc" Feb 9 09:48:43.229296 kubelet[2771]: I0209 09:48:43.229261 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5e49c5d3-8e31-4d53-834b-b2159f76b701-tigera-ca-bundle\") pod \"calico-typha-75bf65c895-7cvdc\" (UID: \"5e49c5d3-8e31-4d53-834b-b2159f76b701\") " pod="calico-system/calico-typha-75bf65c895-7cvdc" Feb 9 09:48:43.325827 kubelet[2771]: I0209 09:48:43.325658 2771 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:48:43.354528 systemd[1]: Created slice kubepods-besteffort-pod35705eab_68d4_487d_bbe4_0875657ca83c.slice. Feb 9 09:48:43.430659 kubelet[2771]: I0209 09:48:43.430599 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/35705eab-68d4-487d-bbe4-0875657ca83c-lib-modules\") pod \"calico-node-q8nqq\" (UID: \"35705eab-68d4-487d-bbe4-0875657ca83c\") " pod="calico-system/calico-node-q8nqq" Feb 9 09:48:43.430868 kubelet[2771]: I0209 09:48:43.430685 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gw4lc\" (UniqueName: \"kubernetes.io/projected/35705eab-68d4-487d-bbe4-0875657ca83c-kube-api-access-gw4lc\") pod \"calico-node-q8nqq\" (UID: \"35705eab-68d4-487d-bbe4-0875657ca83c\") " pod="calico-system/calico-node-q8nqq" Feb 9 09:48:43.430868 kubelet[2771]: I0209 09:48:43.430740 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/35705eab-68d4-487d-bbe4-0875657ca83c-xtables-lock\") pod \"calico-node-q8nqq\" (UID: \"35705eab-68d4-487d-bbe4-0875657ca83c\") " pod="calico-system/calico-node-q8nqq" Feb 9 09:48:43.430868 kubelet[2771]: I0209 09:48:43.430795 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/35705eab-68d4-487d-bbe4-0875657ca83c-policysync\") pod \"calico-node-q8nqq\" (UID: \"35705eab-68d4-487d-bbe4-0875657ca83c\") " pod="calico-system/calico-node-q8nqq" Feb 9 09:48:43.430868 kubelet[2771]: I0209 09:48:43.430842 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/35705eab-68d4-487d-bbe4-0875657ca83c-cni-log-dir\") pod \"calico-node-q8nqq\" (UID: \"35705eab-68d4-487d-bbe4-0875657ca83c\") " pod="calico-system/calico-node-q8nqq" Feb 9 09:48:43.431114 kubelet[2771]: I0209 09:48:43.430889 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/35705eab-68d4-487d-bbe4-0875657ca83c-cni-net-dir\") pod \"calico-node-q8nqq\" (UID: \"35705eab-68d4-487d-bbe4-0875657ca83c\") " pod="calico-system/calico-node-q8nqq" Feb 9 09:48:43.431114 kubelet[2771]: I0209 09:48:43.430937 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/35705eab-68d4-487d-bbe4-0875657ca83c-cni-bin-dir\") pod \"calico-node-q8nqq\" (UID: \"35705eab-68d4-487d-bbe4-0875657ca83c\") " pod="calico-system/calico-node-q8nqq" Feb 9 09:48:43.431114 kubelet[2771]: I0209 09:48:43.430982 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/35705eab-68d4-487d-bbe4-0875657ca83c-flexvol-driver-host\") pod \"calico-node-q8nqq\" (UID: \"35705eab-68d4-487d-bbe4-0875657ca83c\") " pod="calico-system/calico-node-q8nqq" Feb 9 09:48:43.431114 kubelet[2771]: I0209 09:48:43.431030 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/35705eab-68d4-487d-bbe4-0875657ca83c-node-certs\") pod \"calico-node-q8nqq\" (UID: \"35705eab-68d4-487d-bbe4-0875657ca83c\") " pod="calico-system/calico-node-q8nqq" Feb 9 09:48:43.431114 kubelet[2771]: I0209 09:48:43.431074 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/35705eab-68d4-487d-bbe4-0875657ca83c-var-run-calico\") pod \"calico-node-q8nqq\" (UID: \"35705eab-68d4-487d-bbe4-0875657ca83c\") " pod="calico-system/calico-node-q8nqq" Feb 9 09:48:43.431403 kubelet[2771]: I0209 09:48:43.431118 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/35705eab-68d4-487d-bbe4-0875657ca83c-tigera-ca-bundle\") pod \"calico-node-q8nqq\" (UID: \"35705eab-68d4-487d-bbe4-0875657ca83c\") " pod="calico-system/calico-node-q8nqq" Feb 9 09:48:43.431403 kubelet[2771]: I0209 09:48:43.431166 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/35705eab-68d4-487d-bbe4-0875657ca83c-var-lib-calico\") pod \"calico-node-q8nqq\" (UID: \"35705eab-68d4-487d-bbe4-0875657ca83c\") " pod="calico-system/calico-node-q8nqq" Feb 9 09:48:43.452367 kubelet[2771]: I0209 09:48:43.452299 2771 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:48:43.453260 kubelet[2771]: E0209 09:48:43.453221 2771 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xc4l2" podUID=b3342c12-c4d9-47f8-827a-753e9a9e2b4c Feb 9 09:48:43.482446 env[1656]: time="2024-02-09T09:48:43.481499758Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-75bf65c895-7cvdc,Uid:5e49c5d3-8e31-4d53-834b-b2159f76b701,Namespace:calico-system,Attempt:0,}" Feb 9 09:48:43.517565 env[1656]: time="2024-02-09T09:48:43.517396427Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:48:43.517715 env[1656]: time="2024-02-09T09:48:43.517592237Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:48:43.517780 env[1656]: time="2024-02-09T09:48:43.517689446Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:48:43.531678 kubelet[2771]: I0209 09:48:43.531631 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/b3342c12-c4d9-47f8-827a-753e9a9e2b4c-kubelet-dir\") pod \"csi-node-driver-xc4l2\" (UID: \"b3342c12-c4d9-47f8-827a-753e9a9e2b4c\") " pod="calico-system/csi-node-driver-xc4l2" Feb 9 09:48:43.531869 kubelet[2771]: I0209 09:48:43.531707 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/b3342c12-c4d9-47f8-827a-753e9a9e2b4c-socket-dir\") pod \"csi-node-driver-xc4l2\" (UID: \"b3342c12-c4d9-47f8-827a-753e9a9e2b4c\") " pod="calico-system/csi-node-driver-xc4l2" Feb 9 09:48:43.531869 kubelet[2771]: I0209 09:48:43.531757 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/b3342c12-c4d9-47f8-827a-753e9a9e2b4c-registration-dir\") pod \"csi-node-driver-xc4l2\" (UID: \"b3342c12-c4d9-47f8-827a-753e9a9e2b4c\") " pod="calico-system/csi-node-driver-xc4l2" Feb 9 09:48:43.532114 kubelet[2771]: I0209 09:48:43.531904 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/b3342c12-c4d9-47f8-827a-753e9a9e2b4c-varrun\") pod \"csi-node-driver-xc4l2\" (UID: \"b3342c12-c4d9-47f8-827a-753e9a9e2b4c\") " pod="calico-system/csi-node-driver-xc4l2" Feb 9 09:48:43.532114 kubelet[2771]: I0209 09:48:43.531950 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r5cwv\" (UniqueName: \"kubernetes.io/projected/b3342c12-c4d9-47f8-827a-753e9a9e2b4c-kube-api-access-r5cwv\") pod \"csi-node-driver-xc4l2\" (UID: \"b3342c12-c4d9-47f8-827a-753e9a9e2b4c\") " pod="calico-system/csi-node-driver-xc4l2" Feb 9 09:48:43.534574 env[1656]: time="2024-02-09T09:48:43.518134340Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d1a033f3870bbdeb51cd0b9ea622da0851103786b759410534319f85c8464335 pid=3139 runtime=io.containerd.runc.v2 Feb 9 09:48:43.534770 kubelet[2771]: E0209 09:48:43.534390 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.534770 kubelet[2771]: W0209 09:48:43.534496 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.535203 kubelet[2771]: E0209 09:48:43.534948 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.538116 kubelet[2771]: E0209 09:48:43.538068 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.538327 kubelet[2771]: W0209 09:48:43.538295 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.538579 kubelet[2771]: E0209 09:48:43.538543 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.541144 kubelet[2771]: E0209 09:48:43.541112 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.542335 kubelet[2771]: W0209 09:48:43.542278 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.544527 kubelet[2771]: E0209 09:48:43.544471 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.559634 kubelet[2771]: E0209 09:48:43.559597 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.559828 kubelet[2771]: W0209 09:48:43.559800 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.560319 kubelet[2771]: E0209 09:48:43.560294 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.560513 kubelet[2771]: W0209 09:48:43.560484 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.561023 kubelet[2771]: E0209 09:48:43.560997 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.561188 kubelet[2771]: W0209 09:48:43.561162 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.561452 kubelet[2771]: E0209 09:48:43.560563 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.561452 kubelet[2771]: E0209 09:48:43.561257 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.561628 kubelet[2771]: E0209 09:48:43.561477 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.562117 kubelet[2771]: E0209 09:48:43.562089 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.562277 kubelet[2771]: W0209 09:48:43.562249 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.562495 kubelet[2771]: E0209 09:48:43.562456 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.562971 kubelet[2771]: E0209 09:48:43.562939 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.563155 kubelet[2771]: W0209 09:48:43.563124 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.563335 kubelet[2771]: E0209 09:48:43.563310 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.563967 kubelet[2771]: E0209 09:48:43.563937 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.564165 kubelet[2771]: W0209 09:48:43.564135 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.564296 kubelet[2771]: E0209 09:48:43.564273 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.564938 kubelet[2771]: E0209 09:48:43.564907 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.565155 kubelet[2771]: W0209 09:48:43.565125 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.565447 kubelet[2771]: E0209 09:48:43.565387 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.565999 kubelet[2771]: E0209 09:48:43.565971 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.566165 kubelet[2771]: W0209 09:48:43.566138 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.566295 kubelet[2771]: E0209 09:48:43.566273 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.566859 kubelet[2771]: E0209 09:48:43.566830 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.567015 kubelet[2771]: W0209 09:48:43.566990 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.567178 kubelet[2771]: E0209 09:48:43.567156 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.567903 kubelet[2771]: E0209 09:48:43.567851 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.567903 kubelet[2771]: W0209 09:48:43.567892 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.568104 kubelet[2771]: E0209 09:48:43.567929 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.568243 kubelet[2771]: E0209 09:48:43.568209 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.568243 kubelet[2771]: W0209 09:48:43.568236 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.568389 kubelet[2771]: E0209 09:48:43.568263 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.568702 kubelet[2771]: E0209 09:48:43.568612 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.568702 kubelet[2771]: W0209 09:48:43.568642 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.568702 kubelet[2771]: E0209 09:48:43.568671 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.569608 kubelet[2771]: E0209 09:48:43.569560 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.569608 kubelet[2771]: W0209 09:48:43.569601 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.569819 kubelet[2771]: E0209 09:48:43.569638 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.571666 kubelet[2771]: E0209 09:48:43.571624 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.571666 kubelet[2771]: W0209 09:48:43.571661 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.571899 kubelet[2771]: E0209 09:48:43.571722 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.574644 kubelet[2771]: E0209 09:48:43.574587 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.574644 kubelet[2771]: W0209 09:48:43.574626 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.574971 kubelet[2771]: E0209 09:48:43.574944 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.575149 kubelet[2771]: E0209 09:48:43.575002 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.575268 kubelet[2771]: W0209 09:48:43.575242 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.575765 kubelet[2771]: E0209 09:48:43.575737 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.579549 kubelet[2771]: W0209 09:48:43.575949 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.579802 kubelet[2771]: E0209 09:48:43.579769 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.580354 kubelet[2771]: E0209 09:48:43.580324 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.580585 kubelet[2771]: W0209 09:48:43.580554 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.580718 kubelet[2771]: E0209 09:48:43.580695 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.581543 kubelet[2771]: E0209 09:48:43.581510 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.581731 kubelet[2771]: W0209 09:48:43.581702 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.581887 kubelet[2771]: E0209 09:48:43.581864 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.582332 kubelet[2771]: E0209 09:48:43.576770 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.603044 systemd[1]: Started cri-containerd-d1a033f3870bbdeb51cd0b9ea622da0851103786b759410534319f85c8464335.scope. Feb 9 09:48:43.632999 kubelet[2771]: E0209 09:48:43.632947 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.632999 kubelet[2771]: W0209 09:48:43.632987 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.633263 kubelet[2771]: E0209 09:48:43.633029 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.633781 kubelet[2771]: E0209 09:48:43.633739 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.633781 kubelet[2771]: W0209 09:48:43.633775 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.633976 kubelet[2771]: E0209 09:48:43.633810 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.634274 kubelet[2771]: E0209 09:48:43.634235 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.634274 kubelet[2771]: W0209 09:48:43.634268 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.634493 kubelet[2771]: E0209 09:48:43.634311 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.634750 kubelet[2771]: E0209 09:48:43.634710 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.634750 kubelet[2771]: W0209 09:48:43.634744 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.634914 kubelet[2771]: E0209 09:48:43.634780 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.635620 kubelet[2771]: E0209 09:48:43.635575 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.635620 kubelet[2771]: W0209 09:48:43.635613 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.635847 kubelet[2771]: E0209 09:48:43.635661 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.637590 kubelet[2771]: E0209 09:48:43.637545 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.637590 kubelet[2771]: W0209 09:48:43.637581 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.637831 kubelet[2771]: E0209 09:48:43.637766 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.638055 kubelet[2771]: E0209 09:48:43.638024 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.638055 kubelet[2771]: W0209 09:48:43.638050 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.638214 kubelet[2771]: E0209 09:48:43.638199 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.639619 kubelet[2771]: E0209 09:48:43.639568 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.639619 kubelet[2771]: W0209 09:48:43.639608 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.639876 kubelet[2771]: E0209 09:48:43.639812 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.640098 kubelet[2771]: E0209 09:48:43.640066 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.640098 kubelet[2771]: W0209 09:48:43.640093 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.640283 kubelet[2771]: E0209 09:48:43.640252 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.641626 kubelet[2771]: E0209 09:48:43.641575 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.641626 kubelet[2771]: W0209 09:48:43.641614 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.641964 kubelet[2771]: E0209 09:48:43.641820 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.642180 kubelet[2771]: E0209 09:48:43.642140 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.642180 kubelet[2771]: W0209 09:48:43.642170 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.642368 kubelet[2771]: E0209 09:48:43.642340 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.645622 kubelet[2771]: E0209 09:48:43.645567 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.645622 kubelet[2771]: W0209 09:48:43.645607 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.654609 kubelet[2771]: E0209 09:48:43.654556 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.654609 kubelet[2771]: W0209 09:48:43.654595 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.655503 kubelet[2771]: E0209 09:48:43.655456 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.655503 kubelet[2771]: E0209 09:48:43.655506 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.655701 kubelet[2771]: E0209 09:48:43.655598 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.655701 kubelet[2771]: W0209 09:48:43.655615 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.656095 kubelet[2771]: E0209 09:48:43.655905 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.658149 kubelet[2771]: E0209 09:48:43.658097 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.658149 kubelet[2771]: W0209 09:48:43.658133 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.658362 kubelet[2771]: E0209 09:48:43.658336 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.658635 kubelet[2771]: E0209 09:48:43.658603 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.658635 kubelet[2771]: W0209 09:48:43.658630 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.658822 kubelet[2771]: E0209 09:48:43.658796 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.659033 kubelet[2771]: E0209 09:48:43.659002 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.659033 kubelet[2771]: W0209 09:48:43.659027 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.659202 kubelet[2771]: E0209 09:48:43.659173 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.659612 kubelet[2771]: E0209 09:48:43.659575 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.659612 kubelet[2771]: W0209 09:48:43.659604 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.659832 kubelet[2771]: E0209 09:48:43.659784 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.660077 kubelet[2771]: E0209 09:48:43.660035 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.660077 kubelet[2771]: W0209 09:48:43.660061 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.660652 kubelet[2771]: E0209 09:48:43.660615 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.661169 env[1656]: time="2024-02-09T09:48:43.661107985Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-q8nqq,Uid:35705eab-68d4-487d-bbe4-0875657ca83c,Namespace:calico-system,Attempt:0,}" Feb 9 09:48:43.662827 kubelet[2771]: E0209 09:48:43.662783 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.662827 kubelet[2771]: W0209 09:48:43.662818 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.663318 kubelet[2771]: E0209 09:48:43.663092 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.665675 kubelet[2771]: E0209 09:48:43.665625 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.665675 kubelet[2771]: W0209 09:48:43.665664 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.665990 kubelet[2771]: E0209 09:48:43.665922 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.668000 audit: BPF prog-id=130 op=LOAD Feb 9 09:48:43.671594 kubelet[2771]: E0209 09:48:43.668675 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.671594 kubelet[2771]: W0209 09:48:43.668712 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.671594 kubelet[2771]: E0209 09:48:43.669320 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.671594 kubelet[2771]: W0209 09:48:43.669368 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.671594 kubelet[2771]: E0209 09:48:43.669992 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.671594 kubelet[2771]: W0209 09:48:43.670039 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.671594 kubelet[2771]: E0209 09:48:43.670531 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.671594 kubelet[2771]: E0209 09:48:43.670575 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.671594 kubelet[2771]: E0209 09:48:43.670587 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.671594 kubelet[2771]: W0209 09:48:43.670592 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.672179 kubelet[2771]: E0209 09:48:43.670635 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.672179 kubelet[2771]: E0209 09:48:43.670664 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.672179 kubelet[2771]: E0209 09:48:43.671076 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.672179 kubelet[2771]: W0209 09:48:43.671095 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.673010 kubelet[2771]: E0209 09:48:43.672670 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.673000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.675205 kubelet[2771]: E0209 09:48:43.675004 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.675205 kubelet[2771]: W0209 09:48:43.675060 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.675205 kubelet[2771]: E0209 09:48:43.675100 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.673000 audit[3155]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3139 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:43.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431613033336633383730626264656235316364306239656136323264 Feb 9 09:48:43.675000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.675000 audit[3155]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3139 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:43.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431613033336633383730626264656235316364306239656136323264 Feb 9 09:48:43.676000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.676000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.676000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.676000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.676000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.676000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.676000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.676000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.676000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.676000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.676000 audit: BPF prog-id=131 op=LOAD Feb 9 09:48:43.676000 audit[3155]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3139 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:43.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431613033336633383730626264656235316364306239656136323264 Feb 9 09:48:43.678000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.678000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.678000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.678000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.678000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.678000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.678000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.678000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.678000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.678000 audit: BPF prog-id=132 op=LOAD Feb 9 09:48:43.678000 audit[3155]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3139 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:43.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431613033336633383730626264656235316364306239656136323264 Feb 9 09:48:43.678000 audit: BPF prog-id=132 op=UNLOAD Feb 9 09:48:43.678000 audit: BPF prog-id=131 op=UNLOAD Feb 9 09:48:43.678000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.678000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.678000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.678000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.678000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.678000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.678000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.678000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.678000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.678000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.678000 audit: BPF prog-id=133 op=LOAD Feb 9 09:48:43.678000 audit[3155]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3139 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:43.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431613033336633383730626264656235316364306239656136323264 Feb 9 09:48:43.706264 env[1656]: time="2024-02-09T09:48:43.706129003Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:48:43.706477 env[1656]: time="2024-02-09T09:48:43.706288582Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:48:43.706477 env[1656]: time="2024-02-09T09:48:43.706371942Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:48:43.708245 env[1656]: time="2024-02-09T09:48:43.706850907Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a8a864033323a5889f3088bf0ec74d8a86c50ed1f23abb26267cf57d95d22009 pid=3228 runtime=io.containerd.runc.v2 Feb 9 09:48:43.721572 kubelet[2771]: E0209 09:48:43.721523 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:43.721725 kubelet[2771]: W0209 09:48:43.721561 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:43.721725 kubelet[2771]: E0209 09:48:43.721637 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:43.736937 systemd[1]: Started cri-containerd-a8a864033323a5889f3088bf0ec74d8a86c50ed1f23abb26267cf57d95d22009.scope. Feb 9 09:48:43.778146 env[1656]: time="2024-02-09T09:48:43.778087596Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-75bf65c895-7cvdc,Uid:5e49c5d3-8e31-4d53-834b-b2159f76b701,Namespace:calico-system,Attempt:0,} returns sandbox id \"d1a033f3870bbdeb51cd0b9ea622da0851103786b759410534319f85c8464335\"" Feb 9 09:48:43.782275 env[1656]: time="2024-02-09T09:48:43.782210175Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 9 09:48:43.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.803000 audit: BPF prog-id=134 op=LOAD Feb 9 09:48:43.805000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.805000 audit[3236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3228 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:43.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138613836343033333332336135383839663330383862663065633734 Feb 9 09:48:43.805000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.805000 audit[3236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3228 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:43.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138613836343033333332336135383839663330383862663065633734 Feb 9 09:48:43.805000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.805000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.805000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.805000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.805000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.805000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.805000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.805000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.805000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.805000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.805000 audit: BPF prog-id=135 op=LOAD Feb 9 09:48:43.805000 audit[3236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3228 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:43.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138613836343033333332336135383839663330383862663065633734 Feb 9 09:48:43.805000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.805000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.805000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.805000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.805000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.805000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.805000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.805000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.805000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.805000 audit: BPF prog-id=136 op=LOAD Feb 9 09:48:43.805000 audit[3236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3228 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:43.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138613836343033333332336135383839663330383862663065633734 Feb 9 09:48:43.805000 audit: BPF prog-id=136 op=UNLOAD Feb 9 09:48:43.806000 audit: BPF prog-id=135 op=UNLOAD Feb 9 09:48:43.806000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.806000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.806000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.806000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.806000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.806000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.806000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.806000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.806000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.806000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:43.806000 audit: BPF prog-id=137 op=LOAD Feb 9 09:48:43.806000 audit[3236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3228 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:43.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138613836343033333332336135383839663330383862663065633734 Feb 9 09:48:43.861618 env[1656]: time="2024-02-09T09:48:43.861464626Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-q8nqq,Uid:35705eab-68d4-487d-bbe4-0875657ca83c,Namespace:calico-system,Attempt:0,} returns sandbox id \"a8a864033323a5889f3088bf0ec74d8a86c50ed1f23abb26267cf57d95d22009\"" Feb 9 09:48:44.108000 audit[3268]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=3268 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:48:44.108000 audit[3268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffe345df00 a2=0 a3=ffff9b0366c0 items=0 ppid=2944 pid=3268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:44.108000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:48:44.110000 audit[3268]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3268 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:48:44.110000 audit[3268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffe345df00 a2=0 a3=ffff9b0366c0 items=0 ppid=2944 pid=3268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:44.110000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:48:45.369944 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2697952331.mount: Deactivated successfully. Feb 9 09:48:45.854705 kubelet[2771]: E0209 09:48:45.854662 2771 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xc4l2" podUID=b3342c12-c4d9-47f8-827a-753e9a9e2b4c Feb 9 09:48:46.559667 env[1656]: time="2024-02-09T09:48:46.559594007Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:46.564669 env[1656]: time="2024-02-09T09:48:46.564601354Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:46.569213 env[1656]: time="2024-02-09T09:48:46.569131119Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:46.573392 env[1656]: time="2024-02-09T09:48:46.573276861Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:46.584936 env[1656]: time="2024-02-09T09:48:46.584812258Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969\"" Feb 9 09:48:46.599502 env[1656]: time="2024-02-09T09:48:46.597058849Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 09:48:46.626790 env[1656]: time="2024-02-09T09:48:46.626713412Z" level=info msg="CreateContainer within sandbox \"d1a033f3870bbdeb51cd0b9ea622da0851103786b759410534319f85c8464335\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 09:48:46.659404 env[1656]: time="2024-02-09T09:48:46.659312820Z" level=info msg="CreateContainer within sandbox \"d1a033f3870bbdeb51cd0b9ea622da0851103786b759410534319f85c8464335\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"41e4c956de3264e71954baa7b932eabcf0e00653d428cfb741f109e687f1d5d6\"" Feb 9 09:48:46.660515 env[1656]: time="2024-02-09T09:48:46.660462125Z" level=info msg="StartContainer for \"41e4c956de3264e71954baa7b932eabcf0e00653d428cfb741f109e687f1d5d6\"" Feb 9 09:48:46.722161 systemd[1]: Started cri-containerd-41e4c956de3264e71954baa7b932eabcf0e00653d428cfb741f109e687f1d5d6.scope. Feb 9 09:48:46.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.776000 audit: BPF prog-id=138 op=LOAD Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3139 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:46.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431653463393536646533323634653731393534626161376239333265 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3139 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:46.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431653463393536646533323634653731393534626161376239333265 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit: BPF prog-id=139 op=LOAD Feb 9 09:48:46.778000 audit[3277]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3139 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:46.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431653463393536646533323634653731393534626161376239333265 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit: BPF prog-id=140 op=LOAD Feb 9 09:48:46.778000 audit[3277]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3139 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:46.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431653463393536646533323634653731393534626161376239333265 Feb 9 09:48:46.778000 audit: BPF prog-id=140 op=UNLOAD Feb 9 09:48:46.778000 audit: BPF prog-id=139 op=UNLOAD Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:46.778000 audit: BPF prog-id=141 op=LOAD Feb 9 09:48:46.778000 audit[3277]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3139 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:46.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431653463393536646533323634653731393534626161376239333265 Feb 9 09:48:46.834057 env[1656]: time="2024-02-09T09:48:46.833921340Z" level=info msg="StartContainer for \"41e4c956de3264e71954baa7b932eabcf0e00653d428cfb741f109e687f1d5d6\" returns successfully" Feb 9 09:48:47.057276 kubelet[2771]: E0209 09:48:47.057050 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.057276 kubelet[2771]: W0209 09:48:47.057083 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.057276 kubelet[2771]: E0209 09:48:47.057116 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.058332 kubelet[2771]: E0209 09:48:47.058105 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.058332 kubelet[2771]: W0209 09:48:47.058134 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.058332 kubelet[2771]: E0209 09:48:47.058166 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.058916 kubelet[2771]: E0209 09:48:47.058669 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.058916 kubelet[2771]: W0209 09:48:47.058692 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.058916 kubelet[2771]: E0209 09:48:47.058718 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.059399 kubelet[2771]: E0209 09:48:47.059207 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.059399 kubelet[2771]: W0209 09:48:47.059231 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.059399 kubelet[2771]: E0209 09:48:47.059257 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.059918 kubelet[2771]: E0209 09:48:47.059739 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.059918 kubelet[2771]: W0209 09:48:47.059760 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.059918 kubelet[2771]: E0209 09:48:47.059786 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.060523 kubelet[2771]: E0209 09:48:47.060201 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.060523 kubelet[2771]: W0209 09:48:47.060223 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.060523 kubelet[2771]: E0209 09:48:47.060249 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.060865 kubelet[2771]: E0209 09:48:47.060842 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.060977 kubelet[2771]: W0209 09:48:47.060953 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.061093 kubelet[2771]: E0209 09:48:47.061072 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.064636 kubelet[2771]: E0209 09:48:47.064592 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.064875 kubelet[2771]: W0209 09:48:47.064833 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.065068 kubelet[2771]: E0209 09:48:47.065034 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.065766 kubelet[2771]: E0209 09:48:47.065729 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.065969 kubelet[2771]: W0209 09:48:47.065936 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.066116 kubelet[2771]: E0209 09:48:47.066090 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.067084 kubelet[2771]: E0209 09:48:47.067051 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.067291 kubelet[2771]: W0209 09:48:47.067264 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.067447 kubelet[2771]: E0209 09:48:47.067396 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.068673 kubelet[2771]: E0209 09:48:47.068639 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.068894 kubelet[2771]: W0209 09:48:47.068866 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.069077 kubelet[2771]: E0209 09:48:47.069034 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.071702 kubelet[2771]: E0209 09:48:47.071661 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.071970 kubelet[2771]: W0209 09:48:47.071928 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.072151 kubelet[2771]: E0209 09:48:47.072121 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.072936 kubelet[2771]: E0209 09:48:47.072886 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.072936 kubelet[2771]: W0209 09:48:47.072924 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.073176 kubelet[2771]: E0209 09:48:47.072961 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.073441 kubelet[2771]: E0209 09:48:47.073393 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.073547 kubelet[2771]: W0209 09:48:47.073454 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.073547 kubelet[2771]: E0209 09:48:47.073489 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.074175 kubelet[2771]: E0209 09:48:47.074134 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.074175 kubelet[2771]: W0209 09:48:47.074168 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.074344 kubelet[2771]: E0209 09:48:47.074212 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.074705 kubelet[2771]: E0209 09:48:47.074664 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.074705 kubelet[2771]: W0209 09:48:47.074696 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.074868 kubelet[2771]: E0209 09:48:47.074740 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.075650 kubelet[2771]: E0209 09:48:47.075601 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.075650 kubelet[2771]: W0209 09:48:47.075642 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.075897 kubelet[2771]: E0209 09:48:47.075851 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.076123 kubelet[2771]: E0209 09:48:47.076091 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.076123 kubelet[2771]: W0209 09:48:47.076118 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.076312 kubelet[2771]: E0209 09:48:47.076280 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.077659 kubelet[2771]: E0209 09:48:47.077604 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.077659 kubelet[2771]: W0209 09:48:47.077645 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.077955 kubelet[2771]: E0209 09:48:47.077929 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.078121 kubelet[2771]: E0209 09:48:47.078024 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.078253 kubelet[2771]: W0209 09:48:47.078228 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.078432 kubelet[2771]: E0209 09:48:47.078385 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.078882 kubelet[2771]: E0209 09:48:47.078856 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.079036 kubelet[2771]: W0209 09:48:47.079009 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.079216 kubelet[2771]: E0209 09:48:47.079178 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.081657 kubelet[2771]: E0209 09:48:47.081615 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.081910 kubelet[2771]: W0209 09:48:47.081877 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.082117 kubelet[2771]: E0209 09:48:47.082077 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.082706 kubelet[2771]: E0209 09:48:47.082675 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.082891 kubelet[2771]: W0209 09:48:47.082860 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.083086 kubelet[2771]: E0209 09:48:47.083048 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.085748 kubelet[2771]: E0209 09:48:47.085623 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.085975 kubelet[2771]: W0209 09:48:47.085942 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.086224 kubelet[2771]: E0209 09:48:47.086181 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.091798 kubelet[2771]: E0209 09:48:47.091760 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.091997 kubelet[2771]: W0209 09:48:47.091964 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.092209 kubelet[2771]: E0209 09:48:47.092169 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.092754 kubelet[2771]: E0209 09:48:47.092724 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.092913 kubelet[2771]: W0209 09:48:47.092887 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.093094 kubelet[2771]: E0209 09:48:47.093057 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.093561 kubelet[2771]: E0209 09:48:47.093533 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.093715 kubelet[2771]: W0209 09:48:47.093688 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.093907 kubelet[2771]: E0209 09:48:47.093867 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.096731 kubelet[2771]: E0209 09:48:47.096693 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.096933 kubelet[2771]: W0209 09:48:47.096903 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.097086 kubelet[2771]: E0209 09:48:47.097063 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.097619 kubelet[2771]: E0209 09:48:47.097568 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.097619 kubelet[2771]: W0209 09:48:47.097605 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.097823 kubelet[2771]: E0209 09:48:47.097640 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.098537 kubelet[2771]: E0209 09:48:47.098500 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:47.098748 kubelet[2771]: W0209 09:48:47.098715 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:47.098930 kubelet[2771]: E0209 09:48:47.098904 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:47.600261 systemd[1]: run-containerd-runc-k8s.io-41e4c956de3264e71954baa7b932eabcf0e00653d428cfb741f109e687f1d5d6-runc.UXUTg6.mount: Deactivated successfully. Feb 9 09:48:47.858369 kubelet[2771]: E0209 09:48:47.857951 2771 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xc4l2" podUID=b3342c12-c4d9-47f8-827a-753e9a9e2b4c Feb 9 09:48:47.987716 kubelet[2771]: I0209 09:48:47.987653 2771 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 09:48:48.078983 kubelet[2771]: E0209 09:48:48.078931 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.078983 kubelet[2771]: W0209 09:48:48.078969 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.079895 kubelet[2771]: E0209 09:48:48.079007 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.082284 kubelet[2771]: E0209 09:48:48.080504 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.082284 kubelet[2771]: W0209 09:48:48.080532 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.082284 kubelet[2771]: E0209 09:48:48.080577 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.082284 kubelet[2771]: E0209 09:48:48.081039 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.082284 kubelet[2771]: W0209 09:48:48.081062 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.082284 kubelet[2771]: E0209 09:48:48.081092 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.082284 kubelet[2771]: E0209 09:48:48.081647 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.082284 kubelet[2771]: W0209 09:48:48.081668 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.082284 kubelet[2771]: E0209 09:48:48.081697 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.082284 kubelet[2771]: E0209 09:48:48.082075 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.083398 kubelet[2771]: W0209 09:48:48.082112 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.083398 kubelet[2771]: E0209 09:48:48.082139 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.086647 kubelet[2771]: E0209 09:48:48.086599 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.086647 kubelet[2771]: W0209 09:48:48.086637 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.086935 kubelet[2771]: E0209 09:48:48.086676 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.087245 kubelet[2771]: E0209 09:48:48.087204 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.087245 kubelet[2771]: W0209 09:48:48.087236 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.087497 kubelet[2771]: E0209 09:48:48.087266 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.087654 kubelet[2771]: E0209 09:48:48.087619 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.087727 kubelet[2771]: W0209 09:48:48.087648 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.087727 kubelet[2771]: E0209 09:48:48.087689 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.087998 kubelet[2771]: E0209 09:48:48.087966 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.087998 kubelet[2771]: W0209 09:48:48.087992 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.088129 kubelet[2771]: E0209 09:48:48.088018 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.088501 kubelet[2771]: E0209 09:48:48.088467 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.088501 kubelet[2771]: W0209 09:48:48.088495 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.088657 kubelet[2771]: E0209 09:48:48.088523 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.090547 kubelet[2771]: E0209 09:48:48.090507 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.090547 kubelet[2771]: W0209 09:48:48.090539 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.090726 kubelet[2771]: E0209 09:48:48.090575 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.090927 kubelet[2771]: E0209 09:48:48.090892 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.090927 kubelet[2771]: W0209 09:48:48.090919 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.091067 kubelet[2771]: E0209 09:48:48.090946 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.096699 kubelet[2771]: E0209 09:48:48.096542 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.096699 kubelet[2771]: W0209 09:48:48.096584 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.096699 kubelet[2771]: E0209 09:48:48.096623 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.098153 kubelet[2771]: E0209 09:48:48.097124 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.098153 kubelet[2771]: W0209 09:48:48.097147 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.098153 kubelet[2771]: E0209 09:48:48.097186 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.100838 kubelet[2771]: E0209 09:48:48.099184 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.100838 kubelet[2771]: W0209 09:48:48.099226 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.100838 kubelet[2771]: E0209 09:48:48.099274 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.100838 kubelet[2771]: E0209 09:48:48.099821 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.100838 kubelet[2771]: W0209 09:48:48.099846 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.100838 kubelet[2771]: E0209 09:48:48.100048 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.100838 kubelet[2771]: E0209 09:48:48.100401 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.100838 kubelet[2771]: W0209 09:48:48.100477 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.100838 kubelet[2771]: E0209 09:48:48.100674 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.101754 kubelet[2771]: E0209 09:48:48.100967 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.101754 kubelet[2771]: W0209 09:48:48.100988 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.101754 kubelet[2771]: E0209 09:48:48.101172 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.105794 kubelet[2771]: E0209 09:48:48.105744 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.105794 kubelet[2771]: W0209 09:48:48.105807 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.106049 kubelet[2771]: E0209 09:48:48.105856 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.107285 kubelet[2771]: E0209 09:48:48.106993 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.107285 kubelet[2771]: W0209 09:48:48.107030 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.107285 kubelet[2771]: E0209 09:48:48.107187 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.120268 kubelet[2771]: E0209 09:48:48.116464 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.120268 kubelet[2771]: W0209 09:48:48.116500 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.120268 kubelet[2771]: E0209 09:48:48.117167 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.120268 kubelet[2771]: E0209 09:48:48.117570 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.120268 kubelet[2771]: W0209 09:48:48.117591 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.120268 kubelet[2771]: E0209 09:48:48.117756 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.120268 kubelet[2771]: E0209 09:48:48.117957 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.120268 kubelet[2771]: W0209 09:48:48.117973 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.120268 kubelet[2771]: E0209 09:48:48.118106 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.120268 kubelet[2771]: E0209 09:48:48.118959 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.121191 kubelet[2771]: W0209 09:48:48.118982 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.121191 kubelet[2771]: E0209 09:48:48.119023 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.121191 kubelet[2771]: E0209 09:48:48.119472 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.121191 kubelet[2771]: W0209 09:48:48.119490 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.121191 kubelet[2771]: E0209 09:48:48.119579 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.121861 kubelet[2771]: E0209 09:48:48.121803 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.122104 kubelet[2771]: W0209 09:48:48.121841 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.128587 kubelet[2771]: E0209 09:48:48.128523 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.129717 kubelet[2771]: E0209 09:48:48.129674 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.129717 kubelet[2771]: W0209 09:48:48.129709 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.129923 kubelet[2771]: E0209 09:48:48.129898 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.130176 kubelet[2771]: E0209 09:48:48.130140 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.130270 kubelet[2771]: W0209 09:48:48.130168 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.130508 kubelet[2771]: E0209 09:48:48.130389 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.133842 kubelet[2771]: E0209 09:48:48.133790 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.133842 kubelet[2771]: W0209 09:48:48.133830 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.133842 kubelet[2771]: E0209 09:48:48.133870 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.134761 kubelet[2771]: E0209 09:48:48.134721 2771 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:48:48.134761 kubelet[2771]: W0209 09:48:48.134754 2771 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:48:48.134761 kubelet[2771]: E0209 09:48:48.134788 2771 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:48:48.243259 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1847482543.mount: Deactivated successfully. Feb 9 09:48:48.406618 env[1656]: time="2024-02-09T09:48:48.406431480Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:48.412037 env[1656]: time="2024-02-09T09:48:48.411984702Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:48.417034 env[1656]: time="2024-02-09T09:48:48.416971079Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:48.421094 env[1656]: time="2024-02-09T09:48:48.421034218Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:48.424062 env[1656]: time="2024-02-09T09:48:48.422646928Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 9 09:48:48.427807 env[1656]: time="2024-02-09T09:48:48.427754120Z" level=info msg="CreateContainer within sandbox \"a8a864033323a5889f3088bf0ec74d8a86c50ed1f23abb26267cf57d95d22009\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 09:48:48.458681 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1250577814.mount: Deactivated successfully. Feb 9 09:48:48.462195 env[1656]: time="2024-02-09T09:48:48.462127765Z" level=info msg="CreateContainer within sandbox \"a8a864033323a5889f3088bf0ec74d8a86c50ed1f23abb26267cf57d95d22009\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"08b534bfe2ab3eabae69f4f19eb328664679e7c5883562a209aa07c3b91cbbe7\"" Feb 9 09:48:48.463526 env[1656]: time="2024-02-09T09:48:48.463478612Z" level=info msg="StartContainer for \"08b534bfe2ab3eabae69f4f19eb328664679e7c5883562a209aa07c3b91cbbe7\"" Feb 9 09:48:48.513330 systemd[1]: Started cri-containerd-08b534bfe2ab3eabae69f4f19eb328664679e7c5883562a209aa07c3b91cbbe7.scope. Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.586127 kernel: kauditd_printk_skb: 179 callbacks suppressed Feb 9 09:48:48.586215 kernel: audit: type=1400 audit(1707472128.582:1141): avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit[3373]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3228 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:48.610765 kernel: audit: type=1300 audit(1707472128.582:1141): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3228 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:48.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038623533346266653261623365616261653639663466313965623332 Feb 9 09:48:48.624802 kernel: audit: type=1327 audit(1707472128.582:1141): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038623533346266653261623365616261653639663466313965623332 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.632735 kernel: audit: type=1400 audit(1707472128.582:1142): avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.643139 kernel: audit: type=1400 audit(1707472128.582:1142): avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.652210 kernel: audit: type=1400 audit(1707472128.582:1142): avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.662820 kernel: audit: type=1400 audit(1707472128.582:1142): avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.667441 env[1656]: time="2024-02-09T09:48:48.667355754Z" level=info msg="StartContainer for \"08b534bfe2ab3eabae69f4f19eb328664679e7c5883562a209aa07c3b91cbbe7\" returns successfully" Feb 9 09:48:48.673342 kernel: audit: type=1400 audit(1707472128.582:1142): avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.684681 kernel: audit: type=1400 audit(1707472128.582:1142): avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.697039 kernel: audit: type=1400 audit(1707472128.582:1142): avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit: BPF prog-id=142 op=LOAD Feb 9 09:48:48.582000 audit[3373]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3228 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:48.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038623533346266653261623365616261653639663466313965623332 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit: BPF prog-id=143 op=LOAD Feb 9 09:48:48.582000 audit[3373]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3228 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:48.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038623533346266653261623365616261653639663466313965623332 Feb 9 09:48:48.582000 audit: BPF prog-id=143 op=UNLOAD Feb 9 09:48:48.582000 audit: BPF prog-id=142 op=UNLOAD Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:48.582000 audit: BPF prog-id=144 op=LOAD Feb 9 09:48:48.582000 audit[3373]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3228 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:48.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038623533346266653261623365616261653639663466313965623332 Feb 9 09:48:48.715223 systemd[1]: cri-containerd-08b534bfe2ab3eabae69f4f19eb328664679e7c5883562a209aa07c3b91cbbe7.scope: Deactivated successfully. Feb 9 09:48:48.718000 audit: BPF prog-id=144 op=UNLOAD Feb 9 09:48:48.770299 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-08b534bfe2ab3eabae69f4f19eb328664679e7c5883562a209aa07c3b91cbbe7-rootfs.mount: Deactivated successfully. Feb 9 09:48:49.035947 kubelet[2771]: I0209 09:48:49.035892 2771 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-75bf65c895-7cvdc" podStartSLOduration=3.230373798 podCreationTimestamp="2024-02-09 09:48:43 +0000 UTC" firstStartedPulling="2024-02-09 09:48:43.781402968 +0000 UTC m=+22.234022540" lastFinishedPulling="2024-02-09 09:48:46.586865471 +0000 UTC m=+25.039485031" observedRunningTime="2024-02-09 09:48:47.009148323 +0000 UTC m=+25.461767883" watchObservedRunningTime="2024-02-09 09:48:49.035836289 +0000 UTC m=+27.488455897" Feb 9 09:48:49.078748 env[1656]: time="2024-02-09T09:48:49.078673464Z" level=info msg="shim disconnected" id=08b534bfe2ab3eabae69f4f19eb328664679e7c5883562a209aa07c3b91cbbe7 Feb 9 09:48:49.078748 env[1656]: time="2024-02-09T09:48:49.078744774Z" level=warning msg="cleaning up after shim disconnected" id=08b534bfe2ab3eabae69f4f19eb328664679e7c5883562a209aa07c3b91cbbe7 namespace=k8s.io Feb 9 09:48:49.079031 env[1656]: time="2024-02-09T09:48:49.078770900Z" level=info msg="cleaning up dead shim" Feb 9 09:48:49.094886 env[1656]: time="2024-02-09T09:48:49.094816234Z" level=warning msg="cleanup warnings time=\"2024-02-09T09:48:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3412 runtime=io.containerd.runc.v2\n" Feb 9 09:48:49.857800 kubelet[2771]: E0209 09:48:49.857747 2771 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xc4l2" podUID=b3342c12-c4d9-47f8-827a-753e9a9e2b4c Feb 9 09:48:50.017042 env[1656]: time="2024-02-09T09:48:50.016992386Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 09:48:51.525213 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1107720889.mount: Deactivated successfully. Feb 9 09:48:51.856773 kubelet[2771]: E0209 09:48:51.855874 2771 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xc4l2" podUID=b3342c12-c4d9-47f8-827a-753e9a9e2b4c Feb 9 09:48:53.858446 kubelet[2771]: E0209 09:48:53.858362 2771 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xc4l2" podUID=b3342c12-c4d9-47f8-827a-753e9a9e2b4c Feb 9 09:48:55.177999 env[1656]: time="2024-02-09T09:48:55.177727351Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:55.183195 env[1656]: time="2024-02-09T09:48:55.183146285Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:55.187026 env[1656]: time="2024-02-09T09:48:55.186956663Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:55.189111 env[1656]: time="2024-02-09T09:48:55.189064469Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:48:55.190200 env[1656]: time="2024-02-09T09:48:55.190154741Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 9 09:48:55.193944 env[1656]: time="2024-02-09T09:48:55.193884293Z" level=info msg="CreateContainer within sandbox \"a8a864033323a5889f3088bf0ec74d8a86c50ed1f23abb26267cf57d95d22009\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 09:48:55.220619 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount83833135.mount: Deactivated successfully. Feb 9 09:48:55.240210 env[1656]: time="2024-02-09T09:48:55.240125550Z" level=info msg="CreateContainer within sandbox \"a8a864033323a5889f3088bf0ec74d8a86c50ed1f23abb26267cf57d95d22009\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"c4854464715692c69354a86621119fcad50e9e4e9953e5a8e4fb18e2a0114097\"" Feb 9 09:48:55.242040 env[1656]: time="2024-02-09T09:48:55.241963624Z" level=info msg="StartContainer for \"c4854464715692c69354a86621119fcad50e9e4e9953e5a8e4fb18e2a0114097\"" Feb 9 09:48:55.293603 systemd[1]: run-containerd-runc-k8s.io-c4854464715692c69354a86621119fcad50e9e4e9953e5a8e4fb18e2a0114097-runc.c3W4SO.mount: Deactivated successfully. Feb 9 09:48:55.303632 systemd[1]: Started cri-containerd-c4854464715692c69354a86621119fcad50e9e4e9953e5a8e4fb18e2a0114097.scope. Feb 9 09:48:55.342000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.346504 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 09:48:55.346649 kernel: audit: type=1400 audit(1707472135.342:1148): avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.342000 audit[3439]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3228 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:55.363908 kernel: audit: type=1300 audit(1707472135.342:1148): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3228 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:55.364029 kernel: audit: type=1327 audit(1707472135.342:1148): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334383534343634373135363932633639333534613836363231313139 Feb 9 09:48:55.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334383534343634373135363932633639333534613836363231313139 Feb 9 09:48:55.343000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.381960 kernel: audit: type=1400 audit(1707472135.343:1149): avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.382086 kernel: audit: type=1400 audit(1707472135.343:1149): avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.343000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.343000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.397477 kernel: audit: type=1400 audit(1707472135.343:1149): avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.343000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.412852 kernel: audit: type=1400 audit(1707472135.343:1149): avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.343000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.420567 kernel: audit: type=1400 audit(1707472135.343:1149): avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.432542 kernel: audit: type=1400 audit(1707472135.343:1149): avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.343000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.343000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.443519 kernel: audit: type=1400 audit(1707472135.343:1149): avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.343000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.343000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.343000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.343000 audit: BPF prog-id=145 op=LOAD Feb 9 09:48:55.343000 audit[3439]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3228 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:55.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334383534343634373135363932633639333534613836363231313139 Feb 9 09:48:55.346000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.346000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.346000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.346000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.346000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.346000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.346000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.346000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.346000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.346000 audit: BPF prog-id=146 op=LOAD Feb 9 09:48:55.346000 audit[3439]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3228 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:55.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334383534343634373135363932633639333534613836363231313139 Feb 9 09:48:55.352000 audit: BPF prog-id=146 op=UNLOAD Feb 9 09:48:55.352000 audit: BPF prog-id=145 op=UNLOAD Feb 9 09:48:55.352000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.352000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.352000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.352000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.352000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.352000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.352000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.352000 audit[3439]: AVC avc: denied { perfmon } for pid=3439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.352000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.352000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:48:55.352000 audit: BPF prog-id=147 op=LOAD Feb 9 09:48:55.352000 audit[3439]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3228 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:48:55.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334383534343634373135363932633639333534613836363231313139 Feb 9 09:48:55.447884 env[1656]: time="2024-02-09T09:48:55.447759488Z" level=info msg="StartContainer for \"c4854464715692c69354a86621119fcad50e9e4e9953e5a8e4fb18e2a0114097\" returns successfully" Feb 9 09:48:55.855402 kubelet[2771]: E0209 09:48:55.855346 2771 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xc4l2" podUID=b3342c12-c4d9-47f8-827a-753e9a9e2b4c Feb 9 09:48:56.733955 env[1656]: time="2024-02-09T09:48:56.733861068Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 09:48:56.740942 systemd[1]: cri-containerd-c4854464715692c69354a86621119fcad50e9e4e9953e5a8e4fb18e2a0114097.scope: Deactivated successfully. Feb 9 09:48:56.743000 audit: BPF prog-id=147 op=UNLOAD Feb 9 09:48:56.751949 kubelet[2771]: I0209 09:48:56.751889 2771 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 09:48:56.801303 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c4854464715692c69354a86621119fcad50e9e4e9953e5a8e4fb18e2a0114097-rootfs.mount: Deactivated successfully. Feb 9 09:48:56.836795 kubelet[2771]: I0209 09:48:56.836499 2771 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:48:56.849455 systemd[1]: Created slice kubepods-burstable-podd3953bad_31a4_4e9c_9952_dd7f7abf0df6.slice. Feb 9 09:48:56.869916 kubelet[2771]: I0209 09:48:56.869873 2771 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:48:56.876509 kubelet[2771]: I0209 09:48:56.876402 2771 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:48:56.891908 systemd[1]: Created slice kubepods-burstable-podf139e6d4_326b_4cbe_876f_d4056c406c20.slice. Feb 9 09:48:56.905221 systemd[1]: Created slice kubepods-besteffort-pod73c5decd_7bdc_496a_b0be_8e5a5bc10197.slice. Feb 9 09:48:56.959736 kubelet[2771]: I0209 09:48:56.959657 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/d3953bad-31a4-4e9c-9952-dd7f7abf0df6-config-volume\") pod \"coredns-5d78c9869d-wnfbr\" (UID: \"d3953bad-31a4-4e9c-9952-dd7f7abf0df6\") " pod="kube-system/coredns-5d78c9869d-wnfbr" Feb 9 09:48:56.959930 kubelet[2771]: I0209 09:48:56.959794 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zcjjf\" (UniqueName: \"kubernetes.io/projected/d3953bad-31a4-4e9c-9952-dd7f7abf0df6-kube-api-access-zcjjf\") pod \"coredns-5d78c9869d-wnfbr\" (UID: \"d3953bad-31a4-4e9c-9952-dd7f7abf0df6\") " pod="kube-system/coredns-5d78c9869d-wnfbr" Feb 9 09:48:57.060785 kubelet[2771]: I0209 09:48:57.060569 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/73c5decd-7bdc-496a-b0be-8e5a5bc10197-tigera-ca-bundle\") pod \"calico-kube-controllers-796677d4b5-w5f4z\" (UID: \"73c5decd-7bdc-496a-b0be-8e5a5bc10197\") " pod="calico-system/calico-kube-controllers-796677d4b5-w5f4z" Feb 9 09:48:57.061055 kubelet[2771]: I0209 09:48:57.060752 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/f139e6d4-326b-4cbe-876f-d4056c406c20-config-volume\") pod \"coredns-5d78c9869d-ftf4x\" (UID: \"f139e6d4-326b-4cbe-876f-d4056c406c20\") " pod="kube-system/coredns-5d78c9869d-ftf4x" Feb 9 09:48:57.061055 kubelet[2771]: I0209 09:48:57.060948 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9cxpf\" (UniqueName: \"kubernetes.io/projected/f139e6d4-326b-4cbe-876f-d4056c406c20-kube-api-access-9cxpf\") pod \"coredns-5d78c9869d-ftf4x\" (UID: \"f139e6d4-326b-4cbe-876f-d4056c406c20\") " pod="kube-system/coredns-5d78c9869d-ftf4x" Feb 9 09:48:57.061205 kubelet[2771]: I0209 09:48:57.061135 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qvg6k\" (UniqueName: \"kubernetes.io/projected/73c5decd-7bdc-496a-b0be-8e5a5bc10197-kube-api-access-qvg6k\") pod \"calico-kube-controllers-796677d4b5-w5f4z\" (UID: \"73c5decd-7bdc-496a-b0be-8e5a5bc10197\") " pod="calico-system/calico-kube-controllers-796677d4b5-w5f4z" Feb 9 09:48:57.161076 env[1656]: time="2024-02-09T09:48:57.161005079Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-wnfbr,Uid:d3953bad-31a4-4e9c-9952-dd7f7abf0df6,Namespace:kube-system,Attempt:0,}" Feb 9 09:48:57.211098 env[1656]: time="2024-02-09T09:48:57.210615798Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-ftf4x,Uid:f139e6d4-326b-4cbe-876f-d4056c406c20,Namespace:kube-system,Attempt:0,}" Feb 9 09:48:57.216385 env[1656]: time="2024-02-09T09:48:57.216322396Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-796677d4b5-w5f4z,Uid:73c5decd-7bdc-496a-b0be-8e5a5bc10197,Namespace:calico-system,Attempt:0,}" Feb 9 09:48:57.661642 env[1656]: time="2024-02-09T09:48:57.661543659Z" level=info msg="shim disconnected" id=c4854464715692c69354a86621119fcad50e9e4e9953e5a8e4fb18e2a0114097 Feb 9 09:48:57.661844 env[1656]: time="2024-02-09T09:48:57.661640651Z" level=warning msg="cleaning up after shim disconnected" id=c4854464715692c69354a86621119fcad50e9e4e9953e5a8e4fb18e2a0114097 namespace=k8s.io Feb 9 09:48:57.661844 env[1656]: time="2024-02-09T09:48:57.661689554Z" level=info msg="cleaning up dead shim" Feb 9 09:48:57.697046 env[1656]: time="2024-02-09T09:48:57.696963884Z" level=warning msg="cleanup warnings time=\"2024-02-09T09:48:57Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3489 runtime=io.containerd.runc.v2\n" Feb 9 09:48:57.821191 env[1656]: time="2024-02-09T09:48:57.821071165Z" level=error msg="Failed to destroy network for sandbox \"27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:48:57.824779 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50-shm.mount: Deactivated successfully. Feb 9 09:48:57.827948 env[1656]: time="2024-02-09T09:48:57.827873638Z" level=error msg="encountered an error cleaning up failed sandbox \"27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:48:57.828205 env[1656]: time="2024-02-09T09:48:57.828151135Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-ftf4x,Uid:f139e6d4-326b-4cbe-876f-d4056c406c20,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:48:57.828742 kubelet[2771]: E0209 09:48:57.828699 2771 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:48:57.828902 kubelet[2771]: E0209 09:48:57.828783 2771 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-ftf4x" Feb 9 09:48:57.828902 kubelet[2771]: E0209 09:48:57.828822 2771 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-ftf4x" Feb 9 09:48:57.829148 kubelet[2771]: E0209 09:48:57.828921 2771 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-ftf4x_kube-system(f139e6d4-326b-4cbe-876f-d4056c406c20)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-ftf4x_kube-system(f139e6d4-326b-4cbe-876f-d4056c406c20)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-ftf4x" podUID=f139e6d4-326b-4cbe-876f-d4056c406c20 Feb 9 09:48:57.867347 systemd[1]: Created slice kubepods-besteffort-podb3342c12_c4d9_47f8_827a_753e9a9e2b4c.slice. Feb 9 09:48:57.876139 env[1656]: time="2024-02-09T09:48:57.876077730Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xc4l2,Uid:b3342c12-c4d9-47f8-827a-753e9a9e2b4c,Namespace:calico-system,Attempt:0,}" Feb 9 09:48:57.951868 env[1656]: time="2024-02-09T09:48:57.950869011Z" level=error msg="Failed to destroy network for sandbox \"457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:48:57.956307 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67-shm.mount: Deactivated successfully. Feb 9 09:48:57.958402 env[1656]: time="2024-02-09T09:48:57.956647410Z" level=error msg="Failed to destroy network for sandbox \"f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:48:57.958402 env[1656]: time="2024-02-09T09:48:57.957367956Z" level=error msg="encountered an error cleaning up failed sandbox \"f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:48:57.958402 env[1656]: time="2024-02-09T09:48:57.957503183Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-796677d4b5-w5f4z,Uid:73c5decd-7bdc-496a-b0be-8e5a5bc10197,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:48:57.958837 kubelet[2771]: E0209 09:48:57.958066 2771 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:48:57.958837 kubelet[2771]: E0209 09:48:57.958134 2771 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-796677d4b5-w5f4z" Feb 9 09:48:57.958837 kubelet[2771]: E0209 09:48:57.958193 2771 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-796677d4b5-w5f4z" Feb 9 09:48:57.964592 kubelet[2771]: E0209 09:48:57.958321 2771 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-796677d4b5-w5f4z_calico-system(73c5decd-7bdc-496a-b0be-8e5a5bc10197)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-796677d4b5-w5f4z_calico-system(73c5decd-7bdc-496a-b0be-8e5a5bc10197)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-796677d4b5-w5f4z" podUID=73c5decd-7bdc-496a-b0be-8e5a5bc10197 Feb 9 09:48:57.964592 kubelet[2771]: E0209 09:48:57.961228 2771 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:48:57.964592 kubelet[2771]: E0209 09:48:57.961303 2771 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-wnfbr" Feb 9 09:48:57.964928 env[1656]: time="2024-02-09T09:48:57.959838055Z" level=error msg="encountered an error cleaning up failed sandbox \"457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:48:57.964928 env[1656]: time="2024-02-09T09:48:57.960007675Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-wnfbr,Uid:d3953bad-31a4-4e9c-9952-dd7f7abf0df6,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:48:57.965067 kubelet[2771]: E0209 09:48:57.961340 2771 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-wnfbr" Feb 9 09:48:57.965067 kubelet[2771]: E0209 09:48:57.961438 2771 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-wnfbr_kube-system(d3953bad-31a4-4e9c-9952-dd7f7abf0df6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-wnfbr_kube-system(d3953bad-31a4-4e9c-9952-dd7f7abf0df6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-wnfbr" podUID=d3953bad-31a4-4e9c-9952-dd7f7abf0df6 Feb 9 09:48:58.027895 env[1656]: time="2024-02-09T09:48:58.027811192Z" level=error msg="Failed to destroy network for sandbox \"d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:48:58.028542 env[1656]: time="2024-02-09T09:48:58.028473857Z" level=error msg="encountered an error cleaning up failed sandbox \"d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:48:58.028649 env[1656]: time="2024-02-09T09:48:58.028560720Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xc4l2,Uid:b3342c12-c4d9-47f8-827a-753e9a9e2b4c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:48:58.031727 kubelet[2771]: E0209 09:48:58.028987 2771 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:48:58.031727 kubelet[2771]: E0209 09:48:58.029064 2771 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xc4l2" Feb 9 09:48:58.031727 kubelet[2771]: E0209 09:48:58.029103 2771 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xc4l2" Feb 9 09:48:58.032152 kubelet[2771]: E0209 09:48:58.029180 2771 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-xc4l2_calico-system(b3342c12-c4d9-47f8-827a-753e9a9e2b4c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-xc4l2_calico-system(b3342c12-c4d9-47f8-827a-753e9a9e2b4c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xc4l2" podUID=b3342c12-c4d9-47f8-827a-753e9a9e2b4c Feb 9 09:48:58.038139 kubelet[2771]: I0209 09:48:58.038096 2771 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" Feb 9 09:48:58.041119 env[1656]: time="2024-02-09T09:48:58.039933932Z" level=info msg="StopPodSandbox for \"27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50\"" Feb 9 09:48:58.044049 kubelet[2771]: I0209 09:48:58.043982 2771 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" Feb 9 09:48:58.047547 env[1656]: time="2024-02-09T09:48:58.046129898Z" level=info msg="StopPodSandbox for \"457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67\"" Feb 9 09:48:58.056659 kubelet[2771]: I0209 09:48:58.056301 2771 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" Feb 9 09:48:58.060504 env[1656]: time="2024-02-09T09:48:58.058933005Z" level=info msg="StopPodSandbox for \"d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b\"" Feb 9 09:48:58.073854 env[1656]: time="2024-02-09T09:48:58.073800661Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 09:48:58.097892 kubelet[2771]: I0209 09:48:58.097842 2771 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" Feb 9 09:48:58.099226 env[1656]: time="2024-02-09T09:48:58.099151100Z" level=info msg="StopPodSandbox for \"f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4\"" Feb 9 09:48:58.193281 env[1656]: time="2024-02-09T09:48:58.193180307Z" level=error msg="StopPodSandbox for \"d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b\" failed" error="failed to destroy network for sandbox \"d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:48:58.194021 kubelet[2771]: E0209 09:48:58.193704 2771 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" Feb 9 09:48:58.194021 kubelet[2771]: E0209 09:48:58.193782 2771 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b} Feb 9 09:48:58.194021 kubelet[2771]: E0209 09:48:58.193846 2771 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b3342c12-c4d9-47f8-827a-753e9a9e2b4c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:48:58.194021 kubelet[2771]: E0209 09:48:58.193901 2771 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b3342c12-c4d9-47f8-827a-753e9a9e2b4c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xc4l2" podUID=b3342c12-c4d9-47f8-827a-753e9a9e2b4c Feb 9 09:48:58.199642 env[1656]: time="2024-02-09T09:48:58.199552446Z" level=error msg="StopPodSandbox for \"27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50\" failed" error="failed to destroy network for sandbox \"27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:48:58.199989 kubelet[2771]: E0209 09:48:58.199950 2771 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" Feb 9 09:48:58.200110 kubelet[2771]: E0209 09:48:58.200042 2771 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50} Feb 9 09:48:58.200193 kubelet[2771]: E0209 09:48:58.200133 2771 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f139e6d4-326b-4cbe-876f-d4056c406c20\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:48:58.200363 kubelet[2771]: E0209 09:48:58.200229 2771 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f139e6d4-326b-4cbe-876f-d4056c406c20\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-ftf4x" podUID=f139e6d4-326b-4cbe-876f-d4056c406c20 Feb 9 09:48:58.211912 env[1656]: time="2024-02-09T09:48:58.209623705Z" level=error msg="StopPodSandbox for \"457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67\" failed" error="failed to destroy network for sandbox \"457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:48:58.212128 kubelet[2771]: E0209 09:48:58.211992 2771 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" Feb 9 09:48:58.212128 kubelet[2771]: E0209 09:48:58.212050 2771 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67} Feb 9 09:48:58.212289 kubelet[2771]: E0209 09:48:58.212144 2771 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d3953bad-31a4-4e9c-9952-dd7f7abf0df6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:48:58.212289 kubelet[2771]: E0209 09:48:58.212224 2771 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d3953bad-31a4-4e9c-9952-dd7f7abf0df6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-wnfbr" podUID=d3953bad-31a4-4e9c-9952-dd7f7abf0df6 Feb 9 09:48:58.224884 env[1656]: time="2024-02-09T09:48:58.224785828Z" level=error msg="StopPodSandbox for \"f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4\" failed" error="failed to destroy network for sandbox \"f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:48:58.225378 kubelet[2771]: E0209 09:48:58.225305 2771 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" Feb 9 09:48:58.225654 kubelet[2771]: E0209 09:48:58.225454 2771 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4} Feb 9 09:48:58.225654 kubelet[2771]: E0209 09:48:58.225546 2771 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"73c5decd-7bdc-496a-b0be-8e5a5bc10197\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:48:58.225654 kubelet[2771]: E0209 09:48:58.225601 2771 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"73c5decd-7bdc-496a-b0be-8e5a5bc10197\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-796677d4b5-w5f4z" podUID=73c5decd-7bdc-496a-b0be-8e5a5bc10197 Feb 9 09:48:58.801596 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b-shm.mount: Deactivated successfully. Feb 9 09:48:58.801785 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4-shm.mount: Deactivated successfully. Feb 9 09:49:07.160085 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1285395690.mount: Deactivated successfully. Feb 9 09:49:07.265319 env[1656]: time="2024-02-09T09:49:07.265205681Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:49:07.268500 env[1656]: time="2024-02-09T09:49:07.268404155Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:49:07.272910 env[1656]: time="2024-02-09T09:49:07.272850477Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:49:07.278575 env[1656]: time="2024-02-09T09:49:07.278507425Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:49:07.279550 env[1656]: time="2024-02-09T09:49:07.279499123Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 9 09:49:07.308796 env[1656]: time="2024-02-09T09:49:07.308702822Z" level=info msg="CreateContainer within sandbox \"a8a864033323a5889f3088bf0ec74d8a86c50ed1f23abb26267cf57d95d22009\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 09:49:07.335391 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount865266229.mount: Deactivated successfully. Feb 9 09:49:07.343342 env[1656]: time="2024-02-09T09:49:07.343249494Z" level=info msg="CreateContainer within sandbox \"a8a864033323a5889f3088bf0ec74d8a86c50ed1f23abb26267cf57d95d22009\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"29bcb56f9fe40f630c6a7885dd2e5c6a43a1599e4078245010da7dac79ce52d1\"" Feb 9 09:49:07.347241 env[1656]: time="2024-02-09T09:49:07.346114494Z" level=info msg="StartContainer for \"29bcb56f9fe40f630c6a7885dd2e5c6a43a1599e4078245010da7dac79ce52d1\"" Feb 9 09:49:07.379669 systemd[1]: Started cri-containerd-29bcb56f9fe40f630c6a7885dd2e5c6a43a1599e4078245010da7dac79ce52d1.scope. Feb 9 09:49:07.439806 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 09:49:07.439999 kernel: audit: type=1400 audit(1707472147.427:1155): avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.427000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.427000 audit[3721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3228 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:07.455307 kernel: audit: type=1300 audit(1707472147.427:1155): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3228 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:07.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239626362353666396665343066363330633661373838356464326535 Feb 9 09:49:07.470524 kernel: audit: type=1327 audit(1707472147.427:1155): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239626362353666396665343066363330633661373838356464326535 Feb 9 09:49:07.427000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.478837 kernel: audit: type=1400 audit(1707472147.427:1156): avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.427000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.487845 kernel: audit: type=1400 audit(1707472147.427:1156): avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.427000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.496323 kernel: audit: type=1400 audit(1707472147.427:1156): avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.427000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.504466 kernel: audit: type=1400 audit(1707472147.427:1156): avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.427000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.513394 kernel: audit: type=1400 audit(1707472147.427:1156): avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.427000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.524903 kernel: audit: type=1400 audit(1707472147.427:1156): avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.427000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.533346 kernel: audit: type=1400 audit(1707472147.427:1156): avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.427000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.427000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.427000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.427000 audit: BPF prog-id=148 op=LOAD Feb 9 09:49:07.427000 audit[3721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3228 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:07.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239626362353666396665343066363330633661373838356464326535 Feb 9 09:49:07.430000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.430000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.430000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.430000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.430000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.430000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.430000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.430000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.430000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.430000 audit: BPF prog-id=149 op=LOAD Feb 9 09:49:07.430000 audit[3721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3228 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:07.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239626362353666396665343066363330633661373838356464326535 Feb 9 09:49:07.438000 audit: BPF prog-id=149 op=UNLOAD Feb 9 09:49:07.438000 audit: BPF prog-id=148 op=UNLOAD Feb 9 09:49:07.438000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.438000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.438000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.438000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.438000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.438000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.438000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.438000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.438000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.438000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:07.438000 audit: BPF prog-id=150 op=LOAD Feb 9 09:49:07.438000 audit[3721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3228 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:07.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239626362353666396665343066363330633661373838356464326535 Feb 9 09:49:07.540397 env[1656]: time="2024-02-09T09:49:07.540326985Z" level=info msg="StartContainer for \"29bcb56f9fe40f630c6a7885dd2e5c6a43a1599e4078245010da7dac79ce52d1\" returns successfully" Feb 9 09:49:07.660398 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 09:49:07.660592 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 09:49:08.222480 systemd[1]: run-containerd-runc-k8s.io-29bcb56f9fe40f630c6a7885dd2e5c6a43a1599e4078245010da7dac79ce52d1-runc.yDA8iw.mount: Deactivated successfully. Feb 9 09:49:08.861446 env[1656]: time="2024-02-09T09:49:08.861347448Z" level=info msg="StopPodSandbox for \"457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67\"" Feb 9 09:49:08.958106 kubelet[2771]: I0209 09:49:08.957272 2771 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-q8nqq" podStartSLOduration=2.547725178 podCreationTimestamp="2024-02-09 09:48:43 +0000 UTC" firstStartedPulling="2024-02-09 09:48:43.870500839 +0000 UTC m=+22.323120423" lastFinishedPulling="2024-02-09 09:49:07.279991456 +0000 UTC m=+45.732611028" observedRunningTime="2024-02-09 09:49:08.213662732 +0000 UTC m=+46.666282328" watchObservedRunningTime="2024-02-09 09:49:08.957215783 +0000 UTC m=+47.409835355" Feb 9 09:49:09.030211 env[1656]: 2024-02-09 09:49:08.960 [INFO][3814] k8s.go 578: Cleaning up netns ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" Feb 9 09:49:09.030211 env[1656]: 2024-02-09 09:49:08.960 [INFO][3814] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" iface="eth0" netns="/var/run/netns/cni-a6c75eb1-6458-57fc-c89c-db0ed9834c1a" Feb 9 09:49:09.030211 env[1656]: 2024-02-09 09:49:08.960 [INFO][3814] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" iface="eth0" netns="/var/run/netns/cni-a6c75eb1-6458-57fc-c89c-db0ed9834c1a" Feb 9 09:49:09.030211 env[1656]: 2024-02-09 09:49:08.961 [INFO][3814] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" iface="eth0" netns="/var/run/netns/cni-a6c75eb1-6458-57fc-c89c-db0ed9834c1a" Feb 9 09:49:09.030211 env[1656]: 2024-02-09 09:49:08.961 [INFO][3814] k8s.go 585: Releasing IP address(es) ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" Feb 9 09:49:09.030211 env[1656]: 2024-02-09 09:49:08.961 [INFO][3814] utils.go 188: Calico CNI releasing IP address ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" Feb 9 09:49:09.030211 env[1656]: 2024-02-09 09:49:09.008 [INFO][3821] ipam_plugin.go 415: Releasing address using handleID ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" HandleID="k8s-pod-network.457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" Workload="ip--172--31--21--69-k8s-coredns--5d78c9869d--wnfbr-eth0" Feb 9 09:49:09.030211 env[1656]: 2024-02-09 09:49:09.009 [INFO][3821] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:49:09.030211 env[1656]: 2024-02-09 09:49:09.009 [INFO][3821] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:49:09.030211 env[1656]: 2024-02-09 09:49:09.023 [WARNING][3821] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" HandleID="k8s-pod-network.457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" Workload="ip--172--31--21--69-k8s-coredns--5d78c9869d--wnfbr-eth0" Feb 9 09:49:09.030211 env[1656]: 2024-02-09 09:49:09.023 [INFO][3821] ipam_plugin.go 443: Releasing address using workloadID ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" HandleID="k8s-pod-network.457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" Workload="ip--172--31--21--69-k8s-coredns--5d78c9869d--wnfbr-eth0" Feb 9 09:49:09.030211 env[1656]: 2024-02-09 09:49:09.026 [INFO][3821] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:49:09.030211 env[1656]: 2024-02-09 09:49:09.028 [INFO][3814] k8s.go 591: Teardown processing complete. ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" Feb 9 09:49:09.034655 systemd[1]: run-netns-cni\x2da6c75eb1\x2d6458\x2d57fc\x2dc89c\x2ddb0ed9834c1a.mount: Deactivated successfully. Feb 9 09:49:09.034884 env[1656]: time="2024-02-09T09:49:09.034783035Z" level=info msg="TearDown network for sandbox \"457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67\" successfully" Feb 9 09:49:09.034884 env[1656]: time="2024-02-09T09:49:09.034839744Z" level=info msg="StopPodSandbox for \"457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67\" returns successfully" Feb 9 09:49:09.036629 env[1656]: time="2024-02-09T09:49:09.036571285Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-wnfbr,Uid:d3953bad-31a4-4e9c-9952-dd7f7abf0df6,Namespace:kube-system,Attempt:1,}" Feb 9 09:49:09.166529 systemd[1]: run-containerd-runc-k8s.io-29bcb56f9fe40f630c6a7885dd2e5c6a43a1599e4078245010da7dac79ce52d1-runc.4SZxxa.mount: Deactivated successfully. Feb 9 09:49:09.325374 (udev-worker)[3867]: Network interface NamePolicy= disabled on kernel command line. Feb 9 09:49:09.339952 systemd-networkd[1450]: calibc9d2b1abe2: Link UP Feb 9 09:49:09.347141 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:49:09.347279 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibc9d2b1abe2: link becomes ready Feb 9 09:49:09.348272 systemd-networkd[1450]: calibc9d2b1abe2: Gained carrier Feb 9 09:49:09.395038 env[1656]: 2024-02-09 09:49:09.099 [INFO][3828] utils.go 100: File /var/lib/calico/mtu does not exist Feb 9 09:49:09.395038 env[1656]: 2024-02-09 09:49:09.126 [INFO][3828] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--69-k8s-coredns--5d78c9869d--wnfbr-eth0 coredns-5d78c9869d- kube-system d3953bad-31a4-4e9c-9952-dd7f7abf0df6 710 0 2024-02-09 09:48:35 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-21-69 coredns-5d78c9869d-wnfbr eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calibc9d2b1abe2 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541" Namespace="kube-system" Pod="coredns-5d78c9869d-wnfbr" WorkloadEndpoint="ip--172--31--21--69-k8s-coredns--5d78c9869d--wnfbr-" Feb 9 09:49:09.395038 env[1656]: 2024-02-09 09:49:09.132 [INFO][3828] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541" Namespace="kube-system" Pod="coredns-5d78c9869d-wnfbr" WorkloadEndpoint="ip--172--31--21--69-k8s-coredns--5d78c9869d--wnfbr-eth0" Feb 9 09:49:09.395038 env[1656]: 2024-02-09 09:49:09.212 [INFO][3846] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541" HandleID="k8s-pod-network.3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541" Workload="ip--172--31--21--69-k8s-coredns--5d78c9869d--wnfbr-eth0" Feb 9 09:49:09.395038 env[1656]: 2024-02-09 09:49:09.234 [INFO][3846] ipam_plugin.go 268: Auto assigning IP ContainerID="3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541" HandleID="k8s-pod-network.3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541" Workload="ip--172--31--21--69-k8s-coredns--5d78c9869d--wnfbr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000292b50), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-21-69", "pod":"coredns-5d78c9869d-wnfbr", "timestamp":"2024-02-09 09:49:09.212587689 +0000 UTC"}, Hostname:"ip-172-31-21-69", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:49:09.395038 env[1656]: 2024-02-09 09:49:09.234 [INFO][3846] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:49:09.395038 env[1656]: 2024-02-09 09:49:09.235 [INFO][3846] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:49:09.395038 env[1656]: 2024-02-09 09:49:09.235 [INFO][3846] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-69' Feb 9 09:49:09.395038 env[1656]: 2024-02-09 09:49:09.238 [INFO][3846] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541" host="ip-172-31-21-69" Feb 9 09:49:09.395038 env[1656]: 2024-02-09 09:49:09.245 [INFO][3846] ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-69" Feb 9 09:49:09.395038 env[1656]: 2024-02-09 09:49:09.253 [INFO][3846] ipam.go 489: Trying affinity for 192.168.113.64/26 host="ip-172-31-21-69" Feb 9 09:49:09.395038 env[1656]: 2024-02-09 09:49:09.257 [INFO][3846] ipam.go 155: Attempting to load block cidr=192.168.113.64/26 host="ip-172-31-21-69" Feb 9 09:49:09.395038 env[1656]: 2024-02-09 09:49:09.261 [INFO][3846] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.64/26 host="ip-172-31-21-69" Feb 9 09:49:09.395038 env[1656]: 2024-02-09 09:49:09.262 [INFO][3846] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.64/26 handle="k8s-pod-network.3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541" host="ip-172-31-21-69" Feb 9 09:49:09.395038 env[1656]: 2024-02-09 09:49:09.265 [INFO][3846] ipam.go 1682: Creating new handle: k8s-pod-network.3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541 Feb 9 09:49:09.395038 env[1656]: 2024-02-09 09:49:09.282 [INFO][3846] ipam.go 1203: Writing block in order to claim IPs block=192.168.113.64/26 handle="k8s-pod-network.3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541" host="ip-172-31-21-69" Feb 9 09:49:09.395038 env[1656]: 2024-02-09 09:49:09.304 [INFO][3846] ipam.go 1216: Successfully claimed IPs: [192.168.113.65/26] block=192.168.113.64/26 handle="k8s-pod-network.3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541" host="ip-172-31-21-69" Feb 9 09:49:09.395038 env[1656]: 2024-02-09 09:49:09.304 [INFO][3846] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.65/26] handle="k8s-pod-network.3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541" host="ip-172-31-21-69" Feb 9 09:49:09.395038 env[1656]: 2024-02-09 09:49:09.304 [INFO][3846] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:49:09.395038 env[1656]: 2024-02-09 09:49:09.304 [INFO][3846] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.113.65/26] IPv6=[] ContainerID="3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541" HandleID="k8s-pod-network.3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541" Workload="ip--172--31--21--69-k8s-coredns--5d78c9869d--wnfbr-eth0" Feb 9 09:49:09.396603 env[1656]: 2024-02-09 09:49:09.311 [INFO][3828] k8s.go 385: Populated endpoint ContainerID="3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541" Namespace="kube-system" Pod="coredns-5d78c9869d-wnfbr" WorkloadEndpoint="ip--172--31--21--69-k8s-coredns--5d78c9869d--wnfbr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--69-k8s-coredns--5d78c9869d--wnfbr-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"d3953bad-31a4-4e9c-9952-dd7f7abf0df6", ResourceVersion:"710", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 48, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-69", ContainerID:"", Pod:"coredns-5d78c9869d-wnfbr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibc9d2b1abe2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:49:09.396603 env[1656]: 2024-02-09 09:49:09.312 [INFO][3828] k8s.go 386: Calico CNI using IPs: [192.168.113.65/32] ContainerID="3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541" Namespace="kube-system" Pod="coredns-5d78c9869d-wnfbr" WorkloadEndpoint="ip--172--31--21--69-k8s-coredns--5d78c9869d--wnfbr-eth0" Feb 9 09:49:09.396603 env[1656]: 2024-02-09 09:49:09.312 [INFO][3828] dataplane_linux.go 68: Setting the host side veth name to calibc9d2b1abe2 ContainerID="3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541" Namespace="kube-system" Pod="coredns-5d78c9869d-wnfbr" WorkloadEndpoint="ip--172--31--21--69-k8s-coredns--5d78c9869d--wnfbr-eth0" Feb 9 09:49:09.396603 env[1656]: 2024-02-09 09:49:09.354 [INFO][3828] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541" Namespace="kube-system" Pod="coredns-5d78c9869d-wnfbr" WorkloadEndpoint="ip--172--31--21--69-k8s-coredns--5d78c9869d--wnfbr-eth0" Feb 9 09:49:09.396603 env[1656]: 2024-02-09 09:49:09.354 [INFO][3828] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541" Namespace="kube-system" Pod="coredns-5d78c9869d-wnfbr" WorkloadEndpoint="ip--172--31--21--69-k8s-coredns--5d78c9869d--wnfbr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--69-k8s-coredns--5d78c9869d--wnfbr-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"d3953bad-31a4-4e9c-9952-dd7f7abf0df6", ResourceVersion:"710", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 48, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-69", ContainerID:"3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541", Pod:"coredns-5d78c9869d-wnfbr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibc9d2b1abe2", MAC:"12:b6:52:82:14:ba", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:49:09.396603 env[1656]: 2024-02-09 09:49:09.391 [INFO][3828] k8s.go 491: Wrote updated endpoint to datastore ContainerID="3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541" Namespace="kube-system" Pod="coredns-5d78c9869d-wnfbr" WorkloadEndpoint="ip--172--31--21--69-k8s-coredns--5d78c9869d--wnfbr-eth0" Feb 9 09:49:09.426038 env[1656]: time="2024-02-09T09:49:09.425818084Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:49:09.426038 env[1656]: time="2024-02-09T09:49:09.425898420Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:49:09.426310 env[1656]: time="2024-02-09T09:49:09.425925659Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:49:09.431967 env[1656]: time="2024-02-09T09:49:09.428692066Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541 pid=3893 runtime=io.containerd.runc.v2 Feb 9 09:49:09.470727 systemd[1]: Started cri-containerd-3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541.scope. Feb 9 09:49:09.489997 systemd[1]: run-containerd-runc-k8s.io-3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541-runc.YvXv68.mount: Deactivated successfully. Feb 9 09:49:09.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.583000 audit: BPF prog-id=151 op=LOAD Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3893 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:09.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365653438656332333334626338306363373361663735363163636233 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3893 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:09.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365653438656332333334626338306363373361663735363163636233 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit: BPF prog-id=152 op=LOAD Feb 9 09:49:09.585000 audit[3904]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3893 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:09.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365653438656332333334626338306363373361663735363163636233 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit: BPF prog-id=153 op=LOAD Feb 9 09:49:09.585000 audit[3904]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3893 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:09.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365653438656332333334626338306363373361663735363163636233 Feb 9 09:49:09.585000 audit: BPF prog-id=153 op=UNLOAD Feb 9 09:49:09.585000 audit: BPF prog-id=152 op=UNLOAD Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.585000 audit: BPF prog-id=154 op=LOAD Feb 9 09:49:09.585000 audit[3904]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3893 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:09.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365653438656332333334626338306363373361663735363163636233 Feb 9 09:49:09.617265 kubelet[2771]: I0209 09:49:09.616142 2771 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 09:49:09.650317 env[1656]: time="2024-02-09T09:49:09.650258291Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-wnfbr,Uid:d3953bad-31a4-4e9c-9952-dd7f7abf0df6,Namespace:kube-system,Attempt:1,} returns sandbox id \"3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541\"" Feb 9 09:49:09.656936 env[1656]: time="2024-02-09T09:49:09.656875049Z" level=info msg="CreateContainer within sandbox \"3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 09:49:09.705000 audit[3948]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=3948 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:49:09.705000 audit[3948]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=fffff88438f0 a2=0 a3=ffffb25796c0 items=0 ppid=2944 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:09.705000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:49:09.713000 audit[3948]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3948 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:49:09.713000 audit[3948]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6068 a0=3 a1=fffff88438f0 a2=0 a3=ffffb25796c0 items=0 ppid=2944 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:09.713000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:49:09.760733 env[1656]: time="2024-02-09T09:49:09.760660818Z" level=info msg="CreateContainer within sandbox \"3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"13cab2fdc75d3f025778ae8cc208cfb9d796706b5604a58470f1cb153cbd4b9a\"" Feb 9 09:49:09.765581 env[1656]: time="2024-02-09T09:49:09.765523213Z" level=info msg="StartContainer for \"13cab2fdc75d3f025778ae8cc208cfb9d796706b5604a58470f1cb153cbd4b9a\"" Feb 9 09:49:09.826105 systemd[1]: Started cri-containerd-13cab2fdc75d3f025778ae8cc208cfb9d796706b5604a58470f1cb153cbd4b9a.scope. Feb 9 09:49:09.864000 audit[3986]: AVC avc: denied { write } for pid=3986 comm="tee" name="fd" dev="proc" ino=21588 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:49:09.864000 audit[3986]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff1492983 a2=241 a3=1b6 items=1 ppid=3923 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:09.864000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 09:49:09.864000 audit: PATH item=0 name="/dev/fd/63" inode=21550 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:49:09.864000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:49:09.876000 audit[4001]: AVC avc: denied { write } for pid=4001 comm="tee" name="fd" dev="proc" ino=21598 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:49:09.876000 audit[4001]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff1665984 a2=241 a3=1b6 items=1 ppid=3939 pid=4001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:09.876000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 09:49:09.876000 audit: PATH item=0 name="/dev/fd/63" inode=21578 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:49:09.878000 audit[4007]: AVC avc: denied { write } for pid=4007 comm="tee" name="fd" dev="proc" ino=20970 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:49:09.878000 audit[4007]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff3ea1983 a2=241 a3=1b6 items=1 ppid=3926 pid=4007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:09.878000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 09:49:09.878000 audit: PATH item=0 name="/dev/fd/63" inode=21595 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:49:09.878000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:49:09.879000 audit[3982]: AVC avc: denied { write } for pid=3982 comm="tee" name="fd" dev="proc" ino=21602 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:49:09.879000 audit[3982]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcae24983 a2=241 a3=1b6 items=1 ppid=3913 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:09.879000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 09:49:09.879000 audit: PATH item=0 name="/dev/fd/63" inode=21549 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:49:09.879000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:49:09.876000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:49:09.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.923000 audit: BPF prog-id=155 op=LOAD Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3893 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:09.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133636162326664633735643366303235373738616538636332303863 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3893 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:09.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133636162326664633735643366303235373738616538636332303863 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit: BPF prog-id=156 op=LOAD Feb 9 09:49:09.925000 audit[3975]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3893 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:09.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133636162326664633735643366303235373738616538636332303863 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit: BPF prog-id=157 op=LOAD Feb 9 09:49:09.925000 audit[3975]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3893 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:09.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133636162326664633735643366303235373738616538636332303863 Feb 9 09:49:09.925000 audit: BPF prog-id=157 op=UNLOAD Feb 9 09:49:09.925000 audit: BPF prog-id=156 op=UNLOAD Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:09.925000 audit: BPF prog-id=158 op=LOAD Feb 9 09:49:09.925000 audit[3975]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3893 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:09.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133636162326664633735643366303235373738616538636332303863 Feb 9 09:49:09.939000 audit[4004]: AVC avc: denied { write } for pid=4004 comm="tee" name="fd" dev="proc" ino=21616 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:49:09.939000 audit[4004]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe8fe3985 a2=241 a3=1b6 items=1 ppid=3935 pid=4004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:09.939000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 09:49:09.939000 audit: PATH item=0 name="/dev/fd/63" inode=21594 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:49:09.939000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:49:09.950000 audit[4010]: AVC avc: denied { write } for pid=4010 comm="tee" name="fd" dev="proc" ino=21618 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:49:09.950000 audit[4010]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffecdff973 a2=241 a3=1b6 items=1 ppid=3921 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:09.950000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 09:49:09.965000 audit[4012]: AVC avc: denied { write } for pid=4012 comm="tee" name="fd" dev="proc" ino=21624 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:49:09.950000 audit: PATH item=0 name="/dev/fd/63" inode=21604 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:49:09.950000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:49:09.991086 env[1656]: time="2024-02-09T09:49:09.990999630Z" level=info msg="StartContainer for \"13cab2fdc75d3f025778ae8cc208cfb9d796706b5604a58470f1cb153cbd4b9a\" returns successfully" Feb 9 09:49:09.965000 audit[4012]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd881f974 a2=241 a3=1b6 items=1 ppid=3934 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:09.965000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 09:49:09.965000 audit: PATH item=0 name="/dev/fd/63" inode=21605 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:49:09.965000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:49:10.217000 audit[4043]: NETFILTER_CFG table=filter:97 family=2 entries=14 op=nft_register_rule pid=4043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:49:10.217000 audit[4043]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffcff05400 a2=0 a3=ffff8c3f96c0 items=0 ppid=2944 pid=4043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:10.217000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:49:10.220000 audit[4043]: NETFILTER_CFG table=nat:98 family=2 entries=14 op=nft_register_rule pid=4043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:49:10.220000 audit[4043]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3300 a0=3 a1=ffffcff05400 a2=0 a3=ffff8c3f96c0 items=0 ppid=2944 pid=4043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:10.220000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:49:10.739005 (udev-worker)[3755]: Network interface NamePolicy= disabled on kernel command line. Feb 9 09:49:10.740000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.740000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.740000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.740000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.740000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.740000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.740000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.740000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.740000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.740000 audit: BPF prog-id=159 op=LOAD Feb 9 09:49:10.740000 audit[4110]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdced2738 a2=70 a3=0 items=0 ppid=3914 pid=4110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:10.740000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:49:10.746000 audit: BPF prog-id=159 op=UNLOAD Feb 9 09:49:10.746000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.746000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.746000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.746000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.746000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.746000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.746000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.746000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.746000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.746000 audit: BPF prog-id=160 op=LOAD Feb 9 09:49:10.746000 audit[4110]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdced2738 a2=70 a3=4a174c items=0 ppid=3914 pid=4110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:10.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:49:10.750000 audit: BPF prog-id=160 op=UNLOAD Feb 9 09:49:10.750000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.750000 audit[4110]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffdced2768 a2=70 a3=3f5b773f items=0 ppid=3914 pid=4110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:10.750000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:49:10.751000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.751000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.751000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.751000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.751000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.751000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.751000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.751000 audit[4110]: AVC avc: denied { perfmon } for pid=4110 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.751000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.751000 audit[4110]: AVC avc: denied { bpf } for pid=4110 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.751000 audit: BPF prog-id=161 op=LOAD Feb 9 09:49:10.751000 audit[4110]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffdced26b8 a2=70 a3=3f5b7759 items=0 ppid=3914 pid=4110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:10.751000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:49:10.769000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.769000 audit[4116]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffffa772b38 a2=70 a3=0 items=0 ppid=3914 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:10.769000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 09:49:10.769000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:10.769000 audit[4116]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffffa772a18 a2=70 a3=2 items=0 ppid=3914 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:10.769000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 09:49:10.788000 audit: BPF prog-id=161 op=UNLOAD Feb 9 09:49:10.855863 env[1656]: time="2024-02-09T09:49:10.855793498Z" level=info msg="StopPodSandbox for \"d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b\"" Feb 9 09:49:10.940022 systemd-networkd[1450]: calibc9d2b1abe2: Gained IPv6LL Feb 9 09:49:10.973002 kubelet[2771]: I0209 09:49:10.972905 2771 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-wnfbr" podStartSLOduration=35.972848846 podCreationTimestamp="2024-02-09 09:48:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:49:10.166847666 +0000 UTC m=+48.619467322" watchObservedRunningTime="2024-02-09 09:49:10.972848846 +0000 UTC m=+49.425468430" Feb 9 09:49:11.011000 audit[4161]: NETFILTER_CFG table=raw:99 family=2 entries=19 op=nft_register_chain pid=4161 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:49:11.011000 audit[4161]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffec93bd10 a2=0 a3=ffffb2e8bfa8 items=0 ppid=3914 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:11.011000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:49:11.019000 audit[4162]: NETFILTER_CFG table=nat:100 family=2 entries=16 op=nft_register_chain pid=4162 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:49:11.019000 audit[4162]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffc62a4f10 a2=0 a3=ffffbf026fa8 items=0 ppid=3914 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:11.019000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:49:11.029000 audit[4164]: NETFILTER_CFG table=mangle:101 family=2 entries=19 op=nft_register_chain pid=4164 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:49:11.029000 audit[4164]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffc1166560 a2=0 a3=ffffbac40fa8 items=0 ppid=3914 pid=4164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:11.029000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:49:11.050000 audit[4169]: NETFILTER_CFG table=filter:102 family=2 entries=71 op=nft_register_chain pid=4169 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:49:11.050000 audit[4169]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=36636 a0=3 a1=ffffe4d5e750 a2=0 a3=ffff83d6efa8 items=0 ppid=3914 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:11.050000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:49:11.059994 env[1656]: 2024-02-09 09:49:10.970 [INFO][4138] k8s.go 578: Cleaning up netns ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" Feb 9 09:49:11.059994 env[1656]: 2024-02-09 09:49:10.970 [INFO][4138] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" iface="eth0" netns="/var/run/netns/cni-b326b22f-ff4c-ff36-c5d7-38e6cd3063c3" Feb 9 09:49:11.059994 env[1656]: 2024-02-09 09:49:10.973 [INFO][4138] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" iface="eth0" netns="/var/run/netns/cni-b326b22f-ff4c-ff36-c5d7-38e6cd3063c3" Feb 9 09:49:11.059994 env[1656]: 2024-02-09 09:49:10.973 [INFO][4138] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" iface="eth0" netns="/var/run/netns/cni-b326b22f-ff4c-ff36-c5d7-38e6cd3063c3" Feb 9 09:49:11.059994 env[1656]: 2024-02-09 09:49:10.973 [INFO][4138] k8s.go 585: Releasing IP address(es) ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" Feb 9 09:49:11.059994 env[1656]: 2024-02-09 09:49:10.973 [INFO][4138] utils.go 188: Calico CNI releasing IP address ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" Feb 9 09:49:11.059994 env[1656]: 2024-02-09 09:49:11.034 [INFO][4156] ipam_plugin.go 415: Releasing address using handleID ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" HandleID="k8s-pod-network.d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" Workload="ip--172--31--21--69-k8s-csi--node--driver--xc4l2-eth0" Feb 9 09:49:11.059994 env[1656]: 2024-02-09 09:49:11.034 [INFO][4156] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:49:11.059994 env[1656]: 2024-02-09 09:49:11.034 [INFO][4156] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:49:11.059994 env[1656]: 2024-02-09 09:49:11.051 [WARNING][4156] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" HandleID="k8s-pod-network.d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" Workload="ip--172--31--21--69-k8s-csi--node--driver--xc4l2-eth0" Feb 9 09:49:11.059994 env[1656]: 2024-02-09 09:49:11.051 [INFO][4156] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" HandleID="k8s-pod-network.d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" Workload="ip--172--31--21--69-k8s-csi--node--driver--xc4l2-eth0" Feb 9 09:49:11.059994 env[1656]: 2024-02-09 09:49:11.054 [INFO][4156] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:49:11.059994 env[1656]: 2024-02-09 09:49:11.057 [INFO][4138] k8s.go 591: Teardown processing complete. ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" Feb 9 09:49:11.061386 env[1656]: time="2024-02-09T09:49:11.060212713Z" level=info msg="TearDown network for sandbox \"d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b\" successfully" Feb 9 09:49:11.061386 env[1656]: time="2024-02-09T09:49:11.060256715Z" level=info msg="StopPodSandbox for \"d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b\" returns successfully" Feb 9 09:49:11.061386 env[1656]: time="2024-02-09T09:49:11.061354069Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xc4l2,Uid:b3342c12-c4d9-47f8-827a-753e9a9e2b4c,Namespace:calico-system,Attempt:1,}" Feb 9 09:49:11.067331 systemd[1]: run-netns-cni\x2db326b22f\x2dff4c\x2dff36\x2dc5d7\x2d38e6cd3063c3.mount: Deactivated successfully. Feb 9 09:49:11.210000 audit[4187]: NETFILTER_CFG table=filter:103 family=2 entries=11 op=nft_register_rule pid=4187 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:49:11.210000 audit[4187]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=fffff2aa7220 a2=0 a3=ffffb2e396c0 items=0 ppid=2944 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:11.210000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:49:11.215000 audit[4187]: NETFILTER_CFG table=nat:104 family=2 entries=35 op=nft_register_chain pid=4187 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:49:11.215000 audit[4187]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13788 a0=3 a1=fffff2aa7220 a2=0 a3=ffffb2e396c0 items=0 ppid=2944 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:11.215000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:49:11.339028 (udev-worker)[4114]: Network interface NamePolicy= disabled on kernel command line. Feb 9 09:49:11.351250 systemd-networkd[1450]: calib4c70e57bd7: Link UP Feb 9 09:49:11.354683 systemd-networkd[1450]: calib4c70e57bd7: Gained carrier Feb 9 09:49:11.355582 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib4c70e57bd7: link becomes ready Feb 9 09:49:11.375053 env[1656]: 2024-02-09 09:49:11.193 [INFO][4174] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--69-k8s-csi--node--driver--xc4l2-eth0 csi-node-driver- calico-system b3342c12-c4d9-47f8-827a-753e9a9e2b4c 737 0 2024-02-09 09:48:43 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ip-172-31-21-69 csi-node-driver-xc4l2 eth0 default [] [] [kns.calico-system ksa.calico-system.default] calib4c70e57bd7 [] []}} ContainerID="ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786" Namespace="calico-system" Pod="csi-node-driver-xc4l2" WorkloadEndpoint="ip--172--31--21--69-k8s-csi--node--driver--xc4l2-" Feb 9 09:49:11.375053 env[1656]: 2024-02-09 09:49:11.194 [INFO][4174] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786" Namespace="calico-system" Pod="csi-node-driver-xc4l2" WorkloadEndpoint="ip--172--31--21--69-k8s-csi--node--driver--xc4l2-eth0" Feb 9 09:49:11.375053 env[1656]: 2024-02-09 09:49:11.267 [INFO][4188] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786" HandleID="k8s-pod-network.ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786" Workload="ip--172--31--21--69-k8s-csi--node--driver--xc4l2-eth0" Feb 9 09:49:11.375053 env[1656]: 2024-02-09 09:49:11.287 [INFO][4188] ipam_plugin.go 268: Auto assigning IP ContainerID="ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786" HandleID="k8s-pod-network.ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786" Workload="ip--172--31--21--69-k8s-csi--node--driver--xc4l2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400011a400), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-21-69", "pod":"csi-node-driver-xc4l2", "timestamp":"2024-02-09 09:49:11.267077456 +0000 UTC"}, Hostname:"ip-172-31-21-69", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:49:11.375053 env[1656]: 2024-02-09 09:49:11.287 [INFO][4188] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:49:11.375053 env[1656]: 2024-02-09 09:49:11.288 [INFO][4188] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:49:11.375053 env[1656]: 2024-02-09 09:49:11.288 [INFO][4188] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-69' Feb 9 09:49:11.375053 env[1656]: 2024-02-09 09:49:11.292 [INFO][4188] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786" host="ip-172-31-21-69" Feb 9 09:49:11.375053 env[1656]: 2024-02-09 09:49:11.300 [INFO][4188] ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-69" Feb 9 09:49:11.375053 env[1656]: 2024-02-09 09:49:11.309 [INFO][4188] ipam.go 489: Trying affinity for 192.168.113.64/26 host="ip-172-31-21-69" Feb 9 09:49:11.375053 env[1656]: 2024-02-09 09:49:11.313 [INFO][4188] ipam.go 155: Attempting to load block cidr=192.168.113.64/26 host="ip-172-31-21-69" Feb 9 09:49:11.375053 env[1656]: 2024-02-09 09:49:11.316 [INFO][4188] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.64/26 host="ip-172-31-21-69" Feb 9 09:49:11.375053 env[1656]: 2024-02-09 09:49:11.317 [INFO][4188] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.64/26 handle="k8s-pod-network.ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786" host="ip-172-31-21-69" Feb 9 09:49:11.375053 env[1656]: 2024-02-09 09:49:11.319 [INFO][4188] ipam.go 1682: Creating new handle: k8s-pod-network.ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786 Feb 9 09:49:11.375053 env[1656]: 2024-02-09 09:49:11.325 [INFO][4188] ipam.go 1203: Writing block in order to claim IPs block=192.168.113.64/26 handle="k8s-pod-network.ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786" host="ip-172-31-21-69" Feb 9 09:49:11.375053 env[1656]: 2024-02-09 09:49:11.332 [INFO][4188] ipam.go 1216: Successfully claimed IPs: [192.168.113.66/26] block=192.168.113.64/26 handle="k8s-pod-network.ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786" host="ip-172-31-21-69" Feb 9 09:49:11.375053 env[1656]: 2024-02-09 09:49:11.333 [INFO][4188] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.66/26] handle="k8s-pod-network.ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786" host="ip-172-31-21-69" Feb 9 09:49:11.375053 env[1656]: 2024-02-09 09:49:11.333 [INFO][4188] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:49:11.375053 env[1656]: 2024-02-09 09:49:11.333 [INFO][4188] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.113.66/26] IPv6=[] ContainerID="ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786" HandleID="k8s-pod-network.ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786" Workload="ip--172--31--21--69-k8s-csi--node--driver--xc4l2-eth0" Feb 9 09:49:11.376569 env[1656]: 2024-02-09 09:49:11.336 [INFO][4174] k8s.go 385: Populated endpoint ContainerID="ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786" Namespace="calico-system" Pod="csi-node-driver-xc4l2" WorkloadEndpoint="ip--172--31--21--69-k8s-csi--node--driver--xc4l2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--69-k8s-csi--node--driver--xc4l2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b3342c12-c4d9-47f8-827a-753e9a9e2b4c", ResourceVersion:"737", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 48, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-69", ContainerID:"", Pod:"csi-node-driver-xc4l2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calib4c70e57bd7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:49:11.376569 env[1656]: 2024-02-09 09:49:11.336 [INFO][4174] k8s.go 386: Calico CNI using IPs: [192.168.113.66/32] ContainerID="ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786" Namespace="calico-system" Pod="csi-node-driver-xc4l2" WorkloadEndpoint="ip--172--31--21--69-k8s-csi--node--driver--xc4l2-eth0" Feb 9 09:49:11.376569 env[1656]: 2024-02-09 09:49:11.336 [INFO][4174] dataplane_linux.go 68: Setting the host side veth name to calib4c70e57bd7 ContainerID="ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786" Namespace="calico-system" Pod="csi-node-driver-xc4l2" WorkloadEndpoint="ip--172--31--21--69-k8s-csi--node--driver--xc4l2-eth0" Feb 9 09:49:11.376569 env[1656]: 2024-02-09 09:49:11.351 [INFO][4174] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786" Namespace="calico-system" Pod="csi-node-driver-xc4l2" WorkloadEndpoint="ip--172--31--21--69-k8s-csi--node--driver--xc4l2-eth0" Feb 9 09:49:11.376569 env[1656]: 2024-02-09 09:49:11.354 [INFO][4174] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786" Namespace="calico-system" Pod="csi-node-driver-xc4l2" WorkloadEndpoint="ip--172--31--21--69-k8s-csi--node--driver--xc4l2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--69-k8s-csi--node--driver--xc4l2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b3342c12-c4d9-47f8-827a-753e9a9e2b4c", ResourceVersion:"737", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 48, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-69", ContainerID:"ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786", Pod:"csi-node-driver-xc4l2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calib4c70e57bd7", MAC:"9e:0e:b8:a1:f6:6e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:49:11.376569 env[1656]: 2024-02-09 09:49:11.371 [INFO][4174] k8s.go 491: Wrote updated endpoint to datastore ContainerID="ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786" Namespace="calico-system" Pod="csi-node-driver-xc4l2" WorkloadEndpoint="ip--172--31--21--69-k8s-csi--node--driver--xc4l2-eth0" Feb 9 09:49:11.400784 env[1656]: time="2024-02-09T09:49:11.400557275Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:49:11.401082 env[1656]: time="2024-02-09T09:49:11.401022723Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:49:11.401263 env[1656]: time="2024-02-09T09:49:11.401207215Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:49:11.401860 env[1656]: time="2024-02-09T09:49:11.401778751Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786 pid=4214 runtime=io.containerd.runc.v2 Feb 9 09:49:11.435372 systemd[1]: Started cri-containerd-ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786.scope. Feb 9 09:49:11.449606 systemd[1]: run-containerd-runc-k8s.io-ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786-runc.THM2RE.mount: Deactivated successfully. Feb 9 09:49:11.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.487000 audit: BPF prog-id=162 op=LOAD Feb 9 09:49:11.488000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.488000 audit[4224]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4214 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:11.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162373333326136316433656233633163653538383435656366366435 Feb 9 09:49:11.488000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.488000 audit[4224]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4214 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:11.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162373333326136316433656233633163653538383435656366366435 Feb 9 09:49:11.488000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.488000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.488000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.488000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.488000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.488000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.488000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.488000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.488000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.488000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.488000 audit: BPF prog-id=163 op=LOAD Feb 9 09:49:11.488000 audit[4224]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4214 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:11.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162373333326136316433656233633163653538383435656366366435 Feb 9 09:49:11.488000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.488000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.488000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.488000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.488000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.488000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.488000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.488000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.488000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.488000 audit: BPF prog-id=164 op=LOAD Feb 9 09:49:11.488000 audit[4224]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4214 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:11.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162373333326136316433656233633163653538383435656366366435 Feb 9 09:49:11.488000 audit: BPF prog-id=164 op=UNLOAD Feb 9 09:49:11.488000 audit: BPF prog-id=163 op=UNLOAD Feb 9 09:49:11.489000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.489000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.489000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.489000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.489000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.489000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.489000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.489000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.489000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.489000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:11.489000 audit: BPF prog-id=165 op=LOAD Feb 9 09:49:11.489000 audit[4224]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4214 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:11.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162373333326136316433656233633163653538383435656366366435 Feb 9 09:49:11.517000 audit[4248]: NETFILTER_CFG table=filter:105 family=2 entries=40 op=nft_register_chain pid=4248 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:49:11.517000 audit[4248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21096 a0=3 a1=fffffb701c00 a2=0 a3=ffffb1d5cfa8 items=0 ppid=3914 pid=4248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:11.517000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:49:11.532264 systemd-networkd[1450]: vxlan.calico: Link UP Feb 9 09:49:11.532278 systemd-networkd[1450]: vxlan.calico: Gained carrier Feb 9 09:49:11.542732 env[1656]: time="2024-02-09T09:49:11.541662328Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xc4l2,Uid:b3342c12-c4d9-47f8-827a-753e9a9e2b4c,Namespace:calico-system,Attempt:1,} returns sandbox id \"ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786\"" Feb 9 09:49:11.551368 env[1656]: time="2024-02-09T09:49:11.548499988Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 09:49:11.857755 env[1656]: time="2024-02-09T09:49:11.857679019Z" level=info msg="StopPodSandbox for \"f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4\"" Feb 9 09:49:11.858977 env[1656]: time="2024-02-09T09:49:11.858927302Z" level=info msg="StopPodSandbox for \"27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50\"" Feb 9 09:49:12.098667 env[1656]: 2024-02-09 09:49:11.989 [INFO][4291] k8s.go 578: Cleaning up netns ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" Feb 9 09:49:12.098667 env[1656]: 2024-02-09 09:49:11.989 [INFO][4291] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" iface="eth0" netns="/var/run/netns/cni-5db6ebae-ae1f-09ba-199f-7bb4f10ecf1e" Feb 9 09:49:12.098667 env[1656]: 2024-02-09 09:49:11.990 [INFO][4291] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" iface="eth0" netns="/var/run/netns/cni-5db6ebae-ae1f-09ba-199f-7bb4f10ecf1e" Feb 9 09:49:12.098667 env[1656]: 2024-02-09 09:49:11.990 [INFO][4291] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" iface="eth0" netns="/var/run/netns/cni-5db6ebae-ae1f-09ba-199f-7bb4f10ecf1e" Feb 9 09:49:12.098667 env[1656]: 2024-02-09 09:49:11.990 [INFO][4291] k8s.go 585: Releasing IP address(es) ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" Feb 9 09:49:12.098667 env[1656]: 2024-02-09 09:49:11.990 [INFO][4291] utils.go 188: Calico CNI releasing IP address ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" Feb 9 09:49:12.098667 env[1656]: 2024-02-09 09:49:12.073 [INFO][4299] ipam_plugin.go 415: Releasing address using handleID ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" HandleID="k8s-pod-network.27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" Workload="ip--172--31--21--69-k8s-coredns--5d78c9869d--ftf4x-eth0" Feb 9 09:49:12.098667 env[1656]: 2024-02-09 09:49:12.074 [INFO][4299] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:49:12.098667 env[1656]: 2024-02-09 09:49:12.074 [INFO][4299] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:49:12.098667 env[1656]: 2024-02-09 09:49:12.089 [WARNING][4299] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" HandleID="k8s-pod-network.27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" Workload="ip--172--31--21--69-k8s-coredns--5d78c9869d--ftf4x-eth0" Feb 9 09:49:12.098667 env[1656]: 2024-02-09 09:49:12.090 [INFO][4299] ipam_plugin.go 443: Releasing address using workloadID ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" HandleID="k8s-pod-network.27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" Workload="ip--172--31--21--69-k8s-coredns--5d78c9869d--ftf4x-eth0" Feb 9 09:49:12.098667 env[1656]: 2024-02-09 09:49:12.092 [INFO][4299] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:49:12.098667 env[1656]: 2024-02-09 09:49:12.096 [INFO][4291] k8s.go 591: Teardown processing complete. ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" Feb 9 09:49:12.104668 env[1656]: time="2024-02-09T09:49:12.104601594Z" level=info msg="TearDown network for sandbox \"27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50\" successfully" Feb 9 09:49:12.104882 env[1656]: time="2024-02-09T09:49:12.104847392Z" level=info msg="StopPodSandbox for \"27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50\" returns successfully" Feb 9 09:49:12.106851 env[1656]: time="2024-02-09T09:49:12.106797868Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-ftf4x,Uid:f139e6d4-326b-4cbe-876f-d4056c406c20,Namespace:kube-system,Attempt:1,}" Feb 9 09:49:12.108532 systemd[1]: run-netns-cni\x2d5db6ebae\x2dae1f\x2d09ba\x2d199f\x2d7bb4f10ecf1e.mount: Deactivated successfully. Feb 9 09:49:12.153197 env[1656]: 2024-02-09 09:49:12.009 [INFO][4281] k8s.go 578: Cleaning up netns ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" Feb 9 09:49:12.153197 env[1656]: 2024-02-09 09:49:12.009 [INFO][4281] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" iface="eth0" netns="/var/run/netns/cni-7b435f08-bb19-8261-11a4-71001e641d1e" Feb 9 09:49:12.153197 env[1656]: 2024-02-09 09:49:12.010 [INFO][4281] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" iface="eth0" netns="/var/run/netns/cni-7b435f08-bb19-8261-11a4-71001e641d1e" Feb 9 09:49:12.153197 env[1656]: 2024-02-09 09:49:12.010 [INFO][4281] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" iface="eth0" netns="/var/run/netns/cni-7b435f08-bb19-8261-11a4-71001e641d1e" Feb 9 09:49:12.153197 env[1656]: 2024-02-09 09:49:12.010 [INFO][4281] k8s.go 585: Releasing IP address(es) ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" Feb 9 09:49:12.153197 env[1656]: 2024-02-09 09:49:12.010 [INFO][4281] utils.go 188: Calico CNI releasing IP address ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" Feb 9 09:49:12.153197 env[1656]: 2024-02-09 09:49:12.114 [INFO][4303] ipam_plugin.go 415: Releasing address using handleID ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" HandleID="k8s-pod-network.f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" Workload="ip--172--31--21--69-k8s-calico--kube--controllers--796677d4b5--w5f4z-eth0" Feb 9 09:49:12.153197 env[1656]: 2024-02-09 09:49:12.115 [INFO][4303] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:49:12.153197 env[1656]: 2024-02-09 09:49:12.115 [INFO][4303] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:49:12.153197 env[1656]: 2024-02-09 09:49:12.142 [WARNING][4303] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" HandleID="k8s-pod-network.f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" Workload="ip--172--31--21--69-k8s-calico--kube--controllers--796677d4b5--w5f4z-eth0" Feb 9 09:49:12.153197 env[1656]: 2024-02-09 09:49:12.142 [INFO][4303] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" HandleID="k8s-pod-network.f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" Workload="ip--172--31--21--69-k8s-calico--kube--controllers--796677d4b5--w5f4z-eth0" Feb 9 09:49:12.153197 env[1656]: 2024-02-09 09:49:12.145 [INFO][4303] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:49:12.153197 env[1656]: 2024-02-09 09:49:12.150 [INFO][4281] k8s.go 591: Teardown processing complete. ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" Feb 9 09:49:12.156608 env[1656]: time="2024-02-09T09:49:12.156527177Z" level=info msg="TearDown network for sandbox \"f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4\" successfully" Feb 9 09:49:12.156859 env[1656]: time="2024-02-09T09:49:12.156810714Z" level=info msg="StopPodSandbox for \"f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4\" returns successfully" Feb 9 09:49:12.158304 env[1656]: time="2024-02-09T09:49:12.158218978Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-796677d4b5-w5f4z,Uid:73c5decd-7bdc-496a-b0be-8e5a5bc10197,Namespace:calico-system,Attempt:1,}" Feb 9 09:49:12.410300 systemd[1]: run-netns-cni\x2d7b435f08\x2dbb19\x2d8261\x2d11a4\x2d71001e641d1e.mount: Deactivated successfully. Feb 9 09:49:12.577243 systemd-networkd[1450]: cali45a22dbcf75: Link UP Feb 9 09:49:12.584759 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:49:12.584924 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali45a22dbcf75: link becomes ready Feb 9 09:49:12.587175 systemd-networkd[1450]: cali45a22dbcf75: Gained carrier Feb 9 09:49:12.623631 env[1656]: 2024-02-09 09:49:12.230 [INFO][4311] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--69-k8s-coredns--5d78c9869d--ftf4x-eth0 coredns-5d78c9869d- kube-system f139e6d4-326b-4cbe-876f-d4056c406c20 751 0 2024-02-09 09:48:35 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-21-69 coredns-5d78c9869d-ftf4x eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali45a22dbcf75 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0" Namespace="kube-system" Pod="coredns-5d78c9869d-ftf4x" WorkloadEndpoint="ip--172--31--21--69-k8s-coredns--5d78c9869d--ftf4x-" Feb 9 09:49:12.623631 env[1656]: 2024-02-09 09:49:12.230 [INFO][4311] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0" Namespace="kube-system" Pod="coredns-5d78c9869d-ftf4x" WorkloadEndpoint="ip--172--31--21--69-k8s-coredns--5d78c9869d--ftf4x-eth0" Feb 9 09:49:12.623631 env[1656]: 2024-02-09 09:49:12.370 [INFO][4336] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0" HandleID="k8s-pod-network.85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0" Workload="ip--172--31--21--69-k8s-coredns--5d78c9869d--ftf4x-eth0" Feb 9 09:49:12.623631 env[1656]: 2024-02-09 09:49:12.440 [INFO][4336] ipam_plugin.go 268: Auto assigning IP ContainerID="85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0" HandleID="k8s-pod-network.85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0" Workload="ip--172--31--21--69-k8s-coredns--5d78c9869d--ftf4x-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002bd7a0), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-21-69", "pod":"coredns-5d78c9869d-ftf4x", "timestamp":"2024-02-09 09:49:12.370227941 +0000 UTC"}, Hostname:"ip-172-31-21-69", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:49:12.623631 env[1656]: 2024-02-09 09:49:12.441 [INFO][4336] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:49:12.623631 env[1656]: 2024-02-09 09:49:12.442 [INFO][4336] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:49:12.623631 env[1656]: 2024-02-09 09:49:12.442 [INFO][4336] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-69' Feb 9 09:49:12.623631 env[1656]: 2024-02-09 09:49:12.469 [INFO][4336] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0" host="ip-172-31-21-69" Feb 9 09:49:12.623631 env[1656]: 2024-02-09 09:49:12.486 [INFO][4336] ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-69" Feb 9 09:49:12.623631 env[1656]: 2024-02-09 09:49:12.501 [INFO][4336] ipam.go 489: Trying affinity for 192.168.113.64/26 host="ip-172-31-21-69" Feb 9 09:49:12.623631 env[1656]: 2024-02-09 09:49:12.506 [INFO][4336] ipam.go 155: Attempting to load block cidr=192.168.113.64/26 host="ip-172-31-21-69" Feb 9 09:49:12.623631 env[1656]: 2024-02-09 09:49:12.515 [INFO][4336] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.64/26 host="ip-172-31-21-69" Feb 9 09:49:12.623631 env[1656]: 2024-02-09 09:49:12.515 [INFO][4336] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.64/26 handle="k8s-pod-network.85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0" host="ip-172-31-21-69" Feb 9 09:49:12.623631 env[1656]: 2024-02-09 09:49:12.521 [INFO][4336] ipam.go 1682: Creating new handle: k8s-pod-network.85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0 Feb 9 09:49:12.623631 env[1656]: 2024-02-09 09:49:12.535 [INFO][4336] ipam.go 1203: Writing block in order to claim IPs block=192.168.113.64/26 handle="k8s-pod-network.85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0" host="ip-172-31-21-69" Feb 9 09:49:12.623631 env[1656]: 2024-02-09 09:49:12.553 [INFO][4336] ipam.go 1216: Successfully claimed IPs: [192.168.113.67/26] block=192.168.113.64/26 handle="k8s-pod-network.85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0" host="ip-172-31-21-69" Feb 9 09:49:12.623631 env[1656]: 2024-02-09 09:49:12.553 [INFO][4336] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.67/26] handle="k8s-pod-network.85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0" host="ip-172-31-21-69" Feb 9 09:49:12.623631 env[1656]: 2024-02-09 09:49:12.554 [INFO][4336] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:49:12.623631 env[1656]: 2024-02-09 09:49:12.554 [INFO][4336] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.113.67/26] IPv6=[] ContainerID="85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0" HandleID="k8s-pod-network.85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0" Workload="ip--172--31--21--69-k8s-coredns--5d78c9869d--ftf4x-eth0" Feb 9 09:49:12.625487 env[1656]: 2024-02-09 09:49:12.557 [INFO][4311] k8s.go 385: Populated endpoint ContainerID="85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0" Namespace="kube-system" Pod="coredns-5d78c9869d-ftf4x" WorkloadEndpoint="ip--172--31--21--69-k8s-coredns--5d78c9869d--ftf4x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--69-k8s-coredns--5d78c9869d--ftf4x-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"f139e6d4-326b-4cbe-876f-d4056c406c20", ResourceVersion:"751", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 48, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-69", ContainerID:"", Pod:"coredns-5d78c9869d-ftf4x", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali45a22dbcf75", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:49:12.625487 env[1656]: 2024-02-09 09:49:12.557 [INFO][4311] k8s.go 386: Calico CNI using IPs: [192.168.113.67/32] ContainerID="85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0" Namespace="kube-system" Pod="coredns-5d78c9869d-ftf4x" WorkloadEndpoint="ip--172--31--21--69-k8s-coredns--5d78c9869d--ftf4x-eth0" Feb 9 09:49:12.625487 env[1656]: 2024-02-09 09:49:12.557 [INFO][4311] dataplane_linux.go 68: Setting the host side veth name to cali45a22dbcf75 ContainerID="85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0" Namespace="kube-system" Pod="coredns-5d78c9869d-ftf4x" WorkloadEndpoint="ip--172--31--21--69-k8s-coredns--5d78c9869d--ftf4x-eth0" Feb 9 09:49:12.625487 env[1656]: 2024-02-09 09:49:12.593 [INFO][4311] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0" Namespace="kube-system" Pod="coredns-5d78c9869d-ftf4x" WorkloadEndpoint="ip--172--31--21--69-k8s-coredns--5d78c9869d--ftf4x-eth0" Feb 9 09:49:12.625487 env[1656]: 2024-02-09 09:49:12.600 [INFO][4311] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0" Namespace="kube-system" Pod="coredns-5d78c9869d-ftf4x" WorkloadEndpoint="ip--172--31--21--69-k8s-coredns--5d78c9869d--ftf4x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--69-k8s-coredns--5d78c9869d--ftf4x-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"f139e6d4-326b-4cbe-876f-d4056c406c20", ResourceVersion:"751", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 48, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-69", ContainerID:"85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0", Pod:"coredns-5d78c9869d-ftf4x", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali45a22dbcf75", MAC:"0e:c3:d1:02:fd:eb", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:49:12.625487 env[1656]: 2024-02-09 09:49:12.621 [INFO][4311] k8s.go 491: Wrote updated endpoint to datastore ContainerID="85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0" Namespace="kube-system" Pod="coredns-5d78c9869d-ftf4x" WorkloadEndpoint="ip--172--31--21--69-k8s-coredns--5d78c9869d--ftf4x-eth0" Feb 9 09:49:12.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.21.69:22-139.178.89.65:57286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:12.674836 kernel: kauditd_printk_skb: 321 callbacks suppressed Feb 9 09:49:12.674946 kernel: audit: type=1130 audit(1707472152.671:1242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.21.69:22-139.178.89.65:57286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:12.672224 systemd[1]: Started sshd@7-172.31.21.69:22-139.178.89.65:57286.service. Feb 9 09:49:12.738491 systemd-networkd[1450]: cali0a718236e95: Link UP Feb 9 09:49:12.752000 audit[4380]: NETFILTER_CFG table=filter:106 family=2 entries=40 op=nft_register_chain pid=4380 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:49:12.755596 env[1656]: time="2024-02-09T09:49:12.748388865Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:49:12.755596 env[1656]: time="2024-02-09T09:49:12.751532837Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:49:12.755596 env[1656]: time="2024-02-09T09:49:12.751576143Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:49:12.761599 kernel: audit: type=1325 audit(1707472152.752:1243): table=filter:106 family=2 entries=40 op=nft_register_chain pid=4380 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:49:12.752000 audit[4380]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20752 a0=3 a1=ffffd4684d20 a2=0 a3=ffffa8d8ffa8 items=0 ppid=3914 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:12.752000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:49:12.781786 env[1656]: time="2024-02-09T09:49:12.780975648Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0 pid=4373 runtime=io.containerd.runc.v2 Feb 9 09:49:12.791000 kernel: audit: type=1300 audit(1707472152.752:1243): arch=c00000b7 syscall=211 success=yes exit=20752 a0=3 a1=ffffd4684d20 a2=0 a3=ffffa8d8ffa8 items=0 ppid=3914 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:12.791121 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0a718236e95: link becomes ready Feb 9 09:49:12.791205 kernel: audit: type=1327 audit(1707472152.752:1243): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:49:12.795857 systemd-networkd[1450]: cali0a718236e95: Gained carrier Feb 9 09:49:12.796223 systemd-networkd[1450]: calib4c70e57bd7: Gained IPv6LL Feb 9 09:49:12.884218 systemd[1]: Started cri-containerd-85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0.scope. Feb 9 09:49:12.894620 systemd[1]: run-containerd-runc-k8s.io-85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0-runc.DLmEvH.mount: Deactivated successfully. Feb 9 09:49:12.905673 env[1656]: 2024-02-09 09:49:12.376 [INFO][4324] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--69-k8s-calico--kube--controllers--796677d4b5--w5f4z-eth0 calico-kube-controllers-796677d4b5- calico-system 73c5decd-7bdc-496a-b0be-8e5a5bc10197 752 0 2024-02-09 09:48:43 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:796677d4b5 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-21-69 calico-kube-controllers-796677d4b5-w5f4z eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali0a718236e95 [] []}} ContainerID="8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1" Namespace="calico-system" Pod="calico-kube-controllers-796677d4b5-w5f4z" WorkloadEndpoint="ip--172--31--21--69-k8s-calico--kube--controllers--796677d4b5--w5f4z-" Feb 9 09:49:12.905673 env[1656]: 2024-02-09 09:49:12.377 [INFO][4324] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1" Namespace="calico-system" Pod="calico-kube-controllers-796677d4b5-w5f4z" WorkloadEndpoint="ip--172--31--21--69-k8s-calico--kube--controllers--796677d4b5--w5f4z-eth0" Feb 9 09:49:12.905673 env[1656]: 2024-02-09 09:49:12.531 [INFO][4342] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1" HandleID="k8s-pod-network.8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1" Workload="ip--172--31--21--69-k8s-calico--kube--controllers--796677d4b5--w5f4z-eth0" Feb 9 09:49:12.905673 env[1656]: 2024-02-09 09:49:12.570 [INFO][4342] ipam_plugin.go 268: Auto assigning IP ContainerID="8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1" HandleID="k8s-pod-network.8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1" Workload="ip--172--31--21--69-k8s-calico--kube--controllers--796677d4b5--w5f4z-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000118400), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-21-69", "pod":"calico-kube-controllers-796677d4b5-w5f4z", "timestamp":"2024-02-09 09:49:12.531334736 +0000 UTC"}, Hostname:"ip-172-31-21-69", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:49:12.905673 env[1656]: 2024-02-09 09:49:12.570 [INFO][4342] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:49:12.905673 env[1656]: 2024-02-09 09:49:12.570 [INFO][4342] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:49:12.905673 env[1656]: 2024-02-09 09:49:12.570 [INFO][4342] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-69' Feb 9 09:49:12.905673 env[1656]: 2024-02-09 09:49:12.591 [INFO][4342] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1" host="ip-172-31-21-69" Feb 9 09:49:12.905673 env[1656]: 2024-02-09 09:49:12.617 [INFO][4342] ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-69" Feb 9 09:49:12.905673 env[1656]: 2024-02-09 09:49:12.633 [INFO][4342] ipam.go 489: Trying affinity for 192.168.113.64/26 host="ip-172-31-21-69" Feb 9 09:49:12.905673 env[1656]: 2024-02-09 09:49:12.645 [INFO][4342] ipam.go 155: Attempting to load block cidr=192.168.113.64/26 host="ip-172-31-21-69" Feb 9 09:49:12.905673 env[1656]: 2024-02-09 09:49:12.650 [INFO][4342] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.64/26 host="ip-172-31-21-69" Feb 9 09:49:12.905673 env[1656]: 2024-02-09 09:49:12.650 [INFO][4342] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.64/26 handle="k8s-pod-network.8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1" host="ip-172-31-21-69" Feb 9 09:49:12.905673 env[1656]: 2024-02-09 09:49:12.656 [INFO][4342] ipam.go 1682: Creating new handle: k8s-pod-network.8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1 Feb 9 09:49:12.905673 env[1656]: 2024-02-09 09:49:12.669 [INFO][4342] ipam.go 1203: Writing block in order to claim IPs block=192.168.113.64/26 handle="k8s-pod-network.8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1" host="ip-172-31-21-69" Feb 9 09:49:12.905673 env[1656]: 2024-02-09 09:49:12.700 [INFO][4342] ipam.go 1216: Successfully claimed IPs: [192.168.113.68/26] block=192.168.113.64/26 handle="k8s-pod-network.8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1" host="ip-172-31-21-69" Feb 9 09:49:12.905673 env[1656]: 2024-02-09 09:49:12.700 [INFO][4342] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.68/26] handle="k8s-pod-network.8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1" host="ip-172-31-21-69" Feb 9 09:49:12.905673 env[1656]: 2024-02-09 09:49:12.700 [INFO][4342] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:49:12.905673 env[1656]: 2024-02-09 09:49:12.700 [INFO][4342] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.113.68/26] IPv6=[] ContainerID="8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1" HandleID="k8s-pod-network.8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1" Workload="ip--172--31--21--69-k8s-calico--kube--controllers--796677d4b5--w5f4z-eth0" Feb 9 09:49:12.907141 env[1656]: 2024-02-09 09:49:12.712 [INFO][4324] k8s.go 385: Populated endpoint ContainerID="8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1" Namespace="calico-system" Pod="calico-kube-controllers-796677d4b5-w5f4z" WorkloadEndpoint="ip--172--31--21--69-k8s-calico--kube--controllers--796677d4b5--w5f4z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--69-k8s-calico--kube--controllers--796677d4b5--w5f4z-eth0", GenerateName:"calico-kube-controllers-796677d4b5-", Namespace:"calico-system", SelfLink:"", UID:"73c5decd-7bdc-496a-b0be-8e5a5bc10197", ResourceVersion:"752", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 48, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"796677d4b5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-69", ContainerID:"", Pod:"calico-kube-controllers-796677d4b5-w5f4z", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.113.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0a718236e95", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:49:12.907141 env[1656]: 2024-02-09 09:49:12.719 [INFO][4324] k8s.go 386: Calico CNI using IPs: [192.168.113.68/32] ContainerID="8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1" Namespace="calico-system" Pod="calico-kube-controllers-796677d4b5-w5f4z" WorkloadEndpoint="ip--172--31--21--69-k8s-calico--kube--controllers--796677d4b5--w5f4z-eth0" Feb 9 09:49:12.907141 env[1656]: 2024-02-09 09:49:12.719 [INFO][4324] dataplane_linux.go 68: Setting the host side veth name to cali0a718236e95 ContainerID="8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1" Namespace="calico-system" Pod="calico-kube-controllers-796677d4b5-w5f4z" WorkloadEndpoint="ip--172--31--21--69-k8s-calico--kube--controllers--796677d4b5--w5f4z-eth0" Feb 9 09:49:12.907141 env[1656]: 2024-02-09 09:49:12.820 [INFO][4324] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1" Namespace="calico-system" Pod="calico-kube-controllers-796677d4b5-w5f4z" WorkloadEndpoint="ip--172--31--21--69-k8s-calico--kube--controllers--796677d4b5--w5f4z-eth0" Feb 9 09:49:12.907141 env[1656]: 2024-02-09 09:49:12.822 [INFO][4324] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1" Namespace="calico-system" Pod="calico-kube-controllers-796677d4b5-w5f4z" WorkloadEndpoint="ip--172--31--21--69-k8s-calico--kube--controllers--796677d4b5--w5f4z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--69-k8s-calico--kube--controllers--796677d4b5--w5f4z-eth0", GenerateName:"calico-kube-controllers-796677d4b5-", Namespace:"calico-system", SelfLink:"", UID:"73c5decd-7bdc-496a-b0be-8e5a5bc10197", ResourceVersion:"752", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 48, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"796677d4b5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-69", ContainerID:"8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1", Pod:"calico-kube-controllers-796677d4b5-w5f4z", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.113.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0a718236e95", MAC:"42:3d:4b:32:4b:90", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:49:12.907141 env[1656]: 2024-02-09 09:49:12.901 [INFO][4324] k8s.go 491: Wrote updated endpoint to datastore ContainerID="8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1" Namespace="calico-system" Pod="calico-kube-controllers-796677d4b5-w5f4z" WorkloadEndpoint="ip--172--31--21--69-k8s-calico--kube--controllers--796677d4b5--w5f4z-eth0" Feb 9 09:49:12.970000 audit[4370]: USER_ACCT pid=4370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:12.973528 sshd[4370]: Accepted publickey for core from 139.178.89.65 port 57286 ssh2: RSA SHA256:1++YWC0h0fEpfkRPeemtMi9ARVJF0YKl/HjB0qv5R1M Feb 9 09:49:12.977616 sshd[4370]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:49:12.988602 kernel: audit: type=1101 audit(1707472152.970:1244): pid=4370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:12.988737 kernel: audit: type=1103 audit(1707472152.970:1245): pid=4370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:12.970000 audit[4370]: CRED_ACQ pid=4370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:13.003482 systemd-logind[1641]: New session 8 of user core. Feb 9 09:49:13.004519 systemd[1]: Started session-8.scope. Feb 9 09:49:13.007200 env[1656]: time="2024-02-09T09:49:12.994624718Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:49:13.007200 env[1656]: time="2024-02-09T09:49:12.994696787Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:49:13.007200 env[1656]: time="2024-02-09T09:49:12.994721650Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:49:13.007200 env[1656]: time="2024-02-09T09:49:12.994937113Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1 pid=4420 runtime=io.containerd.runc.v2 Feb 9 09:49:13.014525 kernel: audit: type=1006 audit(1707472152.970:1246): pid=4370 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Feb 9 09:49:12.970000 audit[4370]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff50e9530 a2=3 a3=1 items=0 ppid=1 pid=4370 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:13.029742 kernel: audit: type=1300 audit(1707472152.970:1246): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff50e9530 a2=3 a3=1 items=0 ppid=1 pid=4370 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:12.970000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:49:13.049546 kernel: audit: type=1327 audit(1707472152.970:1246): proctitle=737368643A20636F7265205B707269765D Feb 9 09:49:13.051000 audit[4370]: USER_START pid=4370 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:13.066118 kernel: audit: type=1105 audit(1707472153.051:1247): pid=4370 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:13.059000 audit[4430]: CRED_ACQ pid=4430 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:13.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.071000 audit: BPF prog-id=166 op=LOAD Feb 9 09:49:13.072000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.072000 audit[4386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4373 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:13.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835663336613066353562373766616435616566323565346363643463 Feb 9 09:49:13.072000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.072000 audit[4386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4373 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:13.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835663336613066353562373766616435616566323565346363643463 Feb 9 09:49:13.072000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.072000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.072000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.072000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.072000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.072000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.072000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.072000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.072000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.072000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.072000 audit: BPF prog-id=167 op=LOAD Feb 9 09:49:13.072000 audit[4386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4373 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:13.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835663336613066353562373766616435616566323565346363643463 Feb 9 09:49:13.072000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.072000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.072000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.072000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.072000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.072000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.072000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.072000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.072000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.072000 audit: BPF prog-id=168 op=LOAD Feb 9 09:49:13.072000 audit[4386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4373 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:13.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835663336613066353562373766616435616566323565346363643463 Feb 9 09:49:13.072000 audit: BPF prog-id=168 op=UNLOAD Feb 9 09:49:13.072000 audit: BPF prog-id=167 op=UNLOAD Feb 9 09:49:13.073000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.073000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.073000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.073000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.073000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.073000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.073000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.073000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.073000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.073000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.073000 audit: BPF prog-id=169 op=LOAD Feb 9 09:49:13.073000 audit[4386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4373 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:13.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835663336613066353562373766616435616566323565346363643463 Feb 9 09:49:13.115719 systemd[1]: Started cri-containerd-8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1.scope. Feb 9 09:49:13.179862 systemd-networkd[1450]: vxlan.calico: Gained IPv6LL Feb 9 09:49:13.213762 env[1656]: time="2024-02-09T09:49:13.213703449Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-ftf4x,Uid:f139e6d4-326b-4cbe-876f-d4056c406c20,Namespace:kube-system,Attempt:1,} returns sandbox id \"85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0\"" Feb 9 09:49:13.223129 env[1656]: time="2024-02-09T09:49:13.223069791Z" level=info msg="CreateContainer within sandbox \"85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 09:49:13.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.241000 audit: BPF prog-id=170 op=LOAD Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4420 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:13.244000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833313866356432633438613730646336616632373061366232353162 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4420 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:13.244000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833313866356432633438613730646336616632373061366232353162 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit: BPF prog-id=171 op=LOAD Feb 9 09:49:13.244000 audit[4429]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4420 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:13.244000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833313866356432633438613730646336616632373061366232353162 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit: BPF prog-id=172 op=LOAD Feb 9 09:49:13.244000 audit[4429]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4420 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:13.244000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833313866356432633438613730646336616632373061366232353162 Feb 9 09:49:13.244000 audit: BPF prog-id=172 op=UNLOAD Feb 9 09:49:13.244000 audit: BPF prog-id=171 op=UNLOAD Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.244000 audit: BPF prog-id=173 op=LOAD Feb 9 09:49:13.244000 audit[4429]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4420 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:13.244000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833313866356432633438613730646336616632373061366232353162 Feb 9 09:49:13.264000 audit[4467]: NETFILTER_CFG table=filter:107 family=2 entries=38 op=nft_register_chain pid=4467 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:49:13.264000 audit[4467]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19492 a0=3 a1=ffffec1ee740 a2=0 a3=ffff8200efa8 items=0 ppid=3914 pid=4467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:13.264000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:49:13.272520 env[1656]: time="2024-02-09T09:49:13.272384244Z" level=info msg="CreateContainer within sandbox \"85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"11f02ac7e9de2c81a3b760ab79911b6259959009a23df22787f0dc11854d977b\"" Feb 9 09:49:13.274098 env[1656]: time="2024-02-09T09:49:13.274037735Z" level=info msg="StartContainer for \"11f02ac7e9de2c81a3b760ab79911b6259959009a23df22787f0dc11854d977b\"" Feb 9 09:49:13.377832 env[1656]: time="2024-02-09T09:49:13.377771447Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-796677d4b5-w5f4z,Uid:73c5decd-7bdc-496a-b0be-8e5a5bc10197,Namespace:calico-system,Attempt:1,} returns sandbox id \"8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1\"" Feb 9 09:49:13.439322 systemd[1]: Started cri-containerd-11f02ac7e9de2c81a3b760ab79911b6259959009a23df22787f0dc11854d977b.scope. Feb 9 09:49:13.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.495000 audit: BPF prog-id=174 op=LOAD Feb 9 09:49:13.499000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.499000 audit[4479]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4373 pid=4479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:13.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131663032616337653964653263383161336237363061623739393131 Feb 9 09:49:13.500000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.500000 audit[4479]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4373 pid=4479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:13.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131663032616337653964653263383161336237363061623739393131 Feb 9 09:49:13.500000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.500000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.500000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.500000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.500000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.500000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.500000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.500000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.500000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.500000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.500000 audit: BPF prog-id=175 op=LOAD Feb 9 09:49:13.500000 audit[4479]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4373 pid=4479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:13.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131663032616337653964653263383161336237363061623739393131 Feb 9 09:49:13.501000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.501000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.501000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.501000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.501000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.501000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.501000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.501000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.501000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.501000 audit: BPF prog-id=176 op=LOAD Feb 9 09:49:13.501000 audit[4479]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4373 pid=4479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:13.501000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131663032616337653964653263383161336237363061623739393131 Feb 9 09:49:13.501000 audit: BPF prog-id=176 op=UNLOAD Feb 9 09:49:13.501000 audit: BPF prog-id=175 op=UNLOAD Feb 9 09:49:13.501000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.501000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.501000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.501000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.501000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.501000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.501000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.501000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.501000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.501000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.501000 audit: BPF prog-id=177 op=LOAD Feb 9 09:49:13.501000 audit[4479]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4373 pid=4479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:13.501000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131663032616337653964653263383161336237363061623739393131 Feb 9 09:49:13.513070 sshd[4370]: pam_unix(sshd:session): session closed for user core Feb 9 09:49:13.513000 audit[4370]: USER_END pid=4370 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:13.513000 audit[4370]: CRED_DISP pid=4370 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:13.517652 systemd[1]: sshd@7-172.31.21.69:22-139.178.89.65:57286.service: Deactivated successfully. Feb 9 09:49:13.519039 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 09:49:13.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.21.69:22-139.178.89.65:57286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:13.524007 systemd-logind[1641]: Session 8 logged out. Waiting for processes to exit. Feb 9 09:49:13.526696 systemd-logind[1641]: Removed session 8. Feb 9 09:49:13.558544 env[1656]: time="2024-02-09T09:49:13.558478912Z" level=info msg="StartContainer for \"11f02ac7e9de2c81a3b760ab79911b6259959009a23df22787f0dc11854d977b\" returns successfully" Feb 9 09:49:13.731297 env[1656]: time="2024-02-09T09:49:13.731220060Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:49:13.736362 env[1656]: time="2024-02-09T09:49:13.736285435Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:49:13.740364 env[1656]: time="2024-02-09T09:49:13.740299396Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:49:13.744255 env[1656]: time="2024-02-09T09:49:13.744190542Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:49:13.746450 env[1656]: time="2024-02-09T09:49:13.745326132Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 9 09:49:13.748300 env[1656]: time="2024-02-09T09:49:13.748151297Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 09:49:13.751285 env[1656]: time="2024-02-09T09:49:13.751231284Z" level=info msg="CreateContainer within sandbox \"ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 09:49:13.802842 env[1656]: time="2024-02-09T09:49:13.802775784Z" level=info msg="CreateContainer within sandbox \"ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"707d71569384512732bfa04a417d785e00b12d69aa74622dc56ff691f9796051\"" Feb 9 09:49:13.803906 env[1656]: time="2024-02-09T09:49:13.803847861Z" level=info msg="StartContainer for \"707d71569384512732bfa04a417d785e00b12d69aa74622dc56ff691f9796051\"" Feb 9 09:49:13.868008 systemd[1]: Started cri-containerd-707d71569384512732bfa04a417d785e00b12d69aa74622dc56ff691f9796051.scope. Feb 9 09:49:13.924000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.924000 audit[4525]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4214 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:13.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730376437313536393338343531323733326266613034613431376437 Feb 9 09:49:13.924000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.924000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.924000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.924000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.924000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.924000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.924000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.924000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.924000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.924000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.924000 audit: BPF prog-id=178 op=LOAD Feb 9 09:49:13.924000 audit[4525]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4214 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:13.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730376437313536393338343531323733326266613034613431376437 Feb 9 09:49:13.924000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.924000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.924000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.924000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.924000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.924000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.924000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.924000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.924000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.924000 audit: BPF prog-id=179 op=LOAD Feb 9 09:49:13.924000 audit[4525]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4214 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:13.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730376437313536393338343531323733326266613034613431376437 Feb 9 09:49:13.924000 audit: BPF prog-id=179 op=UNLOAD Feb 9 09:49:13.925000 audit: BPF prog-id=178 op=UNLOAD Feb 9 09:49:13.925000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.925000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.925000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.925000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.925000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.925000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.925000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.925000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.925000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.925000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:13.925000 audit: BPF prog-id=180 op=LOAD Feb 9 09:49:13.925000 audit[4525]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4214 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:13.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730376437313536393338343531323733326266613034613431376437 Feb 9 09:49:13.968567 env[1656]: time="2024-02-09T09:49:13.968485441Z" level=info msg="StartContainer for \"707d71569384512732bfa04a417d785e00b12d69aa74622dc56ff691f9796051\" returns successfully" Feb 9 09:49:14.011709 systemd-networkd[1450]: cali45a22dbcf75: Gained IPv6LL Feb 9 09:49:14.139624 systemd-networkd[1450]: cali0a718236e95: Gained IPv6LL Feb 9 09:49:14.189068 kubelet[2771]: I0209 09:49:14.189008 2771 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-ftf4x" podStartSLOduration=39.188925416000004 podCreationTimestamp="2024-02-09 09:48:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:49:14.188177602 +0000 UTC m=+52.640797174" watchObservedRunningTime="2024-02-09 09:49:14.188925416 +0000 UTC m=+52.641545000" Feb 9 09:49:14.248000 audit[4552]: NETFILTER_CFG table=filter:108 family=2 entries=8 op=nft_register_rule pid=4552 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:49:14.248000 audit[4552]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffee20b680 a2=0 a3=ffff9c51a6c0 items=0 ppid=2944 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:14.248000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:49:14.252000 audit[4552]: NETFILTER_CFG table=nat:109 family=2 entries=44 op=nft_register_rule pid=4552 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:49:14.252000 audit[4552]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13788 a0=3 a1=ffffee20b680 a2=0 a3=ffff9c51a6c0 items=0 ppid=2944 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:14.252000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:49:14.283000 audit[4554]: NETFILTER_CFG table=filter:110 family=2 entries=8 op=nft_register_rule pid=4554 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:49:14.283000 audit[4554]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffc37cea20 a2=0 a3=ffff918db6c0 items=0 ppid=2944 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:14.283000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:49:14.301000 audit[4554]: NETFILTER_CFG table=nat:111 family=2 entries=56 op=nft_register_chain pid=4554 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:49:14.301000 audit[4554]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19452 a0=3 a1=ffffc37cea20 a2=0 a3=ffff918db6c0 items=0 ppid=2944 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:14.301000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:49:16.472840 env[1656]: time="2024-02-09T09:49:16.472781123Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:49:16.476293 env[1656]: time="2024-02-09T09:49:16.476220332Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:49:16.478658 env[1656]: time="2024-02-09T09:49:16.478604939Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:49:16.481572 env[1656]: time="2024-02-09T09:49:16.481365148Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:49:16.483704 env[1656]: time="2024-02-09T09:49:16.482511367Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8\"" Feb 9 09:49:16.485648 env[1656]: time="2024-02-09T09:49:16.484933485Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 09:49:16.515742 env[1656]: time="2024-02-09T09:49:16.515663795Z" level=info msg="CreateContainer within sandbox \"8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 09:49:16.548070 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1548082559.mount: Deactivated successfully. Feb 9 09:49:16.557683 env[1656]: time="2024-02-09T09:49:16.557600222Z" level=info msg="CreateContainer within sandbox \"8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"958833373cc194d47e376727dbf496eb4b4e6e8ef89eb6069b31f86f09d38997\"" Feb 9 09:49:16.558963 env[1656]: time="2024-02-09T09:49:16.558914808Z" level=info msg="StartContainer for \"958833373cc194d47e376727dbf496eb4b4e6e8ef89eb6069b31f86f09d38997\"" Feb 9 09:49:16.609375 systemd[1]: Started cri-containerd-958833373cc194d47e376727dbf496eb4b4e6e8ef89eb6069b31f86f09d38997.scope. Feb 9 09:49:16.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.663000 audit: BPF prog-id=181 op=LOAD Feb 9 09:49:16.664000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.664000 audit[4571]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4420 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:16.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935383833333337336363313934643437653337363732376462663439 Feb 9 09:49:16.664000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.664000 audit[4571]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4420 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:16.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935383833333337336363313934643437653337363732376462663439 Feb 9 09:49:16.664000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.664000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.664000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.664000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.664000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.664000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.664000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.664000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.664000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.664000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.664000 audit: BPF prog-id=182 op=LOAD Feb 9 09:49:16.664000 audit[4571]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4420 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:16.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935383833333337336363313934643437653337363732376462663439 Feb 9 09:49:16.665000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.665000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.665000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.665000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.665000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.665000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.665000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.665000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.665000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.665000 audit: BPF prog-id=183 op=LOAD Feb 9 09:49:16.665000 audit[4571]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4420 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:16.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935383833333337336363313934643437653337363732376462663439 Feb 9 09:49:16.665000 audit: BPF prog-id=183 op=UNLOAD Feb 9 09:49:16.665000 audit: BPF prog-id=182 op=UNLOAD Feb 9 09:49:16.665000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.665000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.665000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.665000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.665000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.665000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.665000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.665000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.665000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.665000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:16.665000 audit: BPF prog-id=184 op=LOAD Feb 9 09:49:16.665000 audit[4571]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4420 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:16.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935383833333337336363313934643437653337363732376462663439 Feb 9 09:49:16.725007 env[1656]: time="2024-02-09T09:49:16.724777350Z" level=info msg="StartContainer for \"958833373cc194d47e376727dbf496eb4b4e6e8ef89eb6069b31f86f09d38997\" returns successfully" Feb 9 09:49:17.246430 kubelet[2771]: I0209 09:49:17.246320 2771 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-796677d4b5-w5f4z" podStartSLOduration=31.143631188 podCreationTimestamp="2024-02-09 09:48:43 +0000 UTC" firstStartedPulling="2024-02-09 09:49:13.381588147 +0000 UTC m=+51.834207719" lastFinishedPulling="2024-02-09 09:49:16.484217261 +0000 UTC m=+54.936836833" observedRunningTime="2024-02-09 09:49:17.240527658 +0000 UTC m=+55.693147326" watchObservedRunningTime="2024-02-09 09:49:17.246260302 +0000 UTC m=+55.698879910" Feb 9 09:49:17.596000 audit[2556]: AVC avc: denied { watch } for pid=2556 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:49:17.596000 audit[2556]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4007e38bd0 a2=fc6 a3=0 items=0 ppid=2373 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 key=(null) Feb 9 09:49:17.596000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3639002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:49:17.597000 audit[2556]: AVC avc: denied { watch } for pid=2556 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:49:17.597000 audit[2556]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4008aac900 a2=fc6 a3=0 items=0 ppid=2373 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 key=(null) Feb 9 09:49:17.597000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3639002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:49:17.610000 audit[2556]: AVC avc: denied { watch } for pid=2556 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:49:17.610000 audit[2556]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4008459fb0 a2=fc6 a3=0 items=0 ppid=2373 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 key=(null) Feb 9 09:49:17.610000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3639002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:49:17.960000 audit[2556]: AVC avc: denied { watch } for pid=2556 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:49:17.962977 kernel: kauditd_printk_skb: 299 callbacks suppressed Feb 9 09:49:17.963116 kernel: audit: type=1400 audit(1707472157.960:1338): avc: denied { watch } for pid=2556 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:49:17.960000 audit[2556]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4009030300 a2=fc6 a3=0 items=0 ppid=2373 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 key=(null) Feb 9 09:49:17.992082 kernel: audit: type=1300 audit(1707472157.960:1338): arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4009030300 a2=fc6 a3=0 items=0 ppid=2373 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 key=(null) Feb 9 09:49:17.960000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3639002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:49:18.028899 kernel: audit: type=1327 audit(1707472157.960:1338): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3639002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:49:18.012000 audit[2556]: AVC avc: denied { watch } for pid=2556 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:49:18.044895 kernel: audit: type=1400 audit(1707472158.012:1339): avc: denied { watch } for pid=2556 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:49:18.045074 kernel: audit: type=1300 audit(1707472158.012:1339): arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4008e73500 a2=fc6 a3=0 items=0 ppid=2373 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 key=(null) Feb 9 09:49:18.012000 audit[2556]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4008e73500 a2=fc6 a3=0 items=0 ppid=2373 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 key=(null) Feb 9 09:49:18.012000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3639002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:49:18.067501 kernel: audit: type=1327 audit(1707472158.012:1339): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3639002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:49:18.067635 kernel: audit: type=1400 audit(1707472158.012:1340): avc: denied { watch } for pid=2556 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:49:18.012000 audit[2556]: AVC avc: denied { watch } for pid=2556 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:49:18.012000 audit[2556]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4008fa77a0 a2=fc6 a3=0 items=0 ppid=2373 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 key=(null) Feb 9 09:49:18.089703 kernel: audit: type=1300 audit(1707472158.012:1340): arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4008fa77a0 a2=fc6 a3=0 items=0 ppid=2373 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 key=(null) Feb 9 09:49:18.012000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3639002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:49:18.100670 kernel: audit: type=1327 audit(1707472158.012:1340): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3639002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:49:18.419327 env[1656]: time="2024-02-09T09:49:18.419265295Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:49:18.423122 env[1656]: time="2024-02-09T09:49:18.423028464Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:49:18.425908 env[1656]: time="2024-02-09T09:49:18.425852260Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:49:18.429379 env[1656]: time="2024-02-09T09:49:18.429283458Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:49:18.430092 env[1656]: time="2024-02-09T09:49:18.430030032Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 9 09:49:18.434358 env[1656]: time="2024-02-09T09:49:18.434303297Z" level=info msg="CreateContainer within sandbox \"ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 09:49:18.460570 env[1656]: time="2024-02-09T09:49:18.460469543Z" level=info msg="CreateContainer within sandbox \"ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"aeb5935d2ccf685ad0d735f250199c3408515873df526548bc236d06be270a24\"" Feb 9 09:49:18.461959 env[1656]: time="2024-02-09T09:49:18.461909412Z" level=info msg="StartContainer for \"aeb5935d2ccf685ad0d735f250199c3408515873df526548bc236d06be270a24\"" Feb 9 09:49:18.511980 systemd[1]: Started cri-containerd-aeb5935d2ccf685ad0d735f250199c3408515873df526548bc236d06be270a24.scope. Feb 9 09:49:18.538441 systemd[1]: run-containerd-runc-k8s.io-aeb5935d2ccf685ad0d735f250199c3408515873df526548bc236d06be270a24-runc.1eoT4S.mount: Deactivated successfully. Feb 9 09:49:18.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.21.69:22-139.178.89.65:55724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:18.552846 systemd[1]: Started sshd@8-172.31.21.69:22-139.178.89.65:55724.service. Feb 9 09:49:18.567454 kernel: audit: type=1130 audit(1707472158.552:1341): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.21.69:22-139.178.89.65:55724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:18.599000 audit[2566]: AVC avc: denied { watch } for pid=2566 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:49:18.599000 audit[2566]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000bbeca0 a2=fc6 a3=0 items=0 ppid=2375 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 key=(null) Feb 9 09:49:18.599000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:49:18.601000 audit[2566]: AVC avc: denied { watch } for pid=2566 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:49:18.601000 audit[2566]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001409170 a2=fc6 a3=0 items=0 ppid=2375 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 key=(null) Feb 9 09:49:18.601000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit[4624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4214 pid=4624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:18.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165623539333564326363663638356164306437333566323530313939 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit: BPF prog-id=185 op=LOAD Feb 9 09:49:18.646000 audit[4624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4214 pid=4624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:18.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165623539333564326363663638356164306437333566323530313939 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit: BPF prog-id=186 op=LOAD Feb 9 09:49:18.646000 audit[4624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4214 pid=4624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:18.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165623539333564326363663638356164306437333566323530313939 Feb 9 09:49:18.646000 audit: BPF prog-id=186 op=UNLOAD Feb 9 09:49:18.646000 audit: BPF prog-id=185 op=UNLOAD Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { perfmon } for pid=4624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit[4624]: AVC avc: denied { bpf } for pid=4624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:18.646000 audit: BPF prog-id=187 op=LOAD Feb 9 09:49:18.646000 audit[4624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4214 pid=4624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:18.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165623539333564326363663638356164306437333566323530313939 Feb 9 09:49:18.707307 env[1656]: time="2024-02-09T09:49:18.707130890Z" level=info msg="StartContainer for \"aeb5935d2ccf685ad0d735f250199c3408515873df526548bc236d06be270a24\" returns successfully" Feb 9 09:49:18.746000 audit[4635]: USER_ACCT pid=4635 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:18.747781 sshd[4635]: Accepted publickey for core from 139.178.89.65 port 55724 ssh2: RSA SHA256:1++YWC0h0fEpfkRPeemtMi9ARVJF0YKl/HjB0qv5R1M Feb 9 09:49:18.751000 audit[4635]: CRED_ACQ pid=4635 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:18.751000 audit[4635]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcf6900e0 a2=3 a3=1 items=0 ppid=1 pid=4635 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:18.751000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:49:18.753068 sshd[4635]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:49:18.764616 systemd-logind[1641]: New session 9 of user core. Feb 9 09:49:18.765128 systemd[1]: Started session-9.scope. Feb 9 09:49:18.788000 audit[4635]: USER_START pid=4635 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:18.791000 audit[4657]: CRED_ACQ pid=4657 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:19.077451 kubelet[2771]: I0209 09:49:19.077381 2771 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 09:49:19.078359 kubelet[2771]: I0209 09:49:19.077472 2771 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 09:49:19.121809 sshd[4635]: pam_unix(sshd:session): session closed for user core Feb 9 09:49:19.123000 audit[4635]: USER_END pid=4635 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:19.123000 audit[4635]: CRED_DISP pid=4635 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:19.126712 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 09:49:19.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.21.69:22-139.178.89.65:55724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:19.128146 systemd-logind[1641]: Session 9 logged out. Waiting for processes to exit. Feb 9 09:49:19.128516 systemd[1]: sshd@8-172.31.21.69:22-139.178.89.65:55724.service: Deactivated successfully. Feb 9 09:49:19.142894 systemd-logind[1641]: Removed session 9. Feb 9 09:49:19.232880 kubelet[2771]: I0209 09:49:19.232825 2771 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-xc4l2" podStartSLOduration=29.349743568 podCreationTimestamp="2024-02-09 09:48:43 +0000 UTC" firstStartedPulling="2024-02-09 09:49:11.547518106 +0000 UTC m=+50.000137666" lastFinishedPulling="2024-02-09 09:49:18.430511052 +0000 UTC m=+56.883130624" observedRunningTime="2024-02-09 09:49:19.231733264 +0000 UTC m=+57.684352872" watchObservedRunningTime="2024-02-09 09:49:19.232736526 +0000 UTC m=+57.685356110" Feb 9 09:49:21.322977 systemd[1]: run-containerd-runc-k8s.io-29bcb56f9fe40f630c6a7885dd2e5c6a43a1599e4078245010da7dac79ce52d1-runc.TWI0eg.mount: Deactivated successfully. Feb 9 09:49:21.835586 env[1656]: time="2024-02-09T09:49:21.835528882Z" level=info msg="StopPodSandbox for \"f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4\"" Feb 9 09:49:21.975349 env[1656]: 2024-02-09 09:49:21.911 [WARNING][4707] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--69-k8s-calico--kube--controllers--796677d4b5--w5f4z-eth0", GenerateName:"calico-kube-controllers-796677d4b5-", Namespace:"calico-system", SelfLink:"", UID:"73c5decd-7bdc-496a-b0be-8e5a5bc10197", ResourceVersion:"830", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 48, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"796677d4b5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-69", ContainerID:"8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1", Pod:"calico-kube-controllers-796677d4b5-w5f4z", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.113.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0a718236e95", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:49:21.975349 env[1656]: 2024-02-09 09:49:21.912 [INFO][4707] k8s.go 578: Cleaning up netns ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" Feb 9 09:49:21.975349 env[1656]: 2024-02-09 09:49:21.912 [INFO][4707] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" iface="eth0" netns="" Feb 9 09:49:21.975349 env[1656]: 2024-02-09 09:49:21.912 [INFO][4707] k8s.go 585: Releasing IP address(es) ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" Feb 9 09:49:21.975349 env[1656]: 2024-02-09 09:49:21.912 [INFO][4707] utils.go 188: Calico CNI releasing IP address ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" Feb 9 09:49:21.975349 env[1656]: 2024-02-09 09:49:21.953 [INFO][4715] ipam_plugin.go 415: Releasing address using handleID ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" HandleID="k8s-pod-network.f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" Workload="ip--172--31--21--69-k8s-calico--kube--controllers--796677d4b5--w5f4z-eth0" Feb 9 09:49:21.975349 env[1656]: 2024-02-09 09:49:21.954 [INFO][4715] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:49:21.975349 env[1656]: 2024-02-09 09:49:21.954 [INFO][4715] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:49:21.975349 env[1656]: 2024-02-09 09:49:21.968 [WARNING][4715] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" HandleID="k8s-pod-network.f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" Workload="ip--172--31--21--69-k8s-calico--kube--controllers--796677d4b5--w5f4z-eth0" Feb 9 09:49:21.975349 env[1656]: 2024-02-09 09:49:21.968 [INFO][4715] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" HandleID="k8s-pod-network.f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" Workload="ip--172--31--21--69-k8s-calico--kube--controllers--796677d4b5--w5f4z-eth0" Feb 9 09:49:21.975349 env[1656]: 2024-02-09 09:49:21.971 [INFO][4715] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:49:21.975349 env[1656]: 2024-02-09 09:49:21.973 [INFO][4707] k8s.go 591: Teardown processing complete. ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" Feb 9 09:49:21.975349 env[1656]: time="2024-02-09T09:49:21.975300651Z" level=info msg="TearDown network for sandbox \"f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4\" successfully" Feb 9 09:49:21.975349 env[1656]: time="2024-02-09T09:49:21.975346767Z" level=info msg="StopPodSandbox for \"f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4\" returns successfully" Feb 9 09:49:21.977271 env[1656]: time="2024-02-09T09:49:21.977225394Z" level=info msg="RemovePodSandbox for \"f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4\"" Feb 9 09:49:21.977565 env[1656]: time="2024-02-09T09:49:21.977491081Z" level=info msg="Forcibly stopping sandbox \"f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4\"" Feb 9 09:49:22.124749 env[1656]: 2024-02-09 09:49:22.052 [WARNING][4733] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--69-k8s-calico--kube--controllers--796677d4b5--w5f4z-eth0", GenerateName:"calico-kube-controllers-796677d4b5-", Namespace:"calico-system", SelfLink:"", UID:"73c5decd-7bdc-496a-b0be-8e5a5bc10197", ResourceVersion:"830", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 48, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"796677d4b5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-69", ContainerID:"8318f5d2c48a70dc6af270a6b251b2b47915100bbb07f03a80148dd7651d9ff1", Pod:"calico-kube-controllers-796677d4b5-w5f4z", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.113.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0a718236e95", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:49:22.124749 env[1656]: 2024-02-09 09:49:22.053 [INFO][4733] k8s.go 578: Cleaning up netns ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" Feb 9 09:49:22.124749 env[1656]: 2024-02-09 09:49:22.053 [INFO][4733] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" iface="eth0" netns="" Feb 9 09:49:22.124749 env[1656]: 2024-02-09 09:49:22.053 [INFO][4733] k8s.go 585: Releasing IP address(es) ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" Feb 9 09:49:22.124749 env[1656]: 2024-02-09 09:49:22.053 [INFO][4733] utils.go 188: Calico CNI releasing IP address ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" Feb 9 09:49:22.124749 env[1656]: 2024-02-09 09:49:22.101 [INFO][4739] ipam_plugin.go 415: Releasing address using handleID ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" HandleID="k8s-pod-network.f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" Workload="ip--172--31--21--69-k8s-calico--kube--controllers--796677d4b5--w5f4z-eth0" Feb 9 09:49:22.124749 env[1656]: 2024-02-09 09:49:22.102 [INFO][4739] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:49:22.124749 env[1656]: 2024-02-09 09:49:22.102 [INFO][4739] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:49:22.124749 env[1656]: 2024-02-09 09:49:22.116 [WARNING][4739] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" HandleID="k8s-pod-network.f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" Workload="ip--172--31--21--69-k8s-calico--kube--controllers--796677d4b5--w5f4z-eth0" Feb 9 09:49:22.124749 env[1656]: 2024-02-09 09:49:22.116 [INFO][4739] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" HandleID="k8s-pod-network.f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" Workload="ip--172--31--21--69-k8s-calico--kube--controllers--796677d4b5--w5f4z-eth0" Feb 9 09:49:22.124749 env[1656]: 2024-02-09 09:49:22.119 [INFO][4739] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:49:22.124749 env[1656]: 2024-02-09 09:49:22.121 [INFO][4733] k8s.go 591: Teardown processing complete. ContainerID="f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4" Feb 9 09:49:22.124749 env[1656]: time="2024-02-09T09:49:22.123542463Z" level=info msg="TearDown network for sandbox \"f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4\" successfully" Feb 9 09:49:22.137123 env[1656]: time="2024-02-09T09:49:22.137021820Z" level=info msg="RemovePodSandbox \"f440f3534abfa95ed74a0b3d00d6ae3ee63acd4cdf09ed2e3685d93a0e968ac4\" returns successfully" Feb 9 09:49:22.138577 env[1656]: time="2024-02-09T09:49:22.138532680Z" level=info msg="StopPodSandbox for \"d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b\"" Feb 9 09:49:22.267064 env[1656]: 2024-02-09 09:49:22.205 [WARNING][4757] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--69-k8s-csi--node--driver--xc4l2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b3342c12-c4d9-47f8-827a-753e9a9e2b4c", ResourceVersion:"851", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 48, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-69", ContainerID:"ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786", Pod:"csi-node-driver-xc4l2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calib4c70e57bd7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:49:22.267064 env[1656]: 2024-02-09 09:49:22.205 [INFO][4757] k8s.go 578: Cleaning up netns ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" Feb 9 09:49:22.267064 env[1656]: 2024-02-09 09:49:22.205 [INFO][4757] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" iface="eth0" netns="" Feb 9 09:49:22.267064 env[1656]: 2024-02-09 09:49:22.206 [INFO][4757] k8s.go 585: Releasing IP address(es) ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" Feb 9 09:49:22.267064 env[1656]: 2024-02-09 09:49:22.206 [INFO][4757] utils.go 188: Calico CNI releasing IP address ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" Feb 9 09:49:22.267064 env[1656]: 2024-02-09 09:49:22.246 [INFO][4763] ipam_plugin.go 415: Releasing address using handleID ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" HandleID="k8s-pod-network.d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" Workload="ip--172--31--21--69-k8s-csi--node--driver--xc4l2-eth0" Feb 9 09:49:22.267064 env[1656]: 2024-02-09 09:49:22.246 [INFO][4763] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:49:22.267064 env[1656]: 2024-02-09 09:49:22.246 [INFO][4763] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:49:22.267064 env[1656]: 2024-02-09 09:49:22.260 [WARNING][4763] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" HandleID="k8s-pod-network.d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" Workload="ip--172--31--21--69-k8s-csi--node--driver--xc4l2-eth0" Feb 9 09:49:22.267064 env[1656]: 2024-02-09 09:49:22.260 [INFO][4763] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" HandleID="k8s-pod-network.d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" Workload="ip--172--31--21--69-k8s-csi--node--driver--xc4l2-eth0" Feb 9 09:49:22.267064 env[1656]: 2024-02-09 09:49:22.262 [INFO][4763] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:49:22.267064 env[1656]: 2024-02-09 09:49:22.264 [INFO][4757] k8s.go 591: Teardown processing complete. ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" Feb 9 09:49:22.268155 env[1656]: time="2024-02-09T09:49:22.268106180Z" level=info msg="TearDown network for sandbox \"d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b\" successfully" Feb 9 09:49:22.268292 env[1656]: time="2024-02-09T09:49:22.268255433Z" level=info msg="StopPodSandbox for \"d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b\" returns successfully" Feb 9 09:49:22.270715 env[1656]: time="2024-02-09T09:49:22.270660964Z" level=info msg="RemovePodSandbox for \"d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b\"" Feb 9 09:49:22.271086 env[1656]: time="2024-02-09T09:49:22.271007687Z" level=info msg="Forcibly stopping sandbox \"d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b\"" Feb 9 09:49:22.450258 env[1656]: 2024-02-09 09:49:22.369 [WARNING][4782] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--69-k8s-csi--node--driver--xc4l2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b3342c12-c4d9-47f8-827a-753e9a9e2b4c", ResourceVersion:"851", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 48, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-69", ContainerID:"ab7332a61d3eb3c1ce58845ecf6d5353760bb75e86e5e50b7a240e0b5bea8786", Pod:"csi-node-driver-xc4l2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calib4c70e57bd7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:49:22.450258 env[1656]: 2024-02-09 09:49:22.369 [INFO][4782] k8s.go 578: Cleaning up netns ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" Feb 9 09:49:22.450258 env[1656]: 2024-02-09 09:49:22.369 [INFO][4782] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" iface="eth0" netns="" Feb 9 09:49:22.450258 env[1656]: 2024-02-09 09:49:22.369 [INFO][4782] k8s.go 585: Releasing IP address(es) ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" Feb 9 09:49:22.450258 env[1656]: 2024-02-09 09:49:22.369 [INFO][4782] utils.go 188: Calico CNI releasing IP address ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" Feb 9 09:49:22.450258 env[1656]: 2024-02-09 09:49:22.425 [INFO][4790] ipam_plugin.go 415: Releasing address using handleID ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" HandleID="k8s-pod-network.d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" Workload="ip--172--31--21--69-k8s-csi--node--driver--xc4l2-eth0" Feb 9 09:49:22.450258 env[1656]: 2024-02-09 09:49:22.426 [INFO][4790] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:49:22.450258 env[1656]: 2024-02-09 09:49:22.426 [INFO][4790] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:49:22.450258 env[1656]: 2024-02-09 09:49:22.440 [WARNING][4790] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" HandleID="k8s-pod-network.d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" Workload="ip--172--31--21--69-k8s-csi--node--driver--xc4l2-eth0" Feb 9 09:49:22.450258 env[1656]: 2024-02-09 09:49:22.440 [INFO][4790] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" HandleID="k8s-pod-network.d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" Workload="ip--172--31--21--69-k8s-csi--node--driver--xc4l2-eth0" Feb 9 09:49:22.450258 env[1656]: 2024-02-09 09:49:22.443 [INFO][4790] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:49:22.450258 env[1656]: 2024-02-09 09:49:22.445 [INFO][4782] k8s.go 591: Teardown processing complete. ContainerID="d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b" Feb 9 09:49:22.451405 env[1656]: time="2024-02-09T09:49:22.450556264Z" level=info msg="TearDown network for sandbox \"d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b\" successfully" Feb 9 09:49:22.456623 env[1656]: time="2024-02-09T09:49:22.456492909Z" level=info msg="RemovePodSandbox \"d480c684c7ea717dd0159f0b26915a3c2b9134c28d9d2f5f0f08e3d12ed3032b\" returns successfully" Feb 9 09:49:22.457639 env[1656]: time="2024-02-09T09:49:22.457564732Z" level=info msg="StopPodSandbox for \"457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67\"" Feb 9 09:49:22.580081 env[1656]: 2024-02-09 09:49:22.522 [WARNING][4809] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--69-k8s-coredns--5d78c9869d--wnfbr-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"d3953bad-31a4-4e9c-9952-dd7f7abf0df6", ResourceVersion:"738", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 48, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-69", ContainerID:"3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541", Pod:"coredns-5d78c9869d-wnfbr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibc9d2b1abe2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:49:22.580081 env[1656]: 2024-02-09 09:49:22.523 [INFO][4809] k8s.go 578: Cleaning up netns ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" Feb 9 09:49:22.580081 env[1656]: 2024-02-09 09:49:22.523 [INFO][4809] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" iface="eth0" netns="" Feb 9 09:49:22.580081 env[1656]: 2024-02-09 09:49:22.523 [INFO][4809] k8s.go 585: Releasing IP address(es) ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" Feb 9 09:49:22.580081 env[1656]: 2024-02-09 09:49:22.523 [INFO][4809] utils.go 188: Calico CNI releasing IP address ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" Feb 9 09:49:22.580081 env[1656]: 2024-02-09 09:49:22.558 [INFO][4815] ipam_plugin.go 415: Releasing address using handleID ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" HandleID="k8s-pod-network.457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" Workload="ip--172--31--21--69-k8s-coredns--5d78c9869d--wnfbr-eth0" Feb 9 09:49:22.580081 env[1656]: 2024-02-09 09:49:22.558 [INFO][4815] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:49:22.580081 env[1656]: 2024-02-09 09:49:22.558 [INFO][4815] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:49:22.580081 env[1656]: 2024-02-09 09:49:22.572 [WARNING][4815] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" HandleID="k8s-pod-network.457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" Workload="ip--172--31--21--69-k8s-coredns--5d78c9869d--wnfbr-eth0" Feb 9 09:49:22.580081 env[1656]: 2024-02-09 09:49:22.573 [INFO][4815] ipam_plugin.go 443: Releasing address using workloadID ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" HandleID="k8s-pod-network.457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" Workload="ip--172--31--21--69-k8s-coredns--5d78c9869d--wnfbr-eth0" Feb 9 09:49:22.580081 env[1656]: 2024-02-09 09:49:22.575 [INFO][4815] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:49:22.580081 env[1656]: 2024-02-09 09:49:22.577 [INFO][4809] k8s.go 591: Teardown processing complete. ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" Feb 9 09:49:22.581066 env[1656]: time="2024-02-09T09:49:22.580133040Z" level=info msg="TearDown network for sandbox \"457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67\" successfully" Feb 9 09:49:22.581066 env[1656]: time="2024-02-09T09:49:22.580177943Z" level=info msg="StopPodSandbox for \"457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67\" returns successfully" Feb 9 09:49:22.581066 env[1656]: time="2024-02-09T09:49:22.581006734Z" level=info msg="RemovePodSandbox for \"457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67\"" Feb 9 09:49:22.581236 env[1656]: time="2024-02-09T09:49:22.581081793Z" level=info msg="Forcibly stopping sandbox \"457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67\"" Feb 9 09:49:22.707344 env[1656]: 2024-02-09 09:49:22.646 [WARNING][4833] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--69-k8s-coredns--5d78c9869d--wnfbr-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"d3953bad-31a4-4e9c-9952-dd7f7abf0df6", ResourceVersion:"738", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 48, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-69", ContainerID:"3ee48ec2334bc80cc73af7561ccb342bfaf7453e980e003341b0f6124a7df541", Pod:"coredns-5d78c9869d-wnfbr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibc9d2b1abe2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:49:22.707344 env[1656]: 2024-02-09 09:49:22.646 [INFO][4833] k8s.go 578: Cleaning up netns ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" Feb 9 09:49:22.707344 env[1656]: 2024-02-09 09:49:22.646 [INFO][4833] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" iface="eth0" netns="" Feb 9 09:49:22.707344 env[1656]: 2024-02-09 09:49:22.646 [INFO][4833] k8s.go 585: Releasing IP address(es) ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" Feb 9 09:49:22.707344 env[1656]: 2024-02-09 09:49:22.646 [INFO][4833] utils.go 188: Calico CNI releasing IP address ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" Feb 9 09:49:22.707344 env[1656]: 2024-02-09 09:49:22.682 [INFO][4840] ipam_plugin.go 415: Releasing address using handleID ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" HandleID="k8s-pod-network.457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" Workload="ip--172--31--21--69-k8s-coredns--5d78c9869d--wnfbr-eth0" Feb 9 09:49:22.707344 env[1656]: 2024-02-09 09:49:22.682 [INFO][4840] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:49:22.707344 env[1656]: 2024-02-09 09:49:22.683 [INFO][4840] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:49:22.707344 env[1656]: 2024-02-09 09:49:22.698 [WARNING][4840] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" HandleID="k8s-pod-network.457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" Workload="ip--172--31--21--69-k8s-coredns--5d78c9869d--wnfbr-eth0" Feb 9 09:49:22.707344 env[1656]: 2024-02-09 09:49:22.698 [INFO][4840] ipam_plugin.go 443: Releasing address using workloadID ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" HandleID="k8s-pod-network.457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" Workload="ip--172--31--21--69-k8s-coredns--5d78c9869d--wnfbr-eth0" Feb 9 09:49:22.707344 env[1656]: 2024-02-09 09:49:22.700 [INFO][4840] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:49:22.707344 env[1656]: 2024-02-09 09:49:22.702 [INFO][4833] k8s.go 591: Teardown processing complete. ContainerID="457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67" Feb 9 09:49:22.707344 env[1656]: time="2024-02-09T09:49:22.705231196Z" level=info msg="TearDown network for sandbox \"457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67\" successfully" Feb 9 09:49:22.711632 env[1656]: time="2024-02-09T09:49:22.711560342Z" level=info msg="RemovePodSandbox \"457287a87902ca9d25a9fb6133340f2dc4ab0bcefa00f5f0073d8f70413cda67\" returns successfully" Feb 9 09:49:22.712833 env[1656]: time="2024-02-09T09:49:22.712767032Z" level=info msg="StopPodSandbox for \"27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50\"" Feb 9 09:49:22.857148 env[1656]: 2024-02-09 09:49:22.795 [WARNING][4859] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--69-k8s-coredns--5d78c9869d--ftf4x-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"f139e6d4-326b-4cbe-876f-d4056c406c20", ResourceVersion:"804", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 48, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-69", ContainerID:"85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0", Pod:"coredns-5d78c9869d-ftf4x", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali45a22dbcf75", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:49:22.857148 env[1656]: 2024-02-09 09:49:22.795 [INFO][4859] k8s.go 578: Cleaning up netns ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" Feb 9 09:49:22.857148 env[1656]: 2024-02-09 09:49:22.795 [INFO][4859] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" iface="eth0" netns="" Feb 9 09:49:22.857148 env[1656]: 2024-02-09 09:49:22.795 [INFO][4859] k8s.go 585: Releasing IP address(es) ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" Feb 9 09:49:22.857148 env[1656]: 2024-02-09 09:49:22.795 [INFO][4859] utils.go 188: Calico CNI releasing IP address ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" Feb 9 09:49:22.857148 env[1656]: 2024-02-09 09:49:22.830 [INFO][4866] ipam_plugin.go 415: Releasing address using handleID ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" HandleID="k8s-pod-network.27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" Workload="ip--172--31--21--69-k8s-coredns--5d78c9869d--ftf4x-eth0" Feb 9 09:49:22.857148 env[1656]: 2024-02-09 09:49:22.830 [INFO][4866] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:49:22.857148 env[1656]: 2024-02-09 09:49:22.830 [INFO][4866] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:49:22.857148 env[1656]: 2024-02-09 09:49:22.848 [WARNING][4866] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" HandleID="k8s-pod-network.27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" Workload="ip--172--31--21--69-k8s-coredns--5d78c9869d--ftf4x-eth0" Feb 9 09:49:22.857148 env[1656]: 2024-02-09 09:49:22.848 [INFO][4866] ipam_plugin.go 443: Releasing address using workloadID ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" HandleID="k8s-pod-network.27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" Workload="ip--172--31--21--69-k8s-coredns--5d78c9869d--ftf4x-eth0" Feb 9 09:49:22.857148 env[1656]: 2024-02-09 09:49:22.852 [INFO][4866] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:49:22.857148 env[1656]: 2024-02-09 09:49:22.854 [INFO][4859] k8s.go 591: Teardown processing complete. ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" Feb 9 09:49:22.858553 env[1656]: time="2024-02-09T09:49:22.857194838Z" level=info msg="TearDown network for sandbox \"27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50\" successfully" Feb 9 09:49:22.858553 env[1656]: time="2024-02-09T09:49:22.857241122Z" level=info msg="StopPodSandbox for \"27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50\" returns successfully" Feb 9 09:49:22.859240 env[1656]: time="2024-02-09T09:49:22.859155032Z" level=info msg="RemovePodSandbox for \"27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50\"" Feb 9 09:49:22.859529 env[1656]: time="2024-02-09T09:49:22.859393517Z" level=info msg="Forcibly stopping sandbox \"27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50\"" Feb 9 09:49:22.981042 env[1656]: 2024-02-09 09:49:22.922 [WARNING][4884] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--69-k8s-coredns--5d78c9869d--ftf4x-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"f139e6d4-326b-4cbe-876f-d4056c406c20", ResourceVersion:"804", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 48, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-69", ContainerID:"85f36a0f55b77fad5aef25e4ccd4c4048924d417644277d8996886b7d399e8f0", Pod:"coredns-5d78c9869d-ftf4x", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.113.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali45a22dbcf75", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:49:22.981042 env[1656]: 2024-02-09 09:49:22.923 [INFO][4884] k8s.go 578: Cleaning up netns ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" Feb 9 09:49:22.981042 env[1656]: 2024-02-09 09:49:22.923 [INFO][4884] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" iface="eth0" netns="" Feb 9 09:49:22.981042 env[1656]: 2024-02-09 09:49:22.923 [INFO][4884] k8s.go 585: Releasing IP address(es) ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" Feb 9 09:49:22.981042 env[1656]: 2024-02-09 09:49:22.923 [INFO][4884] utils.go 188: Calico CNI releasing IP address ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" Feb 9 09:49:22.981042 env[1656]: 2024-02-09 09:49:22.957 [INFO][4890] ipam_plugin.go 415: Releasing address using handleID ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" HandleID="k8s-pod-network.27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" Workload="ip--172--31--21--69-k8s-coredns--5d78c9869d--ftf4x-eth0" Feb 9 09:49:22.981042 env[1656]: 2024-02-09 09:49:22.957 [INFO][4890] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:49:22.981042 env[1656]: 2024-02-09 09:49:22.957 [INFO][4890] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:49:22.981042 env[1656]: 2024-02-09 09:49:22.972 [WARNING][4890] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" HandleID="k8s-pod-network.27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" Workload="ip--172--31--21--69-k8s-coredns--5d78c9869d--ftf4x-eth0" Feb 9 09:49:22.981042 env[1656]: 2024-02-09 09:49:22.972 [INFO][4890] ipam_plugin.go 443: Releasing address using workloadID ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" HandleID="k8s-pod-network.27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" Workload="ip--172--31--21--69-k8s-coredns--5d78c9869d--ftf4x-eth0" Feb 9 09:49:22.981042 env[1656]: 2024-02-09 09:49:22.976 [INFO][4890] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:49:22.981042 env[1656]: 2024-02-09 09:49:22.977 [INFO][4884] k8s.go 591: Teardown processing complete. ContainerID="27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50" Feb 9 09:49:22.982106 env[1656]: time="2024-02-09T09:49:22.982056838Z" level=info msg="TearDown network for sandbox \"27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50\" successfully" Feb 9 09:49:22.987207 env[1656]: time="2024-02-09T09:49:22.987151888Z" level=info msg="RemovePodSandbox \"27331c35e21d05c7ef90eeb14cc720e5b9dcf399de0a6721909582479a482b50\" returns successfully" Feb 9 09:49:24.152768 systemd[1]: Started sshd@9-172.31.21.69:22-139.178.89.65:55740.service. Feb 9 09:49:24.156750 kernel: kauditd_printk_skb: 59 callbacks suppressed Feb 9 09:49:24.156856 kernel: audit: type=1130 audit(1707472164.152:1358): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.21.69:22-139.178.89.65:55740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:24.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.21.69:22-139.178.89.65:55740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:24.333000 audit[4900]: USER_ACCT pid=4900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:24.339937 sshd[4900]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:49:24.340902 sshd[4900]: Accepted publickey for core from 139.178.89.65 port 55740 ssh2: RSA SHA256:1++YWC0h0fEpfkRPeemtMi9ARVJF0YKl/HjB0qv5R1M Feb 9 09:49:24.337000 audit[4900]: CRED_ACQ pid=4900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:24.354920 kernel: audit: type=1101 audit(1707472164.333:1359): pid=4900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:24.355067 kernel: audit: type=1103 audit(1707472164.337:1360): pid=4900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:24.361826 kernel: audit: type=1006 audit(1707472164.337:1361): pid=4900 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 9 09:49:24.337000 audit[4900]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc2622c0 a2=3 a3=1 items=0 ppid=1 pid=4900 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:24.368768 systemd-logind[1641]: New session 10 of user core. Feb 9 09:49:24.369851 systemd[1]: Started session-10.scope. Feb 9 09:49:24.337000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:49:24.378077 kernel: audit: type=1300 audit(1707472164.337:1361): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc2622c0 a2=3 a3=1 items=0 ppid=1 pid=4900 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:24.378190 kernel: audit: type=1327 audit(1707472164.337:1361): proctitle=737368643A20636F7265205B707269765D Feb 9 09:49:24.381000 audit[4900]: USER_START pid=4900 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:24.393474 kernel: audit: type=1105 audit(1707472164.381:1362): pid=4900 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:24.393000 audit[4902]: CRED_ACQ pid=4902 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:24.404459 kernel: audit: type=1103 audit(1707472164.393:1363): pid=4902 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:24.640779 sshd[4900]: pam_unix(sshd:session): session closed for user core Feb 9 09:49:24.643000 audit[4900]: USER_END pid=4900 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:24.650056 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 09:49:24.651269 systemd[1]: sshd@9-172.31.21.69:22-139.178.89.65:55740.service: Deactivated successfully. Feb 9 09:49:24.647000 audit[4900]: CRED_DISP pid=4900 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:24.666386 kernel: audit: type=1106 audit(1707472164.643:1364): pid=4900 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:24.666550 kernel: audit: type=1104 audit(1707472164.647:1365): pid=4900 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:24.665804 systemd-logind[1641]: Session 10 logged out. Waiting for processes to exit. Feb 9 09:49:24.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.21.69:22-139.178.89.65:55740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:24.674232 systemd[1]: Started sshd@10-172.31.21.69:22-139.178.89.65:55750.service. Feb 9 09:49:24.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.21.69:22-139.178.89.65:55750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:24.676440 systemd-logind[1641]: Removed session 10. Feb 9 09:49:24.841000 audit[4913]: USER_ACCT pid=4913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:24.841932 sshd[4913]: Accepted publickey for core from 139.178.89.65 port 55750 ssh2: RSA SHA256:1++YWC0h0fEpfkRPeemtMi9ARVJF0YKl/HjB0qv5R1M Feb 9 09:49:24.843000 audit[4913]: CRED_ACQ pid=4913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:24.844000 audit[4913]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff4106080 a2=3 a3=1 items=0 ppid=1 pid=4913 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:24.844000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:49:24.845173 sshd[4913]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:49:24.853595 systemd-logind[1641]: New session 11 of user core. Feb 9 09:49:24.854585 systemd[1]: Started session-11.scope. Feb 9 09:49:24.866000 audit[4913]: USER_START pid=4913 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:24.869000 audit[4915]: CRED_ACQ pid=4915 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:26.779476 sshd[4913]: pam_unix(sshd:session): session closed for user core Feb 9 09:49:26.781000 audit[4913]: USER_END pid=4913 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:26.781000 audit[4913]: CRED_DISP pid=4913 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:26.785709 systemd[1]: sshd@10-172.31.21.69:22-139.178.89.65:55750.service: Deactivated successfully. Feb 9 09:49:26.787171 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 09:49:26.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.21.69:22-139.178.89.65:55750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:26.788952 systemd-logind[1641]: Session 11 logged out. Waiting for processes to exit. Feb 9 09:49:26.792086 systemd-logind[1641]: Removed session 11. Feb 9 09:49:26.806781 systemd[1]: Started sshd@11-172.31.21.69:22-139.178.89.65:55758.service. Feb 9 09:49:26.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.21.69:22-139.178.89.65:55758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:26.985042 sshd[4923]: Accepted publickey for core from 139.178.89.65 port 55758 ssh2: RSA SHA256:1++YWC0h0fEpfkRPeemtMi9ARVJF0YKl/HjB0qv5R1M Feb 9 09:49:26.984000 audit[4923]: USER_ACCT pid=4923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:26.986000 audit[4923]: CRED_ACQ pid=4923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:26.986000 audit[4923]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe43c9840 a2=3 a3=1 items=0 ppid=1 pid=4923 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:26.986000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:49:26.988285 sshd[4923]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:49:26.996293 systemd-logind[1641]: New session 12 of user core. Feb 9 09:49:26.997931 systemd[1]: Started session-12.scope. Feb 9 09:49:27.008000 audit[4923]: USER_START pid=4923 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:27.011000 audit[4925]: CRED_ACQ pid=4925 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:27.276814 sshd[4923]: pam_unix(sshd:session): session closed for user core Feb 9 09:49:27.281000 audit[4923]: USER_END pid=4923 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:27.282000 audit[4923]: CRED_DISP pid=4923 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:27.285837 systemd-logind[1641]: Session 12 logged out. Waiting for processes to exit. Feb 9 09:49:27.287029 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 09:49:27.288195 systemd[1]: sshd@11-172.31.21.69:22-139.178.89.65:55758.service: Deactivated successfully. Feb 9 09:49:27.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.21.69:22-139.178.89.65:55758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:27.291179 systemd-logind[1641]: Removed session 12. Feb 9 09:49:32.317079 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 09:49:32.317248 kernel: audit: type=1130 audit(1707472172.305:1385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.21.69:22-139.178.89.65:56482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:32.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.21.69:22-139.178.89.65:56482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:32.306044 systemd[1]: Started sshd@12-172.31.21.69:22-139.178.89.65:56482.service. Feb 9 09:49:32.476000 audit[4964]: USER_ACCT pid=4964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:32.478645 sshd[4964]: Accepted publickey for core from 139.178.89.65 port 56482 ssh2: RSA SHA256:1++YWC0h0fEpfkRPeemtMi9ARVJF0YKl/HjB0qv5R1M Feb 9 09:49:32.487481 kernel: audit: type=1101 audit(1707472172.476:1386): pid=4964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:32.487000 audit[4964]: CRED_ACQ pid=4964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:32.489459 sshd[4964]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:49:32.503826 kernel: audit: type=1103 audit(1707472172.487:1387): pid=4964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:32.504010 kernel: audit: type=1006 audit(1707472172.488:1388): pid=4964 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 9 09:49:32.488000 audit[4964]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffa187a60 a2=3 a3=1 items=0 ppid=1 pid=4964 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:32.514393 kernel: audit: type=1300 audit(1707472172.488:1388): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffa187a60 a2=3 a3=1 items=0 ppid=1 pid=4964 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:32.488000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:49:32.518433 kernel: audit: type=1327 audit(1707472172.488:1388): proctitle=737368643A20636F7265205B707269765D Feb 9 09:49:32.522516 systemd-logind[1641]: New session 13 of user core. Feb 9 09:49:32.525293 systemd[1]: Started session-13.scope. Feb 9 09:49:32.535000 audit[4964]: USER_START pid=4964 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:32.536000 audit[4970]: CRED_ACQ pid=4970 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:32.557152 kernel: audit: type=1105 audit(1707472172.535:1389): pid=4964 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:32.557219 kernel: audit: type=1103 audit(1707472172.536:1390): pid=4970 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:32.784789 sshd[4964]: pam_unix(sshd:session): session closed for user core Feb 9 09:49:32.786000 audit[4964]: USER_END pid=4964 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:32.789877 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 09:49:32.791145 systemd[1]: sshd@12-172.31.21.69:22-139.178.89.65:56482.service: Deactivated successfully. Feb 9 09:49:32.787000 audit[4964]: CRED_DISP pid=4964 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:32.798494 kernel: audit: type=1106 audit(1707472172.786:1391): pid=4964 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:32.807512 systemd-logind[1641]: Session 13 logged out. Waiting for processes to exit. Feb 9 09:49:32.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.21.69:22-139.178.89.65:56482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:32.808996 systemd-logind[1641]: Removed session 13. Feb 9 09:49:32.809924 kernel: audit: type=1104 audit(1707472172.787:1392): pid=4964 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:32.948000 audit[2566]: AVC avc: denied { watch } for pid=2566 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:49:32.948000 audit[2566]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400272a1a0 a2=fc6 a3=0 items=0 ppid=2375 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 key=(null) Feb 9 09:49:32.948000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:49:32.951000 audit[2566]: AVC avc: denied { watch } for pid=2566 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:49:32.951000 audit[2566]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400261f4e0 a2=fc6 a3=0 items=0 ppid=2375 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 key=(null) Feb 9 09:49:32.951000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:49:32.952000 audit[2566]: AVC avc: denied { watch } for pid=2566 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:49:32.952000 audit[2566]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400272a2c0 a2=fc6 a3=0 items=0 ppid=2375 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 key=(null) Feb 9 09:49:32.952000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:49:32.955000 audit[2566]: AVC avc: denied { watch } for pid=2566 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:49:32.955000 audit[2566]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400272a2e0 a2=fc6 a3=0 items=0 ppid=2375 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 key=(null) Feb 9 09:49:32.955000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:49:37.827076 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 09:49:37.827237 kernel: audit: type=1130 audit(1707472177.815:1398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.21.69:22-139.178.89.65:56494 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:37.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.21.69:22-139.178.89.65:56494 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:37.815527 systemd[1]: Started sshd@13-172.31.21.69:22-139.178.89.65:56494.service. Feb 9 09:49:37.985000 audit[4988]: USER_ACCT pid=4988 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:37.986475 sshd[4988]: Accepted publickey for core from 139.178.89.65 port 56494 ssh2: RSA SHA256:1++YWC0h0fEpfkRPeemtMi9ARVJF0YKl/HjB0qv5R1M Feb 9 09:49:37.990614 sshd[4988]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:49:37.988000 audit[4988]: CRED_ACQ pid=4988 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:38.005540 kernel: audit: type=1101 audit(1707472177.985:1399): pid=4988 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:38.005647 kernel: audit: type=1103 audit(1707472177.988:1400): pid=4988 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:38.011734 kernel: audit: type=1006 audit(1707472177.989:1401): pid=4988 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 9 09:49:37.989000 audit[4988]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc1743a80 a2=3 a3=1 items=0 ppid=1 pid=4988 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:38.021791 kernel: audit: type=1300 audit(1707472177.989:1401): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc1743a80 a2=3 a3=1 items=0 ppid=1 pid=4988 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:38.023846 kernel: audit: type=1327 audit(1707472177.989:1401): proctitle=737368643A20636F7265205B707269765D Feb 9 09:49:37.989000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:49:38.032174 systemd[1]: Started session-14.scope. Feb 9 09:49:38.033013 systemd-logind[1641]: New session 14 of user core. Feb 9 09:49:38.043000 audit[4988]: USER_START pid=4988 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:38.046000 audit[4990]: CRED_ACQ pid=4990 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:38.064020 kernel: audit: type=1105 audit(1707472178.043:1402): pid=4988 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:38.064128 kernel: audit: type=1103 audit(1707472178.046:1403): pid=4990 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:38.291769 sshd[4988]: pam_unix(sshd:session): session closed for user core Feb 9 09:49:38.293000 audit[4988]: USER_END pid=4988 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:38.297626 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 09:49:38.298808 systemd[1]: sshd@13-172.31.21.69:22-139.178.89.65:56494.service: Deactivated successfully. Feb 9 09:49:38.295000 audit[4988]: CRED_DISP pid=4988 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:38.307293 systemd-logind[1641]: Session 14 logged out. Waiting for processes to exit. Feb 9 09:49:38.309096 systemd-logind[1641]: Removed session 14. Feb 9 09:49:38.314691 kernel: audit: type=1106 audit(1707472178.293:1404): pid=4988 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:38.314824 kernel: audit: type=1104 audit(1707472178.295:1405): pid=4988 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:38.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.21.69:22-139.178.89.65:56494 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:40.433162 systemd[1]: run-containerd-runc-k8s.io-958833373cc194d47e376727dbf496eb4b4e6e8ef89eb6069b31f86f09d38997-runc.dq3pSj.mount: Deactivated successfully. Feb 9 09:49:43.335906 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 09:49:43.336070 kernel: audit: type=1130 audit(1707472183.324:1407): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.21.69:22-139.178.89.65:57876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:43.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.21.69:22-139.178.89.65:57876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:43.325009 systemd[1]: Started sshd@14-172.31.21.69:22-139.178.89.65:57876.service. Feb 9 09:49:43.496000 audit[5023]: USER_ACCT pid=5023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:43.497597 sshd[5023]: Accepted publickey for core from 139.178.89.65 port 57876 ssh2: RSA SHA256:1++YWC0h0fEpfkRPeemtMi9ARVJF0YKl/HjB0qv5R1M Feb 9 09:49:43.508597 kernel: audit: type=1101 audit(1707472183.496:1408): pid=5023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:43.509000 audit[5023]: CRED_ACQ pid=5023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:43.511435 sshd[5023]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:49:43.527478 kernel: audit: type=1103 audit(1707472183.509:1409): pid=5023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:43.527641 kernel: audit: type=1006 audit(1707472183.510:1410): pid=5023 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 9 09:49:43.510000 audit[5023]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe0742950 a2=3 a3=1 items=0 ppid=1 pid=5023 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:43.539460 kernel: audit: type=1300 audit(1707472183.510:1410): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe0742950 a2=3 a3=1 items=0 ppid=1 pid=5023 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:43.510000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:49:43.543106 kernel: audit: type=1327 audit(1707472183.510:1410): proctitle=737368643A20636F7265205B707269765D Feb 9 09:49:43.546539 systemd-logind[1641]: New session 15 of user core. Feb 9 09:49:43.549238 systemd[1]: Started session-15.scope. Feb 9 09:49:43.558000 audit[5023]: USER_START pid=5023 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:43.571521 kernel: audit: type=1105 audit(1707472183.558:1411): pid=5023 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:43.571652 kernel: audit: type=1103 audit(1707472183.570:1412): pid=5025 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:43.570000 audit[5025]: CRED_ACQ pid=5025 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:43.813450 sshd[5023]: pam_unix(sshd:session): session closed for user core Feb 9 09:49:43.815000 audit[5023]: USER_END pid=5023 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:43.818434 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 09:49:43.819804 systemd[1]: sshd@14-172.31.21.69:22-139.178.89.65:57876.service: Deactivated successfully. Feb 9 09:49:43.815000 audit[5023]: CRED_DISP pid=5023 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:43.837672 kernel: audit: type=1106 audit(1707472183.815:1413): pid=5023 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:43.837811 kernel: audit: type=1104 audit(1707472183.815:1414): pid=5023 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:43.837286 systemd-logind[1641]: Session 15 logged out. Waiting for processes to exit. Feb 9 09:49:43.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.21.69:22-139.178.89.65:57876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:43.839680 systemd-logind[1641]: Removed session 15. Feb 9 09:49:48.841466 systemd[1]: Started sshd@15-172.31.21.69:22-139.178.89.65:52446.service. Feb 9 09:49:48.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.21.69:22-139.178.89.65:52446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:48.854849 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 09:49:48.855519 kernel: audit: type=1130 audit(1707472188.851:1416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.21.69:22-139.178.89.65:52446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:49.015000 audit[5035]: USER_ACCT pid=5035 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:49.018769 sshd[5035]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:49:49.022130 sshd[5035]: Accepted publickey for core from 139.178.89.65 port 52446 ssh2: RSA SHA256:1++YWC0h0fEpfkRPeemtMi9ARVJF0YKl/HjB0qv5R1M Feb 9 09:49:49.017000 audit[5035]: CRED_ACQ pid=5035 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:49.036142 kernel: audit: type=1101 audit(1707472189.015:1417): pid=5035 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:49.036293 kernel: audit: type=1103 audit(1707472189.017:1418): pid=5035 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:49.042881 kernel: audit: type=1006 audit(1707472189.017:1419): pid=5035 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 9 09:49:49.043710 kernel: audit: type=1300 audit(1707472189.017:1419): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc68d66a0 a2=3 a3=1 items=0 ppid=1 pid=5035 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:49.017000 audit[5035]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc68d66a0 a2=3 a3=1 items=0 ppid=1 pid=5035 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:49.017000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:49:49.057259 kernel: audit: type=1327 audit(1707472189.017:1419): proctitle=737368643A20636F7265205B707269765D Feb 9 09:49:49.062786 systemd-logind[1641]: New session 16 of user core. Feb 9 09:49:49.065792 systemd[1]: Started session-16.scope. Feb 9 09:49:49.076000 audit[5035]: USER_START pid=5035 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:49.090000 audit[5037]: CRED_ACQ pid=5037 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:49.100776 kernel: audit: type=1105 audit(1707472189.076:1420): pid=5035 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:49.100905 kernel: audit: type=1103 audit(1707472189.090:1421): pid=5037 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:49.347537 sshd[5035]: pam_unix(sshd:session): session closed for user core Feb 9 09:49:49.349000 audit[5035]: USER_END pid=5035 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:49.362559 systemd[1]: sshd@15-172.31.21.69:22-139.178.89.65:52446.service: Deactivated successfully. Feb 9 09:49:49.363992 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 09:49:49.365603 systemd-logind[1641]: Session 16 logged out. Waiting for processes to exit. Feb 9 09:49:49.368532 systemd-logind[1641]: Removed session 16. Feb 9 09:49:49.380887 systemd[1]: Started sshd@16-172.31.21.69:22-139.178.89.65:52456.service. Feb 9 09:49:49.349000 audit[5035]: CRED_DISP pid=5035 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:49.395387 kernel: audit: type=1106 audit(1707472189.349:1422): pid=5035 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:49.395563 kernel: audit: type=1104 audit(1707472189.349:1423): pid=5035 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:49.362000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.21.69:22-139.178.89.65:52446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:49.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.21.69:22-139.178.89.65:52456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:49.567550 sshd[5046]: Accepted publickey for core from 139.178.89.65 port 52456 ssh2: RSA SHA256:1++YWC0h0fEpfkRPeemtMi9ARVJF0YKl/HjB0qv5R1M Feb 9 09:49:49.566000 audit[5046]: USER_ACCT pid=5046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:49.571100 sshd[5046]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:49:49.569000 audit[5046]: CRED_ACQ pid=5046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:49.569000 audit[5046]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3898d30 a2=3 a3=1 items=0 ppid=1 pid=5046 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:49.569000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:49:49.580085 systemd-logind[1641]: New session 17 of user core. Feb 9 09:49:49.582300 systemd[1]: Started session-17.scope. Feb 9 09:49:49.595000 audit[5046]: USER_START pid=5046 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:49.598000 audit[5048]: CRED_ACQ pid=5048 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:50.066199 sshd[5046]: pam_unix(sshd:session): session closed for user core Feb 9 09:49:50.068000 audit[5046]: USER_END pid=5046 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:50.069000 audit[5046]: CRED_DISP pid=5046 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:50.071742 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 09:49:50.073120 systemd[1]: sshd@16-172.31.21.69:22-139.178.89.65:52456.service: Deactivated successfully. Feb 9 09:49:50.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.21.69:22-139.178.89.65:52456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:50.075268 systemd-logind[1641]: Session 17 logged out. Waiting for processes to exit. Feb 9 09:49:50.077798 systemd-logind[1641]: Removed session 17. Feb 9 09:49:50.097169 systemd[1]: Started sshd@17-172.31.21.69:22-139.178.89.65:52466.service. Feb 9 09:49:50.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.21.69:22-139.178.89.65:52466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:50.275162 sshd[5056]: Accepted publickey for core from 139.178.89.65 port 52466 ssh2: RSA SHA256:1++YWC0h0fEpfkRPeemtMi9ARVJF0YKl/HjB0qv5R1M Feb 9 09:49:50.274000 audit[5056]: USER_ACCT pid=5056 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:50.278890 sshd[5056]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:49:50.277000 audit[5056]: CRED_ACQ pid=5056 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:50.277000 audit[5056]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd9560e90 a2=3 a3=1 items=0 ppid=1 pid=5056 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:50.277000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:49:50.289187 systemd-logind[1641]: New session 18 of user core. Feb 9 09:49:50.291151 systemd[1]: Started session-18.scope. Feb 9 09:49:50.301000 audit[5056]: USER_START pid=5056 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:50.304000 audit[5058]: CRED_ACQ pid=5058 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:51.347631 systemd[1]: run-containerd-runc-k8s.io-29bcb56f9fe40f630c6a7885dd2e5c6a43a1599e4078245010da7dac79ce52d1-runc.q6zGYw.mount: Deactivated successfully. Feb 9 09:49:52.036000 audit[5095]: NETFILTER_CFG table=filter:112 family=2 entries=20 op=nft_register_rule pid=5095 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:49:52.036000 audit[5095]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=ffffedf02930 a2=0 a3=ffff94a5e6c0 items=0 ppid=2944 pid=5095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:52.036000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:49:52.043000 audit[5095]: NETFILTER_CFG table=nat:113 family=2 entries=20 op=nft_register_rule pid=5095 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:49:52.044393 sshd[5056]: pam_unix(sshd:session): session closed for user core Feb 9 09:49:52.046000 audit[5056]: USER_END pid=5056 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:52.046000 audit[5056]: CRED_DISP pid=5056 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:52.049396 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 09:49:52.049821 systemd[1]: session-18.scope: Consumed 1.038s CPU time. Feb 9 09:49:52.051132 systemd-logind[1641]: Session 18 logged out. Waiting for processes to exit. Feb 9 09:49:52.051727 systemd[1]: sshd@17-172.31.21.69:22-139.178.89.65:52466.service: Deactivated successfully. Feb 9 09:49:52.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.21.69:22-139.178.89.65:52466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:52.043000 audit[5095]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffedf02930 a2=0 a3=ffff94a5e6c0 items=0 ppid=2944 pid=5095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:52.043000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:49:52.054457 systemd-logind[1641]: Removed session 18. Feb 9 09:49:52.089721 systemd[1]: Started sshd@18-172.31.21.69:22-139.178.89.65:52480.service. Feb 9 09:49:52.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.21.69:22-139.178.89.65:52480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:52.149000 audit[5101]: NETFILTER_CFG table=filter:114 family=2 entries=32 op=nft_register_rule pid=5101 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:49:52.149000 audit[5101]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=ffffee671740 a2=0 a3=ffffb23cf6c0 items=0 ppid=2944 pid=5101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:52.149000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:49:52.152000 audit[5101]: NETFILTER_CFG table=nat:115 family=2 entries=20 op=nft_register_rule pid=5101 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:49:52.152000 audit[5101]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffee671740 a2=0 a3=ffffb23cf6c0 items=0 ppid=2944 pid=5101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:52.152000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:49:52.279000 audit[5099]: USER_ACCT pid=5099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:52.280620 sshd[5099]: Accepted publickey for core from 139.178.89.65 port 52480 ssh2: RSA SHA256:1++YWC0h0fEpfkRPeemtMi9ARVJF0YKl/HjB0qv5R1M Feb 9 09:49:52.282000 audit[5099]: CRED_ACQ pid=5099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:52.282000 audit[5099]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcab70d90 a2=3 a3=1 items=0 ppid=1 pid=5099 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:52.282000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:49:52.283796 sshd[5099]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:49:52.293711 systemd-logind[1641]: New session 19 of user core. Feb 9 09:49:52.295697 systemd[1]: Started session-19.scope. Feb 9 09:49:52.307000 audit[5099]: USER_START pid=5099 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:52.311000 audit[5102]: CRED_ACQ pid=5102 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:53.187006 kubelet[2771]: I0209 09:49:53.186945 2771 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:49:53.199691 systemd[1]: Created slice kubepods-besteffort-podf4496dcf_c303_4b61_b40d_9cd5c6a4f141.slice. Feb 9 09:49:53.309930 kubelet[2771]: I0209 09:49:53.309860 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/f4496dcf-c303-4b61-b40d-9cd5c6a4f141-calico-apiserver-certs\") pod \"calico-apiserver-66cf7848b7-dszdj\" (UID: \"f4496dcf-c303-4b61-b40d-9cd5c6a4f141\") " pod="calico-apiserver/calico-apiserver-66cf7848b7-dszdj" Feb 9 09:49:53.310220 kubelet[2771]: I0209 09:49:53.309985 2771 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vw5bx\" (UniqueName: \"kubernetes.io/projected/f4496dcf-c303-4b61-b40d-9cd5c6a4f141-kube-api-access-vw5bx\") pod \"calico-apiserver-66cf7848b7-dszdj\" (UID: \"f4496dcf-c303-4b61-b40d-9cd5c6a4f141\") " pod="calico-apiserver/calico-apiserver-66cf7848b7-dszdj" Feb 9 09:49:53.337000 audit[5110]: NETFILTER_CFG table=filter:116 family=2 entries=33 op=nft_register_rule pid=5110 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:49:53.364378 sshd[5099]: pam_unix(sshd:session): session closed for user core Feb 9 09:49:53.365000 audit[5099]: USER_END pid=5099 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:53.366000 audit[5099]: CRED_DISP pid=5099 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:53.368642 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 09:49:53.370514 systemd-logind[1641]: Session 19 logged out. Waiting for processes to exit. Feb 9 09:49:53.371082 systemd[1]: sshd@18-172.31.21.69:22-139.178.89.65:52480.service: Deactivated successfully. Feb 9 09:49:53.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.21.69:22-139.178.89.65:52480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:53.374051 systemd-logind[1641]: Removed session 19. Feb 9 09:49:53.404780 systemd[1]: Started sshd@19-172.31.21.69:22-139.178.89.65:52492.service. Feb 9 09:49:53.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.21.69:22-139.178.89.65:52492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:53.412158 kubelet[2771]: E0209 09:49:53.412072 2771 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 09:49:53.412342 kubelet[2771]: E0209 09:49:53.412286 2771 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/f4496dcf-c303-4b61-b40d-9cd5c6a4f141-calico-apiserver-certs podName:f4496dcf-c303-4b61-b40d-9cd5c6a4f141 nodeName:}" failed. No retries permitted until 2024-02-09 09:49:53.912225403 +0000 UTC m=+92.364844975 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/f4496dcf-c303-4b61-b40d-9cd5c6a4f141-calico-apiserver-certs") pod "calico-apiserver-66cf7848b7-dszdj" (UID: "f4496dcf-c303-4b61-b40d-9cd5c6a4f141") : secret "calico-apiserver-certs" not found Feb 9 09:49:53.337000 audit[5110]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11996 a0=3 a1=ffffcfa6e4e0 a2=0 a3=ffffa0ad86c0 items=0 ppid=2944 pid=5110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:53.337000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:49:53.425000 audit[5110]: NETFILTER_CFG table=nat:117 family=2 entries=20 op=nft_register_rule pid=5110 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:49:53.425000 audit[5110]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffcfa6e4e0 a2=0 a3=ffffa0ad86c0 items=0 ppid=2944 pid=5110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:53.425000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:49:53.586000 audit[5114]: USER_ACCT pid=5114 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:53.587545 sshd[5114]: Accepted publickey for core from 139.178.89.65 port 52492 ssh2: RSA SHA256:1++YWC0h0fEpfkRPeemtMi9ARVJF0YKl/HjB0qv5R1M Feb 9 09:49:53.589000 audit[5114]: CRED_ACQ pid=5114 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:53.589000 audit[5114]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffc59ab40 a2=3 a3=1 items=0 ppid=1 pid=5114 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:53.589000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:49:53.590768 sshd[5114]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:49:53.599622 systemd-logind[1641]: New session 20 of user core. Feb 9 09:49:53.601045 systemd[1]: Started session-20.scope. Feb 9 09:49:53.611000 audit[5114]: USER_START pid=5114 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:53.614000 audit[5118]: CRED_ACQ pid=5118 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:53.920888 sshd[5114]: pam_unix(sshd:session): session closed for user core Feb 9 09:49:53.936440 kernel: kauditd_printk_skb: 60 callbacks suppressed Feb 9 09:49:53.936589 kernel: audit: type=1106 audit(1707472193.930:1464): pid=5114 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:53.930000 audit[5114]: USER_END pid=5114 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:53.948386 systemd-logind[1641]: Session 20 logged out. Waiting for processes to exit. Feb 9 09:49:53.930000 audit[5114]: CRED_DISP pid=5114 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:53.950590 systemd[1]: sshd@19-172.31.21.69:22-139.178.89.65:52492.service: Deactivated successfully. Feb 9 09:49:53.952028 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 09:49:53.960102 kernel: audit: type=1104 audit(1707472193.930:1465): pid=5114 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:53.960932 systemd-logind[1641]: Removed session 20. Feb 9 09:49:53.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.21.69:22-139.178.89.65:52492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:53.973128 kernel: audit: type=1131 audit(1707472193.950:1466): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.21.69:22-139.178.89.65:52492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:54.114219 env[1656]: time="2024-02-09T09:49:54.114123552Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66cf7848b7-dszdj,Uid:f4496dcf-c303-4b61-b40d-9cd5c6a4f141,Namespace:calico-apiserver,Attempt:0,}" Feb 9 09:49:54.343632 systemd-networkd[1450]: cali7fe5af464f5: Link UP Feb 9 09:49:54.349297 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:49:54.349793 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7fe5af464f5: link becomes ready Feb 9 09:49:54.349786 systemd-networkd[1450]: cali7fe5af464f5: Gained carrier Feb 9 09:49:54.355781 (udev-worker)[5147]: Network interface NamePolicy= disabled on kernel command line. Feb 9 09:49:54.396117 env[1656]: 2024-02-09 09:49:54.214 [INFO][5129] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--69-k8s-calico--apiserver--66cf7848b7--dszdj-eth0 calico-apiserver-66cf7848b7- calico-apiserver f4496dcf-c303-4b61-b40d-9cd5c6a4f141 1075 0 2024-02-09 09:49:53 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:66cf7848b7 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-21-69 calico-apiserver-66cf7848b7-dszdj eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali7fe5af464f5 [] []}} ContainerID="2f519c690c77587ac6ad03aa6ef4bc15290535b8eac1fa2c7e2bcfa9dbe18ba9" Namespace="calico-apiserver" Pod="calico-apiserver-66cf7848b7-dszdj" WorkloadEndpoint="ip--172--31--21--69-k8s-calico--apiserver--66cf7848b7--dszdj-" Feb 9 09:49:54.396117 env[1656]: 2024-02-09 09:49:54.215 [INFO][5129] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2f519c690c77587ac6ad03aa6ef4bc15290535b8eac1fa2c7e2bcfa9dbe18ba9" Namespace="calico-apiserver" Pod="calico-apiserver-66cf7848b7-dszdj" WorkloadEndpoint="ip--172--31--21--69-k8s-calico--apiserver--66cf7848b7--dszdj-eth0" Feb 9 09:49:54.396117 env[1656]: 2024-02-09 09:49:54.264 [INFO][5140] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2f519c690c77587ac6ad03aa6ef4bc15290535b8eac1fa2c7e2bcfa9dbe18ba9" HandleID="k8s-pod-network.2f519c690c77587ac6ad03aa6ef4bc15290535b8eac1fa2c7e2bcfa9dbe18ba9" Workload="ip--172--31--21--69-k8s-calico--apiserver--66cf7848b7--dszdj-eth0" Feb 9 09:49:54.396117 env[1656]: 2024-02-09 09:49:54.285 [INFO][5140] ipam_plugin.go 268: Auto assigning IP ContainerID="2f519c690c77587ac6ad03aa6ef4bc15290535b8eac1fa2c7e2bcfa9dbe18ba9" HandleID="k8s-pod-network.2f519c690c77587ac6ad03aa6ef4bc15290535b8eac1fa2c7e2bcfa9dbe18ba9" Workload="ip--172--31--21--69-k8s-calico--apiserver--66cf7848b7--dszdj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002a96f0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-21-69", "pod":"calico-apiserver-66cf7848b7-dszdj", "timestamp":"2024-02-09 09:49:54.264909528 +0000 UTC"}, Hostname:"ip-172-31-21-69", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:49:54.396117 env[1656]: 2024-02-09 09:49:54.285 [INFO][5140] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:49:54.396117 env[1656]: 2024-02-09 09:49:54.286 [INFO][5140] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:49:54.396117 env[1656]: 2024-02-09 09:49:54.286 [INFO][5140] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-69' Feb 9 09:49:54.396117 env[1656]: 2024-02-09 09:49:54.289 [INFO][5140] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2f519c690c77587ac6ad03aa6ef4bc15290535b8eac1fa2c7e2bcfa9dbe18ba9" host="ip-172-31-21-69" Feb 9 09:49:54.396117 env[1656]: 2024-02-09 09:49:54.302 [INFO][5140] ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-69" Feb 9 09:49:54.396117 env[1656]: 2024-02-09 09:49:54.310 [INFO][5140] ipam.go 489: Trying affinity for 192.168.113.64/26 host="ip-172-31-21-69" Feb 9 09:49:54.396117 env[1656]: 2024-02-09 09:49:54.313 [INFO][5140] ipam.go 155: Attempting to load block cidr=192.168.113.64/26 host="ip-172-31-21-69" Feb 9 09:49:54.396117 env[1656]: 2024-02-09 09:49:54.317 [INFO][5140] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.64/26 host="ip-172-31-21-69" Feb 9 09:49:54.396117 env[1656]: 2024-02-09 09:49:54.317 [INFO][5140] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.64/26 handle="k8s-pod-network.2f519c690c77587ac6ad03aa6ef4bc15290535b8eac1fa2c7e2bcfa9dbe18ba9" host="ip-172-31-21-69" Feb 9 09:49:54.396117 env[1656]: 2024-02-09 09:49:54.322 [INFO][5140] ipam.go 1682: Creating new handle: k8s-pod-network.2f519c690c77587ac6ad03aa6ef4bc15290535b8eac1fa2c7e2bcfa9dbe18ba9 Feb 9 09:49:54.396117 env[1656]: 2024-02-09 09:49:54.328 [INFO][5140] ipam.go 1203: Writing block in order to claim IPs block=192.168.113.64/26 handle="k8s-pod-network.2f519c690c77587ac6ad03aa6ef4bc15290535b8eac1fa2c7e2bcfa9dbe18ba9" host="ip-172-31-21-69" Feb 9 09:49:54.396117 env[1656]: 2024-02-09 09:49:54.336 [INFO][5140] ipam.go 1216: Successfully claimed IPs: [192.168.113.69/26] block=192.168.113.64/26 handle="k8s-pod-network.2f519c690c77587ac6ad03aa6ef4bc15290535b8eac1fa2c7e2bcfa9dbe18ba9" host="ip-172-31-21-69" Feb 9 09:49:54.396117 env[1656]: 2024-02-09 09:49:54.336 [INFO][5140] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.69/26] handle="k8s-pod-network.2f519c690c77587ac6ad03aa6ef4bc15290535b8eac1fa2c7e2bcfa9dbe18ba9" host="ip-172-31-21-69" Feb 9 09:49:54.396117 env[1656]: 2024-02-09 09:49:54.336 [INFO][5140] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:49:54.396117 env[1656]: 2024-02-09 09:49:54.336 [INFO][5140] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.113.69/26] IPv6=[] ContainerID="2f519c690c77587ac6ad03aa6ef4bc15290535b8eac1fa2c7e2bcfa9dbe18ba9" HandleID="k8s-pod-network.2f519c690c77587ac6ad03aa6ef4bc15290535b8eac1fa2c7e2bcfa9dbe18ba9" Workload="ip--172--31--21--69-k8s-calico--apiserver--66cf7848b7--dszdj-eth0" Feb 9 09:49:54.397425 env[1656]: 2024-02-09 09:49:54.339 [INFO][5129] k8s.go 385: Populated endpoint ContainerID="2f519c690c77587ac6ad03aa6ef4bc15290535b8eac1fa2c7e2bcfa9dbe18ba9" Namespace="calico-apiserver" Pod="calico-apiserver-66cf7848b7-dszdj" WorkloadEndpoint="ip--172--31--21--69-k8s-calico--apiserver--66cf7848b7--dszdj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--69-k8s-calico--apiserver--66cf7848b7--dszdj-eth0", GenerateName:"calico-apiserver-66cf7848b7-", Namespace:"calico-apiserver", SelfLink:"", UID:"f4496dcf-c303-4b61-b40d-9cd5c6a4f141", ResourceVersion:"1075", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 49, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66cf7848b7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-69", ContainerID:"", Pod:"calico-apiserver-66cf7848b7-dszdj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.113.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7fe5af464f5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:49:54.397425 env[1656]: 2024-02-09 09:49:54.339 [INFO][5129] k8s.go 386: Calico CNI using IPs: [192.168.113.69/32] ContainerID="2f519c690c77587ac6ad03aa6ef4bc15290535b8eac1fa2c7e2bcfa9dbe18ba9" Namespace="calico-apiserver" Pod="calico-apiserver-66cf7848b7-dszdj" WorkloadEndpoint="ip--172--31--21--69-k8s-calico--apiserver--66cf7848b7--dszdj-eth0" Feb 9 09:49:54.397425 env[1656]: 2024-02-09 09:49:54.339 [INFO][5129] dataplane_linux.go 68: Setting the host side veth name to cali7fe5af464f5 ContainerID="2f519c690c77587ac6ad03aa6ef4bc15290535b8eac1fa2c7e2bcfa9dbe18ba9" Namespace="calico-apiserver" Pod="calico-apiserver-66cf7848b7-dszdj" WorkloadEndpoint="ip--172--31--21--69-k8s-calico--apiserver--66cf7848b7--dszdj-eth0" Feb 9 09:49:54.397425 env[1656]: 2024-02-09 09:49:54.350 [INFO][5129] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2f519c690c77587ac6ad03aa6ef4bc15290535b8eac1fa2c7e2bcfa9dbe18ba9" Namespace="calico-apiserver" Pod="calico-apiserver-66cf7848b7-dszdj" WorkloadEndpoint="ip--172--31--21--69-k8s-calico--apiserver--66cf7848b7--dszdj-eth0" Feb 9 09:49:54.397425 env[1656]: 2024-02-09 09:49:54.351 [INFO][5129] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2f519c690c77587ac6ad03aa6ef4bc15290535b8eac1fa2c7e2bcfa9dbe18ba9" Namespace="calico-apiserver" Pod="calico-apiserver-66cf7848b7-dszdj" WorkloadEndpoint="ip--172--31--21--69-k8s-calico--apiserver--66cf7848b7--dszdj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--69-k8s-calico--apiserver--66cf7848b7--dszdj-eth0", GenerateName:"calico-apiserver-66cf7848b7-", Namespace:"calico-apiserver", SelfLink:"", UID:"f4496dcf-c303-4b61-b40d-9cd5c6a4f141", ResourceVersion:"1075", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 49, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66cf7848b7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-69", ContainerID:"2f519c690c77587ac6ad03aa6ef4bc15290535b8eac1fa2c7e2bcfa9dbe18ba9", Pod:"calico-apiserver-66cf7848b7-dszdj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.113.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7fe5af464f5", MAC:"fe:c5:71:83:ab:20", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:49:54.397425 env[1656]: 2024-02-09 09:49:54.391 [INFO][5129] k8s.go 491: Wrote updated endpoint to datastore ContainerID="2f519c690c77587ac6ad03aa6ef4bc15290535b8eac1fa2c7e2bcfa9dbe18ba9" Namespace="calico-apiserver" Pod="calico-apiserver-66cf7848b7-dszdj" WorkloadEndpoint="ip--172--31--21--69-k8s-calico--apiserver--66cf7848b7--dszdj-eth0" Feb 9 09:49:54.423921 env[1656]: time="2024-02-09T09:49:54.423789949Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:49:54.424108 env[1656]: time="2024-02-09T09:49:54.423952973Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:49:54.424108 env[1656]: time="2024-02-09T09:49:54.424042040Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:49:54.425101 env[1656]: time="2024-02-09T09:49:54.424947103Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2f519c690c77587ac6ad03aa6ef4bc15290535b8eac1fa2c7e2bcfa9dbe18ba9 pid=5172 runtime=io.containerd.runc.v2 Feb 9 09:49:54.485783 systemd[1]: Started cri-containerd-2f519c690c77587ac6ad03aa6ef4bc15290535b8eac1fa2c7e2bcfa9dbe18ba9.scope. Feb 9 09:49:54.481000 audit[5184]: NETFILTER_CFG table=filter:118 family=2 entries=55 op=nft_register_chain pid=5184 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:49:54.495518 kernel: audit: type=1325 audit(1707472194.481:1467): table=filter:118 family=2 entries=55 op=nft_register_chain pid=5184 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:49:54.495680 kernel: audit: type=1300 audit(1707472194.481:1467): arch=c00000b7 syscall=211 success=yes exit=28088 a0=3 a1=ffffc6c14200 a2=0 a3=ffffbeb0afa8 items=0 ppid=3914 pid=5184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:54.481000 audit[5184]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=28088 a0=3 a1=ffffc6c14200 a2=0 a3=ffffbeb0afa8 items=0 ppid=3914 pid=5184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:54.481000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:49:54.516074 kernel: audit: type=1327 audit(1707472194.481:1467): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:49:54.508000 audit[5194]: NETFILTER_CFG table=filter:119 family=2 entries=34 op=nft_register_rule pid=5194 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:49:54.530463 kernel: audit: type=1325 audit(1707472194.508:1468): table=filter:119 family=2 entries=34 op=nft_register_rule pid=5194 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:49:54.530640 kernel: audit: type=1300 audit(1707472194.508:1468): arch=c00000b7 syscall=211 success=yes exit=11996 a0=3 a1=ffffdbfd0f30 a2=0 a3=ffffabe566c0 items=0 ppid=2944 pid=5194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:54.508000 audit[5194]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11996 a0=3 a1=ffffdbfd0f30 a2=0 a3=ffffabe566c0 items=0 ppid=2944 pid=5194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:54.542445 kernel: audit: type=1327 audit(1707472194.508:1468): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:49:54.508000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:49:54.530000 audit[5194]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=5194 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:49:54.530000 audit[5194]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffdbfd0f30 a2=0 a3=ffffabe566c0 items=0 ppid=2944 pid=5194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:54.558485 kernel: audit: type=1325 audit(1707472194.530:1469): table=nat:120 family=2 entries=20 op=nft_register_rule pid=5194 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:49:54.530000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:49:54.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.560000 audit: BPF prog-id=188 op=LOAD Feb 9 09:49:54.562000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.562000 audit[5183]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=5172 pid=5183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:54.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266353139633639306337373538376163366164303361613665663462 Feb 9 09:49:54.562000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.562000 audit[5183]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=5172 pid=5183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:54.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266353139633639306337373538376163366164303361613665663462 Feb 9 09:49:54.563000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.563000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.563000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.563000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.563000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.563000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.563000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.563000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.563000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.563000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.563000 audit: BPF prog-id=189 op=LOAD Feb 9 09:49:54.563000 audit[5183]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=5172 pid=5183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:54.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266353139633639306337373538376163366164303361613665663462 Feb 9 09:49:54.564000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.564000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.564000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.564000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.564000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.564000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.564000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.564000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.564000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.564000 audit: BPF prog-id=190 op=LOAD Feb 9 09:49:54.564000 audit[5183]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=5172 pid=5183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:54.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266353139633639306337373538376163366164303361613665663462 Feb 9 09:49:54.565000 audit: BPF prog-id=190 op=UNLOAD Feb 9 09:49:54.566000 audit: BPF prog-id=189 op=UNLOAD Feb 9 09:49:54.566000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.566000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.566000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.566000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.566000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.566000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.566000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.566000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.566000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.566000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:54.566000 audit: BPF prog-id=191 op=LOAD Feb 9 09:49:54.566000 audit[5183]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=5172 pid=5183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:54.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266353139633639306337373538376163366164303361613665663462 Feb 9 09:49:54.616766 env[1656]: time="2024-02-09T09:49:54.616625065Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66cf7848b7-dszdj,Uid:f4496dcf-c303-4b61-b40d-9cd5c6a4f141,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"2f519c690c77587ac6ad03aa6ef4bc15290535b8eac1fa2c7e2bcfa9dbe18ba9\"" Feb 9 09:49:54.625715 env[1656]: time="2024-02-09T09:49:54.625648286Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 09:49:56.123671 systemd-networkd[1450]: cali7fe5af464f5: Gained IPv6LL Feb 9 09:49:57.280936 systemd[1]: run-containerd-runc-k8s.io-958833373cc194d47e376727dbf496eb4b4e6e8ef89eb6069b31f86f09d38997-runc.84VWWD.mount: Deactivated successfully. Feb 9 09:49:57.905536 env[1656]: time="2024-02-09T09:49:57.905470124Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:49:57.908482 env[1656]: time="2024-02-09T09:49:57.908397293Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:49:57.911670 env[1656]: time="2024-02-09T09:49:57.911597817Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:49:57.914536 env[1656]: time="2024-02-09T09:49:57.914474944Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:49:57.915857 env[1656]: time="2024-02-09T09:49:57.915806548Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 9 09:49:57.921241 env[1656]: time="2024-02-09T09:49:57.921184928Z" level=info msg="CreateContainer within sandbox \"2f519c690c77587ac6ad03aa6ef4bc15290535b8eac1fa2c7e2bcfa9dbe18ba9\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 09:49:57.945046 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount670280858.mount: Deactivated successfully. Feb 9 09:49:57.948574 env[1656]: time="2024-02-09T09:49:57.948495051Z" level=info msg="CreateContainer within sandbox \"2f519c690c77587ac6ad03aa6ef4bc15290535b8eac1fa2c7e2bcfa9dbe18ba9\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"95096d1d8f47b7f1eda8a74f8afe8c798ebb300335bd420f59440bac57e6738d\"" Feb 9 09:49:57.951855 env[1656]: time="2024-02-09T09:49:57.951803890Z" level=info msg="StartContainer for \"95096d1d8f47b7f1eda8a74f8afe8c798ebb300335bd420f59440bac57e6738d\"" Feb 9 09:49:57.988726 systemd[1]: Started cri-containerd-95096d1d8f47b7f1eda8a74f8afe8c798ebb300335bd420f59440bac57e6738d.scope. Feb 9 09:49:58.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.033000 audit: BPF prog-id=192 op=LOAD Feb 9 09:49:58.035000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.035000 audit[5235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=5172 pid=5235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:58.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935303936643164386634376237663165646138613734663861666538 Feb 9 09:49:58.035000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.035000 audit[5235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=5172 pid=5235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:58.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935303936643164386634376237663165646138613734663861666538 Feb 9 09:49:58.035000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.035000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.035000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.035000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.035000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.035000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.035000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.035000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.035000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.035000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.035000 audit: BPF prog-id=193 op=LOAD Feb 9 09:49:58.035000 audit[5235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=5172 pid=5235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:58.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935303936643164386634376237663165646138613734663861666538 Feb 9 09:49:58.036000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.036000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.036000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.036000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.036000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.036000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.036000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.036000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.036000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.036000 audit: BPF prog-id=194 op=LOAD Feb 9 09:49:58.036000 audit[5235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=5172 pid=5235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:58.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935303936643164386634376237663165646138613734663861666538 Feb 9 09:49:58.036000 audit: BPF prog-id=194 op=UNLOAD Feb 9 09:49:58.036000 audit: BPF prog-id=193 op=UNLOAD Feb 9 09:49:58.036000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.036000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.036000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.036000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.036000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.036000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.036000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.036000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.036000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.036000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:49:58.036000 audit: BPF prog-id=195 op=LOAD Feb 9 09:49:58.036000 audit[5235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=5172 pid=5235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:58.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935303936643164386634376237663165646138613734663861666538 Feb 9 09:49:58.081212 env[1656]: time="2024-02-09T09:49:58.081143966Z" level=info msg="StartContainer for \"95096d1d8f47b7f1eda8a74f8afe8c798ebb300335bd420f59440bac57e6738d\" returns successfully" Feb 9 09:49:58.360241 kubelet[2771]: I0209 09:49:58.360173 2771 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-66cf7848b7-dszdj" podStartSLOduration=2.067367638 podCreationTimestamp="2024-02-09 09:49:53 +0000 UTC" firstStartedPulling="2024-02-09 09:49:54.623469787 +0000 UTC m=+93.076089347" lastFinishedPulling="2024-02-09 09:49:57.916217524 +0000 UTC m=+96.368837108" observedRunningTime="2024-02-09 09:49:58.357992695 +0000 UTC m=+96.810612291" watchObservedRunningTime="2024-02-09 09:49:58.360115399 +0000 UTC m=+96.812734983" Feb 9 09:49:58.395000 audit[5266]: NETFILTER_CFG table=filter:121 family=2 entries=34 op=nft_register_rule pid=5266 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:49:58.395000 audit[5266]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11996 a0=3 a1=ffffdd7d9ac0 a2=0 a3=ffffa846f6c0 items=0 ppid=2944 pid=5266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:58.395000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:49:58.398000 audit[5266]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=5266 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:49:58.398000 audit[5266]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffdd7d9ac0 a2=0 a3=ffffa846f6c0 items=0 ppid=2944 pid=5266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:58.398000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:49:58.885000 audit[5246]: AVC avc: denied { watch } for pid=5246 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_49_53.1602321426/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c516,c791 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c516,c791 tclass=file permissive=0 Feb 9 09:49:58.885000 audit[5246]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000b5d980 a2=fc6 a3=0 items=0 ppid=5172 pid=5246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c516,c791 key=(null) Feb 9 09:49:58.885000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 09:49:58.946347 systemd[1]: Started sshd@20-172.31.21.69:22-139.178.89.65:45010.service. Feb 9 09:49:58.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.21.69:22-139.178.89.65:45010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:58.948888 kernel: kauditd_printk_skb: 125 callbacks suppressed Feb 9 09:49:58.948963 kernel: audit: type=1130 audit(1707472198.945:1509): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.21.69:22-139.178.89.65:45010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:59.128000 audit[5268]: USER_ACCT pid=5268 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:59.131545 sshd[5268]: Accepted publickey for core from 139.178.89.65 port 45010 ssh2: RSA SHA256:1++YWC0h0fEpfkRPeemtMi9ARVJF0YKl/HjB0qv5R1M Feb 9 09:49:59.134950 sshd[5268]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:49:59.140574 kernel: audit: type=1101 audit(1707472199.128:1510): pid=5268 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:59.140707 kernel: audit: type=1103 audit(1707472199.128:1511): pid=5268 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:59.128000 audit[5268]: CRED_ACQ pid=5268 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:59.159618 kernel: audit: type=1006 audit(1707472199.128:1512): pid=5268 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Feb 9 09:49:59.159745 kernel: audit: type=1300 audit(1707472199.128:1512): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe7e32190 a2=3 a3=1 items=0 ppid=1 pid=5268 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:59.128000 audit[5268]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe7e32190 a2=3 a3=1 items=0 ppid=1 pid=5268 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:49:59.158567 systemd[1]: Started session-21.scope. Feb 9 09:49:59.162123 systemd-logind[1641]: New session 21 of user core. Feb 9 09:49:59.128000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:49:59.172109 kernel: audit: type=1327 audit(1707472199.128:1512): proctitle=737368643A20636F7265205B707269765D Feb 9 09:49:59.174000 audit[5268]: USER_START pid=5268 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:59.174000 audit[5270]: CRED_ACQ pid=5270 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:59.195963 kernel: audit: type=1105 audit(1707472199.174:1513): pid=5268 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:59.196097 kernel: audit: type=1103 audit(1707472199.174:1514): pid=5270 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:59.422267 sshd[5268]: pam_unix(sshd:session): session closed for user core Feb 9 09:49:59.423000 audit[5268]: USER_END pid=5268 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:59.428882 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 09:49:59.430200 systemd[1]: sshd@20-172.31.21.69:22-139.178.89.65:45010.service: Deactivated successfully. Feb 9 09:49:59.425000 audit[5268]: CRED_DISP pid=5268 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:59.446500 kernel: audit: type=1106 audit(1707472199.423:1515): pid=5268 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:59.446600 kernel: audit: type=1104 audit(1707472199.425:1516): pid=5268 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:49:59.446677 systemd-logind[1641]: Session 21 logged out. Waiting for processes to exit. Feb 9 09:49:59.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.21.69:22-139.178.89.65:45010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:49:59.448964 systemd-logind[1641]: Removed session 21. Feb 9 09:50:01.233000 audit[5282]: NETFILTER_CFG table=filter:123 family=2 entries=22 op=nft_register_rule pid=5282 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:50:01.233000 audit[5282]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffe529ee70 a2=0 a3=ffffbdc6b6c0 items=0 ppid=2944 pid=5282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:01.233000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:50:01.240000 audit[5282]: NETFILTER_CFG table=nat:124 family=2 entries=104 op=nft_register_chain pid=5282 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:50:01.240000 audit[5282]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=47436 a0=3 a1=ffffe529ee70 a2=0 a3=ffffbdc6b6c0 items=0 ppid=2944 pid=5282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:01.240000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:50:04.243862 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 09:50:04.244039 kernel: audit: type=1325 audit(1707472204.239:1520): table=filter:125 family=2 entries=10 op=nft_register_rule pid=5286 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:50:04.239000 audit[5286]: NETFILTER_CFG table=filter:125 family=2 entries=10 op=nft_register_rule pid=5286 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:50:04.239000 audit[5286]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffdf4177f0 a2=0 a3=ffffbef5e6c0 items=0 ppid=2944 pid=5286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:04.260232 kernel: audit: type=1300 audit(1707472204.239:1520): arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffdf4177f0 a2=0 a3=ffffbef5e6c0 items=0 ppid=2944 pid=5286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:04.260334 kernel: audit: type=1327 audit(1707472204.239:1520): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:50:04.239000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:50:04.242000 audit[5286]: NETFILTER_CFG table=nat:126 family=2 entries=44 op=nft_register_rule pid=5286 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:50:04.242000 audit[5286]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14220 a0=3 a1=ffffdf4177f0 a2=0 a3=ffffbef5e6c0 items=0 ppid=2944 pid=5286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:04.284829 kernel: audit: type=1325 audit(1707472204.242:1521): table=nat:126 family=2 entries=44 op=nft_register_rule pid=5286 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:50:04.284890 kernel: audit: type=1300 audit(1707472204.242:1521): arch=c00000b7 syscall=211 success=yes exit=14220 a0=3 a1=ffffdf4177f0 a2=0 a3=ffffbef5e6c0 items=0 ppid=2944 pid=5286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:04.242000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:50:04.290575 kernel: audit: type=1327 audit(1707472204.242:1521): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:50:04.451588 systemd[1]: Started sshd@21-172.31.21.69:22-139.178.89.65:45018.service. Feb 9 09:50:04.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.21.69:22-139.178.89.65:45018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:50:04.463518 kernel: audit: type=1130 audit(1707472204.451:1522): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.21.69:22-139.178.89.65:45018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:50:04.626000 audit[5288]: USER_ACCT pid=5288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:04.629549 sshd[5288]: Accepted publickey for core from 139.178.89.65 port 45018 ssh2: RSA SHA256:1++YWC0h0fEpfkRPeemtMi9ARVJF0YKl/HjB0qv5R1M Feb 9 09:50:04.632648 sshd[5288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:50:04.626000 audit[5288]: CRED_ACQ pid=5288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:04.648941 kernel: audit: type=1101 audit(1707472204.626:1523): pid=5288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:04.649048 kernel: audit: type=1103 audit(1707472204.626:1524): pid=5288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:04.655385 kernel: audit: type=1006 audit(1707472204.626:1525): pid=5288 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 9 09:50:04.626000 audit[5288]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc6a0e8c0 a2=3 a3=1 items=0 ppid=1 pid=5288 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:04.626000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:50:04.658018 systemd[1]: Started session-22.scope. Feb 9 09:50:04.659000 systemd-logind[1641]: New session 22 of user core. Feb 9 09:50:04.668000 audit[5288]: USER_START pid=5288 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:04.671000 audit[5292]: CRED_ACQ pid=5292 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:04.923260 sshd[5288]: pam_unix(sshd:session): session closed for user core Feb 9 09:50:04.924000 audit[5288]: USER_END pid=5288 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:04.925000 audit[5288]: CRED_DISP pid=5288 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:04.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.21.69:22-139.178.89.65:45018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:50:04.929296 systemd[1]: sshd@21-172.31.21.69:22-139.178.89.65:45018.service: Deactivated successfully. Feb 9 09:50:04.931225 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 09:50:04.933505 systemd-logind[1641]: Session 22 logged out. Waiting for processes to exit. Feb 9 09:50:04.937369 systemd-logind[1641]: Removed session 22. Feb 9 09:50:09.962056 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 09:50:09.962278 kernel: audit: type=1130 audit(1707472209.949:1531): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.21.69:22-139.178.89.65:42316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:50:09.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.21.69:22-139.178.89.65:42316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:50:09.951055 systemd[1]: Started sshd@22-172.31.21.69:22-139.178.89.65:42316.service. Feb 9 09:50:10.119000 audit[5304]: USER_ACCT pid=5304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:10.121524 sshd[5304]: Accepted publickey for core from 139.178.89.65 port 42316 ssh2: RSA SHA256:1++YWC0h0fEpfkRPeemtMi9ARVJF0YKl/HjB0qv5R1M Feb 9 09:50:10.124904 sshd[5304]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:50:10.122000 audit[5304]: CRED_ACQ pid=5304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:10.141747 kernel: audit: type=1101 audit(1707472210.119:1532): pid=5304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:10.141885 kernel: audit: type=1103 audit(1707472210.122:1533): pid=5304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:10.148255 kernel: audit: type=1006 audit(1707472210.122:1534): pid=5304 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 9 09:50:10.148522 kernel: audit: type=1300 audit(1707472210.122:1534): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5eed2b0 a2=3 a3=1 items=0 ppid=1 pid=5304 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:10.122000 audit[5304]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5eed2b0 a2=3 a3=1 items=0 ppid=1 pid=5304 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:10.122000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:50:10.163720 kernel: audit: type=1327 audit(1707472210.122:1534): proctitle=737368643A20636F7265205B707269765D Feb 9 09:50:10.165468 systemd-logind[1641]: New session 23 of user core. Feb 9 09:50:10.166808 systemd[1]: Started session-23.scope. Feb 9 09:50:10.181000 audit[5304]: USER_START pid=5304 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:10.194588 kernel: audit: type=1105 audit(1707472210.181:1535): pid=5304 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:10.193000 audit[5306]: CRED_ACQ pid=5306 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:10.204448 kernel: audit: type=1103 audit(1707472210.193:1536): pid=5306 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:10.438599 sshd[5304]: pam_unix(sshd:session): session closed for user core Feb 9 09:50:10.439000 audit[5304]: USER_END pid=5304 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:10.454649 systemd[1]: sshd@22-172.31.21.69:22-139.178.89.65:42316.service: Deactivated successfully. Feb 9 09:50:10.456042 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 09:50:10.439000 audit[5304]: CRED_DISP pid=5304 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:10.457849 systemd-logind[1641]: Session 23 logged out. Waiting for processes to exit. Feb 9 09:50:10.466685 kernel: audit: type=1106 audit(1707472210.439:1537): pid=5304 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:10.466808 kernel: audit: type=1104 audit(1707472210.439:1538): pid=5304 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:10.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.21.69:22-139.178.89.65:42316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:50:10.468488 systemd-logind[1641]: Removed session 23. Feb 9 09:50:15.485407 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 09:50:15.485661 kernel: audit: type=1130 audit(1707472215.471:1540): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.21.69:22-139.178.89.65:42320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:50:15.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.21.69:22-139.178.89.65:42320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:50:15.473127 systemd[1]: Started sshd@23-172.31.21.69:22-139.178.89.65:42320.service. Feb 9 09:50:15.642000 audit[5319]: USER_ACCT pid=5319 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:15.646204 sshd[5319]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:50:15.648138 sshd[5319]: Accepted publickey for core from 139.178.89.65 port 42320 ssh2: RSA SHA256:1++YWC0h0fEpfkRPeemtMi9ARVJF0YKl/HjB0qv5R1M Feb 9 09:50:15.643000 audit[5319]: CRED_ACQ pid=5319 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:15.668006 kernel: audit: type=1101 audit(1707472215.642:1541): pid=5319 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:15.668145 kernel: audit: type=1103 audit(1707472215.643:1542): pid=5319 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:15.674471 kernel: audit: type=1006 audit(1707472215.644:1543): pid=5319 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 9 09:50:15.677735 systemd-logind[1641]: New session 24 of user core. Feb 9 09:50:15.681029 systemd[1]: Started session-24.scope. Feb 9 09:50:15.644000 audit[5319]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd95e0f40 a2=3 a3=1 items=0 ppid=1 pid=5319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:15.694006 kernel: audit: type=1300 audit(1707472215.644:1543): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd95e0f40 a2=3 a3=1 items=0 ppid=1 pid=5319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:15.644000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:50:15.702290 kernel: audit: type=1327 audit(1707472215.644:1543): proctitle=737368643A20636F7265205B707269765D Feb 9 09:50:15.702000 audit[5319]: USER_START pid=5319 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:15.715840 kernel: audit: type=1105 audit(1707472215.702:1544): pid=5319 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:15.705000 audit[5321]: CRED_ACQ pid=5321 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:15.726251 kernel: audit: type=1103 audit(1707472215.705:1545): pid=5321 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:16.025204 sshd[5319]: pam_unix(sshd:session): session closed for user core Feb 9 09:50:16.026000 audit[5319]: USER_END pid=5319 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:16.031136 systemd-logind[1641]: Session 24 logged out. Waiting for processes to exit. Feb 9 09:50:16.032244 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 09:50:16.033365 systemd[1]: sshd@23-172.31.21.69:22-139.178.89.65:42320.service: Deactivated successfully. Feb 9 09:50:16.036191 systemd-logind[1641]: Removed session 24. Feb 9 09:50:16.026000 audit[5319]: CRED_DISP pid=5319 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:16.049387 kernel: audit: type=1106 audit(1707472216.026:1546): pid=5319 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:16.049570 kernel: audit: type=1104 audit(1707472216.026:1547): pid=5319 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:16.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.21.69:22-139.178.89.65:42320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:50:17.598000 audit[2556]: AVC avc: denied { watch } for pid=2556 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:50:17.598000 audit[2556]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=400a3480f0 a2=fc6 a3=0 items=0 ppid=2373 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 key=(null) Feb 9 09:50:17.598000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3639002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:50:17.599000 audit[2556]: AVC avc: denied { watch } for pid=2556 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:50:17.599000 audit[2556]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=4013afb0e0 a2=fc6 a3=0 items=0 ppid=2373 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 key=(null) Feb 9 09:50:17.599000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3639002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:50:17.613000 audit[2556]: AVC avc: denied { watch } for pid=2556 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:50:17.613000 audit[2556]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=4009d4c1e0 a2=fc6 a3=0 items=0 ppid=2373 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 key=(null) Feb 9 09:50:17.613000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3639002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:50:17.963000 audit[2556]: AVC avc: denied { watch } for pid=2556 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:50:17.963000 audit[2556]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=4012692240 a2=fc6 a3=0 items=0 ppid=2373 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 key=(null) Feb 9 09:50:17.963000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3639002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:50:18.013000 audit[2556]: AVC avc: denied { watch } for pid=2556 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:50:18.013000 audit[2556]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=40084e6ed0 a2=fc6 a3=0 items=0 ppid=2373 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 key=(null) Feb 9 09:50:18.013000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3639002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:50:18.013000 audit[2556]: AVC avc: denied { watch } for pid=2556 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:50:18.013000 audit[2556]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=4007937ea0 a2=fc6 a3=0 items=0 ppid=2373 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c236 key=(null) Feb 9 09:50:18.013000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32312E3639002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:50:18.601000 audit[2566]: AVC avc: denied { watch } for pid=2566 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:50:18.601000 audit[2566]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40010c5860 a2=fc6 a3=0 items=0 ppid=2375 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 key=(null) Feb 9 09:50:18.601000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:50:18.602000 audit[2566]: AVC avc: denied { watch } for pid=2566 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:50:18.602000 audit[2566]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40012efc20 a2=fc6 a3=0 items=0 ppid=2375 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 key=(null) Feb 9 09:50:18.602000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:50:21.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.21.69:22-139.178.89.65:43904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:50:21.056204 systemd[1]: Started sshd@24-172.31.21.69:22-139.178.89.65:43904.service. Feb 9 09:50:21.058612 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 09:50:21.059452 kernel: audit: type=1130 audit(1707472221.056:1557): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.21.69:22-139.178.89.65:43904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:50:21.233000 audit[5330]: USER_ACCT pid=5330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:21.234214 sshd[5330]: Accepted publickey for core from 139.178.89.65 port 43904 ssh2: RSA SHA256:1++YWC0h0fEpfkRPeemtMi9ARVJF0YKl/HjB0qv5R1M Feb 9 09:50:21.244496 kernel: audit: type=1101 audit(1707472221.233:1558): pid=5330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:21.245000 audit[5330]: CRED_ACQ pid=5330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:21.246995 sshd[5330]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:50:21.261778 kernel: audit: type=1103 audit(1707472221.245:1559): pid=5330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:21.261909 kernel: audit: type=1006 audit(1707472221.245:1560): pid=5330 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 9 09:50:21.245000 audit[5330]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc73aad70 a2=3 a3=1 items=0 ppid=1 pid=5330 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:21.270757 systemd[1]: Started session-25.scope. Feb 9 09:50:21.272613 kernel: audit: type=1300 audit(1707472221.245:1560): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc73aad70 a2=3 a3=1 items=0 ppid=1 pid=5330 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:21.245000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:50:21.273621 systemd-logind[1641]: New session 25 of user core. Feb 9 09:50:21.276303 kernel: audit: type=1327 audit(1707472221.245:1560): proctitle=737368643A20636F7265205B707269765D Feb 9 09:50:21.285000 audit[5330]: USER_START pid=5330 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:21.289000 audit[5332]: CRED_ACQ pid=5332 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:21.306798 kernel: audit: type=1105 audit(1707472221.285:1561): pid=5330 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:21.306952 kernel: audit: type=1103 audit(1707472221.289:1562): pid=5332 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:21.551053 sshd[5330]: pam_unix(sshd:session): session closed for user core Feb 9 09:50:21.552000 audit[5330]: USER_END pid=5330 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:21.567436 systemd[1]: sshd@24-172.31.21.69:22-139.178.89.65:43904.service: Deactivated successfully. Feb 9 09:50:21.553000 audit[5330]: CRED_DISP pid=5330 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:21.578249 kernel: audit: type=1106 audit(1707472221.552:1563): pid=5330 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:21.578443 kernel: audit: type=1104 audit(1707472221.553:1564): pid=5330 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:21.569400 systemd[1]: session-25.scope: Deactivated successfully. Feb 9 09:50:21.578155 systemd-logind[1641]: Session 25 logged out. Waiting for processes to exit. Feb 9 09:50:21.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.21.69:22-139.178.89.65:43904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:50:21.580888 systemd-logind[1641]: Removed session 25. Feb 9 09:50:24.150089 systemd[1]: run-containerd-runc-k8s.io-95096d1d8f47b7f1eda8a74f8afe8c798ebb300335bd420f59440bac57e6738d-runc.F6Wr2t.mount: Deactivated successfully. Feb 9 09:50:24.257000 audit[5382]: NETFILTER_CFG table=filter:127 family=2 entries=9 op=nft_register_rule pid=5382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:50:24.257000 audit[5382]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffce478790 a2=0 a3=ffffb71d06c0 items=0 ppid=2944 pid=5382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:24.257000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:50:24.262000 audit[5382]: NETFILTER_CFG table=nat:128 family=2 entries=51 op=nft_register_chain pid=5382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:50:24.262000 audit[5382]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=17716 a0=3 a1=ffffce478790 a2=0 a3=ffffb71d06c0 items=0 ppid=2944 pid=5382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:24.262000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:50:25.057000 audit[5385]: NETFILTER_CFG table=filter:129 family=2 entries=8 op=nft_register_rule pid=5385 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:50:25.057000 audit[5385]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffc6b98b40 a2=0 a3=ffff9ffeb6c0 items=0 ppid=2944 pid=5385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:25.057000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:50:25.063000 audit[5385]: NETFILTER_CFG table=nat:130 family=2 entries=58 op=nft_register_chain pid=5385 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:50:25.063000 audit[5385]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19604 a0=3 a1=ffffc6b98b40 a2=0 a3=ffff9ffeb6c0 items=0 ppid=2944 pid=5385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:25.063000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:50:26.581530 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 09:50:26.581705 kernel: audit: type=1130 audit(1707472226.578:1570): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.21.69:22-139.178.89.65:43920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:50:26.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.21.69:22-139.178.89.65:43920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:50:26.578755 systemd[1]: Started sshd@25-172.31.21.69:22-139.178.89.65:43920.service. Feb 9 09:50:26.612168 amazon-ssm-agent[1624]: 2024-02-09 09:50:26 INFO [HealthCheck] HealthCheck reporting agent health. Feb 9 09:50:26.754000 audit[5388]: USER_ACCT pid=5388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:26.754977 sshd[5388]: Accepted publickey for core from 139.178.89.65 port 43920 ssh2: RSA SHA256:1++YWC0h0fEpfkRPeemtMi9ARVJF0YKl/HjB0qv5R1M Feb 9 09:50:26.766496 kernel: audit: type=1101 audit(1707472226.754:1571): pid=5388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:26.765000 audit[5388]: CRED_ACQ pid=5388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:26.767598 sshd[5388]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:50:26.782708 kernel: audit: type=1103 audit(1707472226.765:1572): pid=5388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:26.782812 kernel: audit: type=1006 audit(1707472226.765:1573): pid=5388 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 9 09:50:26.765000 audit[5388]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc54ac600 a2=3 a3=1 items=0 ppid=1 pid=5388 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:26.793276 kernel: audit: type=1300 audit(1707472226.765:1573): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc54ac600 a2=3 a3=1 items=0 ppid=1 pid=5388 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:26.765000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:50:26.801126 kernel: audit: type=1327 audit(1707472226.765:1573): proctitle=737368643A20636F7265205B707269765D Feb 9 09:50:26.800385 systemd-logind[1641]: New session 26 of user core. Feb 9 09:50:26.802674 systemd[1]: Started session-26.scope. Feb 9 09:50:26.812000 audit[5388]: USER_START pid=5388 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:26.813000 audit[5391]: CRED_ACQ pid=5391 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:26.833592 kernel: audit: type=1105 audit(1707472226.812:1574): pid=5388 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:26.833700 kernel: audit: type=1103 audit(1707472226.813:1575): pid=5391 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:27.068059 sshd[5388]: pam_unix(sshd:session): session closed for user core Feb 9 09:50:27.069000 audit[5388]: USER_END pid=5388 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:27.070000 audit[5388]: CRED_DISP pid=5388 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:27.091448 kernel: audit: type=1106 audit(1707472227.069:1576): pid=5388 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:27.091587 kernel: audit: type=1104 audit(1707472227.070:1577): pid=5388 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:27.082508 systemd[1]: sshd@25-172.31.21.69:22-139.178.89.65:43920.service: Deactivated successfully. Feb 9 09:50:27.083805 systemd[1]: session-26.scope: Deactivated successfully. Feb 9 09:50:27.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.21.69:22-139.178.89.65:43920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:50:27.093172 systemd-logind[1641]: Session 26 logged out. Waiting for processes to exit. Feb 9 09:50:27.095445 systemd-logind[1641]: Removed session 26. Feb 9 09:50:32.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.21.69:22-139.178.89.65:55788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:50:32.099671 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 09:50:32.099754 kernel: audit: type=1130 audit(1707472232.095:1579): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.21.69:22-139.178.89.65:55788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:50:32.097035 systemd[1]: Started sshd@26-172.31.21.69:22-139.178.89.65:55788.service. Feb 9 09:50:32.282000 audit[5427]: USER_ACCT pid=5427 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:32.284789 sshd[5427]: Accepted publickey for core from 139.178.89.65 port 55788 ssh2: RSA SHA256:1++YWC0h0fEpfkRPeemtMi9ARVJF0YKl/HjB0qv5R1M Feb 9 09:50:32.295470 kernel: audit: type=1101 audit(1707472232.282:1580): pid=5427 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:32.294000 audit[5427]: CRED_ACQ pid=5427 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:32.300047 sshd[5427]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:50:32.312323 kernel: audit: type=1103 audit(1707472232.294:1581): pid=5427 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:32.312484 kernel: audit: type=1006 audit(1707472232.294:1582): pid=5427 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 9 09:50:32.294000 audit[5427]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff71dca40 a2=3 a3=1 items=0 ppid=1 pid=5427 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:32.323433 kernel: audit: type=1300 audit(1707472232.294:1582): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff71dca40 a2=3 a3=1 items=0 ppid=1 pid=5427 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:32.321691 systemd-logind[1641]: New session 27 of user core. Feb 9 09:50:32.322620 systemd[1]: Started session-27.scope. Feb 9 09:50:32.294000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:50:32.328158 kernel: audit: type=1327 audit(1707472232.294:1582): proctitle=737368643A20636F7265205B707269765D Feb 9 09:50:32.331000 audit[5427]: USER_START pid=5427 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:32.334000 audit[5429]: CRED_ACQ pid=5429 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:32.353971 kernel: audit: type=1105 audit(1707472232.331:1583): pid=5427 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:32.354140 kernel: audit: type=1103 audit(1707472232.334:1584): pid=5429 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:32.584567 sshd[5427]: pam_unix(sshd:session): session closed for user core Feb 9 09:50:32.585000 audit[5427]: USER_END pid=5427 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:32.588921 systemd[1]: session-27.scope: Deactivated successfully. Feb 9 09:50:32.590200 systemd[1]: sshd@26-172.31.21.69:22-139.178.89.65:55788.service: Deactivated successfully. Feb 9 09:50:32.599221 systemd-logind[1641]: Session 27 logged out. Waiting for processes to exit. Feb 9 09:50:32.585000 audit[5427]: CRED_DISP pid=5427 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:32.608331 kernel: audit: type=1106 audit(1707472232.585:1585): pid=5427 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:32.608477 kernel: audit: type=1104 audit(1707472232.585:1586): pid=5427 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:50:32.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.21.69:22-139.178.89.65:55788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:50:32.610344 systemd-logind[1641]: Removed session 27. Feb 9 09:50:32.950000 audit[2566]: AVC avc: denied { watch } for pid=2566 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:50:32.950000 audit[2566]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001496000 a2=fc6 a3=0 items=0 ppid=2375 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 key=(null) Feb 9 09:50:32.950000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:50:32.951000 audit[2566]: AVC avc: denied { watch } for pid=2566 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:50:32.951000 audit[2566]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001496040 a2=fc6 a3=0 items=0 ppid=2375 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 key=(null) Feb 9 09:50:32.951000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:50:32.952000 audit[2566]: AVC avc: denied { watch } for pid=2566 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:50:32.952000 audit[2566]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002014180 a2=fc6 a3=0 items=0 ppid=2375 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 key=(null) Feb 9 09:50:32.952000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:50:32.955000 audit[2566]: AVC avc: denied { watch } for pid=2566 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:50:32.955000 audit[2566]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40020142a0 a2=fc6 a3=0 items=0 ppid=2375 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 key=(null) Feb 9 09:50:32.955000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:50:46.038568 systemd[1]: cri-containerd-3f6c58630ee085354f9e578d54ae135af68aaed9cd57d3a43accc12a6418cc35.scope: Deactivated successfully. Feb 9 09:50:46.039125 systemd[1]: cri-containerd-3f6c58630ee085354f9e578d54ae135af68aaed9cd57d3a43accc12a6418cc35.scope: Consumed 10.261s CPU time. Feb 9 09:50:46.042466 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 09:50:46.042617 kernel: audit: type=1334 audit(1707472246.038:1592): prog-id=126 op=UNLOAD Feb 9 09:50:46.038000 audit: BPF prog-id=126 op=UNLOAD Feb 9 09:50:46.049891 kernel: audit: type=1334 audit(1707472246.046:1593): prog-id=129 op=UNLOAD Feb 9 09:50:46.046000 audit: BPF prog-id=129 op=UNLOAD Feb 9 09:50:46.079849 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3f6c58630ee085354f9e578d54ae135af68aaed9cd57d3a43accc12a6418cc35-rootfs.mount: Deactivated successfully. Feb 9 09:50:46.082013 env[1656]: time="2024-02-09T09:50:46.081800228Z" level=info msg="shim disconnected" id=3f6c58630ee085354f9e578d54ae135af68aaed9cd57d3a43accc12a6418cc35 Feb 9 09:50:46.082013 env[1656]: time="2024-02-09T09:50:46.081880800Z" level=warning msg="cleaning up after shim disconnected" id=3f6c58630ee085354f9e578d54ae135af68aaed9cd57d3a43accc12a6418cc35 namespace=k8s.io Feb 9 09:50:46.082013 env[1656]: time="2024-02-09T09:50:46.081905413Z" level=info msg="cleaning up dead shim" Feb 9 09:50:46.096450 env[1656]: time="2024-02-09T09:50:46.096358946Z" level=warning msg="cleanup warnings time=\"2024-02-09T09:50:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5475 runtime=io.containerd.runc.v2\n" Feb 9 09:50:46.374770 systemd[1]: cri-containerd-a78af8171896094cf05c405fd566f5608ee9985561f99a50f5b4ad6260a71e24.scope: Deactivated successfully. Feb 9 09:50:46.375364 systemd[1]: cri-containerd-a78af8171896094cf05c405fd566f5608ee9985561f99a50f5b4ad6260a71e24.scope: Consumed 5.911s CPU time. Feb 9 09:50:46.382689 kernel: audit: type=1334 audit(1707472246.376:1594): prog-id=93 op=UNLOAD Feb 9 09:50:46.382784 kernel: audit: type=1334 audit(1707472246.376:1595): prog-id=99 op=UNLOAD Feb 9 09:50:46.376000 audit: BPF prog-id=93 op=UNLOAD Feb 9 09:50:46.376000 audit: BPF prog-id=99 op=UNLOAD Feb 9 09:50:46.426377 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a78af8171896094cf05c405fd566f5608ee9985561f99a50f5b4ad6260a71e24-rootfs.mount: Deactivated successfully. Feb 9 09:50:46.430523 env[1656]: time="2024-02-09T09:50:46.428833835Z" level=info msg="shim disconnected" id=a78af8171896094cf05c405fd566f5608ee9985561f99a50f5b4ad6260a71e24 Feb 9 09:50:46.430523 env[1656]: time="2024-02-09T09:50:46.428909631Z" level=warning msg="cleaning up after shim disconnected" id=a78af8171896094cf05c405fd566f5608ee9985561f99a50f5b4ad6260a71e24 namespace=k8s.io Feb 9 09:50:46.430523 env[1656]: time="2024-02-09T09:50:46.428932228Z" level=info msg="cleaning up dead shim" Feb 9 09:50:46.447904 env[1656]: time="2024-02-09T09:50:46.447836829Z" level=warning msg="cleanup warnings time=\"2024-02-09T09:50:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5499 runtime=io.containerd.runc.v2\n" Feb 9 09:50:46.477969 kubelet[2771]: I0209 09:50:46.477487 2771 scope.go:115] "RemoveContainer" containerID="3f6c58630ee085354f9e578d54ae135af68aaed9cd57d3a43accc12a6418cc35" Feb 9 09:50:46.483614 env[1656]: time="2024-02-09T09:50:46.483557797Z" level=info msg="CreateContainer within sandbox \"9567fdabb4325653809084c24b886f7e423c2685fdf2af50433441e205cd183e\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Feb 9 09:50:46.487043 kubelet[2771]: I0209 09:50:46.486992 2771 scope.go:115] "RemoveContainer" containerID="a78af8171896094cf05c405fd566f5608ee9985561f99a50f5b4ad6260a71e24" Feb 9 09:50:46.491366 env[1656]: time="2024-02-09T09:50:46.491307762Z" level=info msg="CreateContainer within sandbox \"d330053d9f0debec06bacffaee606a6dffe9600af43a88191de03ffd298b5dec\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Feb 9 09:50:46.531112 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1004369766.mount: Deactivated successfully. Feb 9 09:50:46.534022 env[1656]: time="2024-02-09T09:50:46.533957979Z" level=info msg="CreateContainer within sandbox \"d330053d9f0debec06bacffaee606a6dffe9600af43a88191de03ffd298b5dec\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"c9fc47eefbbf295ddccc6a604530eaf6999994f3f0c133ebd08e28facb42a821\"" Feb 9 09:50:46.536597 env[1656]: time="2024-02-09T09:50:46.536541525Z" level=info msg="StartContainer for \"c9fc47eefbbf295ddccc6a604530eaf6999994f3f0c133ebd08e28facb42a821\"" Feb 9 09:50:46.544741 env[1656]: time="2024-02-09T09:50:46.544658803Z" level=info msg="CreateContainer within sandbox \"9567fdabb4325653809084c24b886f7e423c2685fdf2af50433441e205cd183e\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"3ea4e21d4694505e3d6bce41d20ee214bac14201f435eba93c69d34af2f345af\"" Feb 9 09:50:46.545686 env[1656]: time="2024-02-09T09:50:46.545620825Z" level=info msg="StartContainer for \"3ea4e21d4694505e3d6bce41d20ee214bac14201f435eba93c69d34af2f345af\"" Feb 9 09:50:46.580066 systemd[1]: Started cri-containerd-c9fc47eefbbf295ddccc6a604530eaf6999994f3f0c133ebd08e28facb42a821.scope. Feb 9 09:50:46.603191 systemd[1]: Started cri-containerd-3ea4e21d4694505e3d6bce41d20ee214bac14201f435eba93c69d34af2f345af.scope. Feb 9 09:50:46.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.651860 kernel: audit: type=1400 audit(1707472246.636:1596): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.652024 kernel: audit: type=1400 audit(1707472246.636:1597): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.659604 kernel: audit: type=1400 audit(1707472246.636:1598): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.671216 kernel: audit: type=1400 audit(1707472246.636:1599): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.671382 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 09:50:46.671458 kernel: audit: type=1400 audit(1707472246.636:1600): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.645000 audit: BPF prog-id=196 op=LOAD Feb 9 09:50:46.659000 audit[5536]: AVC avc: denied { bpf } for pid=5536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.659000 audit[5536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000151b38 a2=10 a3=0 items=0 ppid=2375 pid=5536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:46.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339666334376565666262663239356464636363366136303435333065 Feb 9 09:50:46.659000 audit[5536]: AVC avc: denied { perfmon } for pid=5536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.659000 audit[5536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001515a0 a2=3c a3=0 items=0 ppid=2375 pid=5536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:46.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339666334376565666262663239356464636363366136303435333065 Feb 9 09:50:46.659000 audit[5536]: AVC avc: denied { bpf } for pid=5536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.659000 audit[5536]: AVC avc: denied { bpf } for pid=5536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.659000 audit[5536]: AVC avc: denied { bpf } for pid=5536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.659000 audit[5536]: AVC avc: denied { perfmon } for pid=5536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.659000 audit[5536]: AVC avc: denied { perfmon } for pid=5536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.659000 audit[5536]: AVC avc: denied { perfmon } for pid=5536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.659000 audit[5536]: AVC avc: denied { perfmon } for pid=5536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.659000 audit[5536]: AVC avc: denied { perfmon } for pid=5536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.659000 audit[5536]: AVC avc: denied { bpf } for pid=5536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.659000 audit[5536]: AVC avc: denied { bpf } for pid=5536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.659000 audit: BPF prog-id=197 op=LOAD Feb 9 09:50:46.659000 audit[5536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001518e0 a2=78 a3=0 items=0 ppid=2375 pid=5536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:46.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339666334376565666262663239356464636363366136303435333065 Feb 9 09:50:46.659000 audit[5536]: AVC avc: denied { bpf } for pid=5536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.659000 audit[5536]: AVC avc: denied { bpf } for pid=5536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.659000 audit[5536]: AVC avc: denied { perfmon } for pid=5536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.659000 audit[5536]: AVC avc: denied { perfmon } for pid=5536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.659000 audit[5536]: AVC avc: denied { perfmon } for pid=5536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.659000 audit[5536]: AVC avc: denied { perfmon } for pid=5536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.659000 audit[5536]: AVC avc: denied { perfmon } for pid=5536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.659000 audit[5536]: AVC avc: denied { bpf } for pid=5536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.659000 audit[5536]: AVC avc: denied { bpf } for pid=5536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.659000 audit: BPF prog-id=198 op=LOAD Feb 9 09:50:46.659000 audit[5536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000151670 a2=78 a3=0 items=0 ppid=2375 pid=5536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:46.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339666334376565666262663239356464636363366136303435333065 Feb 9 09:50:46.660000 audit: BPF prog-id=198 op=UNLOAD Feb 9 09:50:46.660000 audit: BPF prog-id=197 op=UNLOAD Feb 9 09:50:46.660000 audit[5536]: AVC avc: denied { bpf } for pid=5536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.660000 audit[5536]: AVC avc: denied { bpf } for pid=5536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.660000 audit[5536]: AVC avc: denied { bpf } for pid=5536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.660000 audit[5536]: AVC avc: denied { perfmon } for pid=5536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.660000 audit[5536]: AVC avc: denied { perfmon } for pid=5536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.660000 audit[5536]: AVC avc: denied { perfmon } for pid=5536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.660000 audit[5536]: AVC avc: denied { perfmon } for pid=5536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.660000 audit[5536]: AVC avc: denied { perfmon } for pid=5536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.660000 audit[5536]: AVC avc: denied { bpf } for pid=5536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.660000 audit[5536]: AVC avc: denied { bpf } for pid=5536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.660000 audit: BPF prog-id=199 op=LOAD Feb 9 09:50:46.660000 audit[5536]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000151b40 a2=78 a3=0 items=0 ppid=2375 pid=5536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:46.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339666334376565666262663239356464636363366136303435333065 Feb 9 09:50:46.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.680000 audit[5541]: AVC avc: denied { bpf } for pid=5541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.680000 audit[5541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2897 pid=5541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:46.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365613465323164343639343530356533643662636534316432306565 Feb 9 09:50:46.680000 audit[5541]: AVC avc: denied { perfmon } for pid=5541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.680000 audit[5541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2897 pid=5541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:46.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365613465323164343639343530356533643662636534316432306565 Feb 9 09:50:46.680000 audit[5541]: AVC avc: denied { bpf } for pid=5541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.680000 audit[5541]: AVC avc: denied { bpf } for pid=5541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.680000 audit[5541]: AVC avc: denied { bpf } for pid=5541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.680000 audit[5541]: AVC avc: denied { perfmon } for pid=5541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.680000 audit[5541]: AVC avc: denied { perfmon } for pid=5541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.680000 audit[5541]: AVC avc: denied { perfmon } for pid=5541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.680000 audit[5541]: AVC avc: denied { perfmon } for pid=5541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.680000 audit[5541]: AVC avc: denied { perfmon } for pid=5541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.680000 audit[5541]: AVC avc: denied { bpf } for pid=5541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.680000 audit[5541]: AVC avc: denied { bpf } for pid=5541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.680000 audit: BPF prog-id=201 op=LOAD Feb 9 09:50:46.680000 audit[5541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2897 pid=5541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:46.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365613465323164343639343530356533643662636534316432306565 Feb 9 09:50:46.681000 audit[5541]: AVC avc: denied { bpf } for pid=5541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.681000 audit[5541]: AVC avc: denied { bpf } for pid=5541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.681000 audit[5541]: AVC avc: denied { perfmon } for pid=5541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.681000 audit[5541]: AVC avc: denied { perfmon } for pid=5541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.681000 audit[5541]: AVC avc: denied { perfmon } for pid=5541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.681000 audit[5541]: AVC avc: denied { perfmon } for pid=5541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.681000 audit[5541]: AVC avc: denied { perfmon } for pid=5541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.681000 audit[5541]: AVC avc: denied { bpf } for pid=5541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.681000 audit[5541]: AVC avc: denied { bpf } for pid=5541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.681000 audit: BPF prog-id=202 op=LOAD Feb 9 09:50:46.681000 audit[5541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2897 pid=5541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:46.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365613465323164343639343530356533643662636534316432306565 Feb 9 09:50:46.681000 audit: BPF prog-id=202 op=UNLOAD Feb 9 09:50:46.681000 audit: BPF prog-id=201 op=UNLOAD Feb 9 09:50:46.681000 audit[5541]: AVC avc: denied { bpf } for pid=5541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.681000 audit[5541]: AVC avc: denied { bpf } for pid=5541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.681000 audit[5541]: AVC avc: denied { bpf } for pid=5541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.681000 audit[5541]: AVC avc: denied { perfmon } for pid=5541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.681000 audit[5541]: AVC avc: denied { perfmon } for pid=5541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.681000 audit[5541]: AVC avc: denied { perfmon } for pid=5541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.681000 audit[5541]: AVC avc: denied { perfmon } for pid=5541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.681000 audit[5541]: AVC avc: denied { perfmon } for pid=5541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.681000 audit[5541]: AVC avc: denied { bpf } for pid=5541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.681000 audit[5541]: AVC avc: denied { bpf } for pid=5541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:46.681000 audit: BPF prog-id=203 op=LOAD Feb 9 09:50:46.681000 audit[5541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2897 pid=5541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:46.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365613465323164343639343530356533643662636534316432306565 Feb 9 09:50:46.744553 env[1656]: time="2024-02-09T09:50:46.744487007Z" level=info msg="StartContainer for \"3ea4e21d4694505e3d6bce41d20ee214bac14201f435eba93c69d34af2f345af\" returns successfully" Feb 9 09:50:46.749517 env[1656]: time="2024-02-09T09:50:46.749370118Z" level=info msg="StartContainer for \"c9fc47eefbbf295ddccc6a604530eaf6999994f3f0c133ebd08e28facb42a821\" returns successfully" Feb 9 09:50:49.283000 audit[5560]: AVC avc: denied { watch } for pid=5560 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:50:49.283000 audit[5560]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000b38000 a2=fc6 a3=0 items=0 ppid=2375 pid=5560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 key=(null) Feb 9 09:50:49.283000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:50:49.284000 audit[5560]: AVC avc: denied { watch } for pid=5560 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:50:49.284000 audit[5560]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000ed61a0 a2=fc6 a3=0 items=0 ppid=2375 pid=5560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c377,c665 key=(null) Feb 9 09:50:49.284000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:50:52.210771 systemd[1]: cri-containerd-7675f5b4669fa12b75456787bba547bc6f961772b07567bd4b814a3f3f8e26e9.scope: Deactivated successfully. Feb 9 09:50:52.211360 systemd[1]: cri-containerd-7675f5b4669fa12b75456787bba547bc6f961772b07567bd4b814a3f3f8e26e9.scope: Consumed 2.886s CPU time. Feb 9 09:50:52.214000 audit: BPF prog-id=85 op=UNLOAD Feb 9 09:50:52.216789 kernel: kauditd_printk_skb: 120 callbacks suppressed Feb 9 09:50:52.216871 kernel: audit: type=1334 audit(1707472252.214:1631): prog-id=85 op=UNLOAD Feb 9 09:50:52.214000 audit: BPF prog-id=100 op=UNLOAD Feb 9 09:50:52.222082 kernel: audit: type=1334 audit(1707472252.214:1632): prog-id=100 op=UNLOAD Feb 9 09:50:52.256402 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7675f5b4669fa12b75456787bba547bc6f961772b07567bd4b814a3f3f8e26e9-rootfs.mount: Deactivated successfully. Feb 9 09:50:52.259892 env[1656]: time="2024-02-09T09:50:52.259828232Z" level=info msg="shim disconnected" id=7675f5b4669fa12b75456787bba547bc6f961772b07567bd4b814a3f3f8e26e9 Feb 9 09:50:52.260611 env[1656]: time="2024-02-09T09:50:52.260573070Z" level=warning msg="cleaning up after shim disconnected" id=7675f5b4669fa12b75456787bba547bc6f961772b07567bd4b814a3f3f8e26e9 namespace=k8s.io Feb 9 09:50:52.260753 env[1656]: time="2024-02-09T09:50:52.260723976Z" level=info msg="cleaning up dead shim" Feb 9 09:50:52.276288 env[1656]: time="2024-02-09T09:50:52.276229800Z" level=warning msg="cleanup warnings time=\"2024-02-09T09:50:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5630 runtime=io.containerd.runc.v2\n" Feb 9 09:50:52.513001 kubelet[2771]: I0209 09:50:52.512959 2771 scope.go:115] "RemoveContainer" containerID="7675f5b4669fa12b75456787bba547bc6f961772b07567bd4b814a3f3f8e26e9" Feb 9 09:50:52.516907 env[1656]: time="2024-02-09T09:50:52.516854325Z" level=info msg="CreateContainer within sandbox \"5add2ca4e9b0087fd68de17c25890d6943741b7c924e55a171ab5a23cc28b0d4\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Feb 9 09:50:52.538636 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2849941333.mount: Deactivated successfully. Feb 9 09:50:52.547539 env[1656]: time="2024-02-09T09:50:52.547457462Z" level=info msg="CreateContainer within sandbox \"5add2ca4e9b0087fd68de17c25890d6943741b7c924e55a171ab5a23cc28b0d4\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"df6c7735cf87229e56a8ed47d37477d062a2e15de9b7996d1d617df076324fa8\"" Feb 9 09:50:52.548284 env[1656]: time="2024-02-09T09:50:52.548213856Z" level=info msg="StartContainer for \"df6c7735cf87229e56a8ed47d37477d062a2e15de9b7996d1d617df076324fa8\"" Feb 9 09:50:52.600040 systemd[1]: Started cri-containerd-df6c7735cf87229e56a8ed47d37477d062a2e15de9b7996d1d617df076324fa8.scope. Feb 9 09:50:52.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.654819 kernel: audit: type=1400 audit(1707472252.639:1633): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.654958 kernel: audit: type=1400 audit(1707472252.639:1634): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.670693 kernel: audit: type=1400 audit(1707472252.639:1635): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.670790 kernel: audit: type=1400 audit(1707472252.639:1636): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.680600 kernel: audit: type=1400 audit(1707472252.639:1637): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.694220 kernel: audit: type=1400 audit(1707472252.639:1638): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.709441 kernel: audit: type=1400 audit(1707472252.639:1639): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.709549 kernel: audit: type=1400 audit(1707472252.639:1640): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.647000 audit: BPF prog-id=204 op=LOAD Feb 9 09:50:52.655000 audit[5650]: AVC avc: denied { bpf } for pid=5650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.655000 audit[5650]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2396 pid=5650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:52.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466366337373335636638373232396535366138656434376433373437 Feb 9 09:50:52.655000 audit[5650]: AVC avc: denied { perfmon } for pid=5650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.655000 audit[5650]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2396 pid=5650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:52.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466366337373335636638373232396535366138656434376433373437 Feb 9 09:50:52.655000 audit[5650]: AVC avc: denied { bpf } for pid=5650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.655000 audit[5650]: AVC avc: denied { bpf } for pid=5650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.655000 audit[5650]: AVC avc: denied { bpf } for pid=5650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.655000 audit[5650]: AVC avc: denied { perfmon } for pid=5650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.655000 audit[5650]: AVC avc: denied { perfmon } for pid=5650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.655000 audit[5650]: AVC avc: denied { perfmon } for pid=5650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.655000 audit[5650]: AVC avc: denied { perfmon } for pid=5650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.655000 audit[5650]: AVC avc: denied { perfmon } for pid=5650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.655000 audit[5650]: AVC avc: denied { bpf } for pid=5650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.655000 audit[5650]: AVC avc: denied { bpf } for pid=5650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.655000 audit: BPF prog-id=205 op=LOAD Feb 9 09:50:52.655000 audit[5650]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2396 pid=5650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:52.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466366337373335636638373232396535366138656434376433373437 Feb 9 09:50:52.662000 audit[5650]: AVC avc: denied { bpf } for pid=5650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.662000 audit[5650]: AVC avc: denied { bpf } for pid=5650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.662000 audit[5650]: AVC avc: denied { perfmon } for pid=5650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.662000 audit[5650]: AVC avc: denied { perfmon } for pid=5650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.662000 audit[5650]: AVC avc: denied { perfmon } for pid=5650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.662000 audit[5650]: AVC avc: denied { perfmon } for pid=5650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.662000 audit[5650]: AVC avc: denied { perfmon } for pid=5650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.662000 audit[5650]: AVC avc: denied { bpf } for pid=5650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.662000 audit[5650]: AVC avc: denied { bpf } for pid=5650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.662000 audit: BPF prog-id=206 op=LOAD Feb 9 09:50:52.662000 audit[5650]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2396 pid=5650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:52.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466366337373335636638373232396535366138656434376433373437 Feb 9 09:50:52.662000 audit: BPF prog-id=206 op=UNLOAD Feb 9 09:50:52.662000 audit: BPF prog-id=205 op=UNLOAD Feb 9 09:50:52.662000 audit[5650]: AVC avc: denied { bpf } for pid=5650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.662000 audit[5650]: AVC avc: denied { bpf } for pid=5650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.662000 audit[5650]: AVC avc: denied { bpf } for pid=5650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.662000 audit[5650]: AVC avc: denied { perfmon } for pid=5650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.662000 audit[5650]: AVC avc: denied { perfmon } for pid=5650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.662000 audit[5650]: AVC avc: denied { perfmon } for pid=5650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.662000 audit[5650]: AVC avc: denied { perfmon } for pid=5650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.662000 audit[5650]: AVC avc: denied { perfmon } for pid=5650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.662000 audit[5650]: AVC avc: denied { bpf } for pid=5650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.662000 audit[5650]: AVC avc: denied { bpf } for pid=5650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:50:52.662000 audit: BPF prog-id=207 op=LOAD Feb 9 09:50:52.662000 audit[5650]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2396 pid=5650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:50:52.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466366337373335636638373232396535366138656434376433373437 Feb 9 09:50:52.735395 env[1656]: time="2024-02-09T09:50:52.735306846Z" level=info msg="StartContainer for \"df6c7735cf87229e56a8ed47d37477d062a2e15de9b7996d1d617df076324fa8\" returns successfully" Feb 9 09:50:54.160065 systemd[1]: run-containerd-runc-k8s.io-95096d1d8f47b7f1eda8a74f8afe8c798ebb300335bd420f59440bac57e6738d-runc.QZGhHb.mount: Deactivated successfully. Feb 9 09:50:55.425531 kubelet[2771]: E0209 09:50:55.425488 2771 controller.go:193] "Failed to update lease" err="Put \"https://172.31.21.69:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-69?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)"