Feb 9 19:16:18.950835 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Feb 9 19:16:18.952887 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Feb 9 17:24:35 -00 2024 Feb 9 19:16:18.952915 kernel: efi: EFI v2.70 by EDK II Feb 9 19:16:18.952930 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7ac1aa98 MEMRESERVE=0x71a8cf98 Feb 9 19:16:18.952944 kernel: ACPI: Early table checksum verification disabled Feb 9 19:16:18.952958 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Feb 9 19:16:18.952974 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Feb 9 19:16:18.952988 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Feb 9 19:16:18.953002 kernel: ACPI: DSDT 0x0000000078640000 00154F (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Feb 9 19:16:18.953016 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Feb 9 19:16:18.953034 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Feb 9 19:16:18.953048 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Feb 9 19:16:18.953061 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Feb 9 19:16:18.953075 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Feb 9 19:16:18.953092 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Feb 9 19:16:18.953111 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Feb 9 19:16:18.953126 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Feb 9 19:16:18.953140 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Feb 9 19:16:18.953154 kernel: printk: bootconsole [uart0] enabled Feb 9 19:16:18.953169 kernel: NUMA: Failed to initialise from firmware Feb 9 19:16:18.953183 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Feb 9 19:16:18.953198 kernel: NUMA: NODE_DATA [mem 0x4b5841900-0x4b5846fff] Feb 9 19:16:18.953212 kernel: Zone ranges: Feb 9 19:16:18.953227 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Feb 9 19:16:18.953241 kernel: DMA32 empty Feb 9 19:16:18.953257 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Feb 9 19:16:18.953275 kernel: Movable zone start for each node Feb 9 19:16:18.953290 kernel: Early memory node ranges Feb 9 19:16:18.953304 kernel: node 0: [mem 0x0000000040000000-0x00000000786effff] Feb 9 19:16:18.953319 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Feb 9 19:16:18.953333 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Feb 9 19:16:18.953347 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Feb 9 19:16:18.953362 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Feb 9 19:16:18.953376 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Feb 9 19:16:18.953391 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Feb 9 19:16:18.953405 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Feb 9 19:16:18.953420 kernel: psci: probing for conduit method from ACPI. Feb 9 19:16:18.953434 kernel: psci: PSCIv1.0 detected in firmware. Feb 9 19:16:18.953453 kernel: psci: Using standard PSCI v0.2 function IDs Feb 9 19:16:18.953467 kernel: psci: Trusted OS migration not required Feb 9 19:16:18.953488 kernel: psci: SMC Calling Convention v1.1 Feb 9 19:16:18.953504 kernel: ACPI: SRAT not present Feb 9 19:16:18.953520 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 9 19:16:18.953559 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 9 19:16:18.953576 kernel: pcpu-alloc: [0] 0 [0] 1 Feb 9 19:16:18.953592 kernel: Detected PIPT I-cache on CPU0 Feb 9 19:16:18.953608 kernel: CPU features: detected: GIC system register CPU interface Feb 9 19:16:18.953623 kernel: CPU features: detected: Spectre-v2 Feb 9 19:16:18.953638 kernel: CPU features: detected: Spectre-v3a Feb 9 19:16:18.953653 kernel: CPU features: detected: Spectre-BHB Feb 9 19:16:18.953668 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 9 19:16:18.953684 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 9 19:16:18.953699 kernel: CPU features: detected: ARM erratum 1742098 Feb 9 19:16:18.953714 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Feb 9 19:16:18.953734 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Feb 9 19:16:18.953749 kernel: Policy zone: Normal Feb 9 19:16:18.953767 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=680ffc8c0dfb23738bd19ec96ea37b5bbadfb5cebf23767d1d52c89a6d5c00b4 Feb 9 19:16:18.953783 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 19:16:18.953798 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 19:16:18.953894 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 19:16:18.953913 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 19:16:18.953929 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Feb 9 19:16:18.953945 kernel: Memory: 3826316K/4030464K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 204148K reserved, 0K cma-reserved) Feb 9 19:16:18.953961 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 19:16:18.953981 kernel: trace event string verifier disabled Feb 9 19:16:18.953997 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 9 19:16:18.954013 kernel: rcu: RCU event tracing is enabled. Feb 9 19:16:18.954029 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 19:16:18.954045 kernel: Trampoline variant of Tasks RCU enabled. Feb 9 19:16:18.954061 kernel: Tracing variant of Tasks RCU enabled. Feb 9 19:16:18.954076 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 19:16:18.954092 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 19:16:18.954107 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 9 19:16:18.954122 kernel: GICv3: 96 SPIs implemented Feb 9 19:16:18.954137 kernel: GICv3: 0 Extended SPIs implemented Feb 9 19:16:18.954152 kernel: GICv3: Distributor has no Range Selector support Feb 9 19:16:18.954172 kernel: Root IRQ handler: gic_handle_irq Feb 9 19:16:18.954187 kernel: GICv3: 16 PPIs implemented Feb 9 19:16:18.954202 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Feb 9 19:16:18.954217 kernel: ACPI: SRAT not present Feb 9 19:16:18.954232 kernel: ITS [mem 0x10080000-0x1009ffff] Feb 9 19:16:18.954247 kernel: ITS@0x0000000010080000: allocated 8192 Devices @4000a0000 (indirect, esz 8, psz 64K, shr 1) Feb 9 19:16:18.954263 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000b0000 (flat, esz 8, psz 64K, shr 1) Feb 9 19:16:18.954278 kernel: GICv3: using LPI property table @0x00000004000c0000 Feb 9 19:16:18.954294 kernel: ITS: Using hypervisor restricted LPI range [128] Feb 9 19:16:18.954310 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Feb 9 19:16:18.954325 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Feb 9 19:16:18.954345 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Feb 9 19:16:18.954361 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Feb 9 19:16:18.954377 kernel: Console: colour dummy device 80x25 Feb 9 19:16:18.954392 kernel: printk: console [tty1] enabled Feb 9 19:16:18.954408 kernel: ACPI: Core revision 20210730 Feb 9 19:16:18.954424 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Feb 9 19:16:18.954440 kernel: pid_max: default: 32768 minimum: 301 Feb 9 19:16:18.954455 kernel: LSM: Security Framework initializing Feb 9 19:16:18.954471 kernel: SELinux: Initializing. Feb 9 19:16:18.954487 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 19:16:18.954507 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 19:16:18.954523 kernel: rcu: Hierarchical SRCU implementation. Feb 9 19:16:18.954538 kernel: Platform MSI: ITS@0x10080000 domain created Feb 9 19:16:18.954554 kernel: PCI/MSI: ITS@0x10080000 domain created Feb 9 19:16:18.954569 kernel: Remapping and enabling EFI services. Feb 9 19:16:18.954584 kernel: smp: Bringing up secondary CPUs ... Feb 9 19:16:18.954600 kernel: Detected PIPT I-cache on CPU1 Feb 9 19:16:18.954616 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Feb 9 19:16:18.954632 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Feb 9 19:16:18.954652 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Feb 9 19:16:18.954667 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 19:16:18.954683 kernel: SMP: Total of 2 processors activated. Feb 9 19:16:18.954698 kernel: CPU features: detected: 32-bit EL0 Support Feb 9 19:16:18.954714 kernel: CPU features: detected: 32-bit EL1 Support Feb 9 19:16:18.954729 kernel: CPU features: detected: CRC32 instructions Feb 9 19:16:18.954745 kernel: CPU: All CPU(s) started at EL1 Feb 9 19:16:18.954761 kernel: alternatives: patching kernel code Feb 9 19:16:18.954776 kernel: devtmpfs: initialized Feb 9 19:16:18.954796 kernel: KASLR disabled due to lack of seed Feb 9 19:16:18.954839 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 19:16:18.954859 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 19:16:18.954887 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 19:16:18.954908 kernel: SMBIOS 3.0.0 present. Feb 9 19:16:18.954924 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Feb 9 19:16:18.954941 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 19:16:18.954957 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 9 19:16:18.954973 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 9 19:16:18.954990 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 9 19:16:18.955006 kernel: audit: initializing netlink subsys (disabled) Feb 9 19:16:18.955023 kernel: audit: type=2000 audit(0.247:1): state=initialized audit_enabled=0 res=1 Feb 9 19:16:18.955044 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 19:16:18.955061 kernel: cpuidle: using governor menu Feb 9 19:16:18.955077 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 9 19:16:18.955093 kernel: ASID allocator initialised with 32768 entries Feb 9 19:16:18.955109 kernel: ACPI: bus type PCI registered Feb 9 19:16:18.955130 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 19:16:18.955146 kernel: Serial: AMBA PL011 UART driver Feb 9 19:16:18.955162 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 19:16:18.955179 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 9 19:16:18.955195 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 19:16:18.955211 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 9 19:16:18.955227 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 19:16:18.955244 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 9 19:16:18.955260 kernel: ACPI: Added _OSI(Module Device) Feb 9 19:16:18.955280 kernel: ACPI: Added _OSI(Processor Device) Feb 9 19:16:18.955297 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 19:16:18.955313 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 19:16:18.955329 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 19:16:18.955345 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 19:16:18.955361 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 19:16:18.955378 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 19:16:18.955394 kernel: ACPI: Interpreter enabled Feb 9 19:16:18.955410 kernel: ACPI: Using GIC for interrupt routing Feb 9 19:16:18.955430 kernel: ACPI: MCFG table detected, 1 entries Feb 9 19:16:18.955447 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Feb 9 19:16:18.955729 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 19:16:18.955961 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Feb 9 19:16:18.956160 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Feb 9 19:16:18.956355 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Feb 9 19:16:18.956550 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Feb 9 19:16:18.956577 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Feb 9 19:16:18.956595 kernel: acpiphp: Slot [1] registered Feb 9 19:16:18.956611 kernel: acpiphp: Slot [2] registered Feb 9 19:16:18.956627 kernel: acpiphp: Slot [3] registered Feb 9 19:16:18.956643 kernel: acpiphp: Slot [4] registered Feb 9 19:16:18.956659 kernel: acpiphp: Slot [5] registered Feb 9 19:16:18.956675 kernel: acpiphp: Slot [6] registered Feb 9 19:16:18.956691 kernel: acpiphp: Slot [7] registered Feb 9 19:16:18.956708 kernel: acpiphp: Slot [8] registered Feb 9 19:16:18.956728 kernel: acpiphp: Slot [9] registered Feb 9 19:16:18.956744 kernel: acpiphp: Slot [10] registered Feb 9 19:16:18.956760 kernel: acpiphp: Slot [11] registered Feb 9 19:16:18.956777 kernel: acpiphp: Slot [12] registered Feb 9 19:16:18.956793 kernel: acpiphp: Slot [13] registered Feb 9 19:16:18.956826 kernel: acpiphp: Slot [14] registered Feb 9 19:16:18.956845 kernel: acpiphp: Slot [15] registered Feb 9 19:16:18.956862 kernel: acpiphp: Slot [16] registered Feb 9 19:16:18.956878 kernel: acpiphp: Slot [17] registered Feb 9 19:16:18.956894 kernel: acpiphp: Slot [18] registered Feb 9 19:16:18.956915 kernel: acpiphp: Slot [19] registered Feb 9 19:16:18.956931 kernel: acpiphp: Slot [20] registered Feb 9 19:16:18.956947 kernel: acpiphp: Slot [21] registered Feb 9 19:16:18.956963 kernel: acpiphp: Slot [22] registered Feb 9 19:16:18.956979 kernel: acpiphp: Slot [23] registered Feb 9 19:16:18.956995 kernel: acpiphp: Slot [24] registered Feb 9 19:16:18.957012 kernel: acpiphp: Slot [25] registered Feb 9 19:16:18.957028 kernel: acpiphp: Slot [26] registered Feb 9 19:16:18.959879 kernel: acpiphp: Slot [27] registered Feb 9 19:16:18.959918 kernel: acpiphp: Slot [28] registered Feb 9 19:16:18.959936 kernel: acpiphp: Slot [29] registered Feb 9 19:16:18.959953 kernel: acpiphp: Slot [30] registered Feb 9 19:16:18.959970 kernel: acpiphp: Slot [31] registered Feb 9 19:16:18.959986 kernel: PCI host bridge to bus 0000:00 Feb 9 19:16:18.960218 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Feb 9 19:16:18.960404 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Feb 9 19:16:18.978962 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Feb 9 19:16:18.979179 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Feb 9 19:16:18.979405 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Feb 9 19:16:18.979624 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Feb 9 19:16:18.979848 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Feb 9 19:16:18.980069 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Feb 9 19:16:18.980272 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Feb 9 19:16:18.980477 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 19:16:18.980691 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Feb 9 19:16:18.980924 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Feb 9 19:16:18.981129 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Feb 9 19:16:18.981329 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Feb 9 19:16:18.981539 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 19:16:18.981749 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Feb 9 19:16:18.981979 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Feb 9 19:16:18.982189 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Feb 9 19:16:18.982392 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Feb 9 19:16:18.982599 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Feb 9 19:16:18.982785 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Feb 9 19:16:18.994285 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Feb 9 19:16:18.994487 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Feb 9 19:16:18.994518 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Feb 9 19:16:18.994537 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Feb 9 19:16:18.994554 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Feb 9 19:16:18.994571 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Feb 9 19:16:18.994587 kernel: iommu: Default domain type: Translated Feb 9 19:16:18.994604 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 9 19:16:18.994621 kernel: vgaarb: loaded Feb 9 19:16:18.994637 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 19:16:18.994654 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 19:16:18.994675 kernel: PTP clock support registered Feb 9 19:16:18.994691 kernel: Registered efivars operations Feb 9 19:16:18.994708 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 9 19:16:18.994724 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 19:16:18.994740 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 19:16:18.994757 kernel: pnp: PnP ACPI init Feb 9 19:16:18.994996 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Feb 9 19:16:18.995023 kernel: pnp: PnP ACPI: found 1 devices Feb 9 19:16:18.995041 kernel: NET: Registered PF_INET protocol family Feb 9 19:16:18.995063 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 19:16:18.995081 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 9 19:16:18.995098 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 19:16:18.995114 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 19:16:18.995131 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 9 19:16:18.995148 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 9 19:16:18.995164 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 19:16:18.995181 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 19:16:18.995197 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 19:16:18.995218 kernel: PCI: CLS 0 bytes, default 64 Feb 9 19:16:18.995235 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Feb 9 19:16:18.995251 kernel: kvm [1]: HYP mode not available Feb 9 19:16:18.995267 kernel: Initialise system trusted keyrings Feb 9 19:16:18.995284 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 9 19:16:18.995300 kernel: Key type asymmetric registered Feb 9 19:16:18.995316 kernel: Asymmetric key parser 'x509' registered Feb 9 19:16:18.995333 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 19:16:18.995349 kernel: io scheduler mq-deadline registered Feb 9 19:16:18.995370 kernel: io scheduler kyber registered Feb 9 19:16:18.995387 kernel: io scheduler bfq registered Feb 9 19:16:18.995587 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Feb 9 19:16:18.995612 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Feb 9 19:16:18.995629 kernel: ACPI: button: Power Button [PWRB] Feb 9 19:16:18.995645 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 19:16:18.995663 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Feb 9 19:16:18.995885 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Feb 9 19:16:18.995916 kernel: printk: console [ttyS0] disabled Feb 9 19:16:18.995934 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Feb 9 19:16:18.995951 kernel: printk: console [ttyS0] enabled Feb 9 19:16:18.995967 kernel: printk: bootconsole [uart0] disabled Feb 9 19:16:18.995984 kernel: thunder_xcv, ver 1.0 Feb 9 19:16:18.996000 kernel: thunder_bgx, ver 1.0 Feb 9 19:16:18.996016 kernel: nicpf, ver 1.0 Feb 9 19:16:18.996032 kernel: nicvf, ver 1.0 Feb 9 19:16:18.996239 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 9 19:16:18.996436 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-09T19:16:18 UTC (1707506178) Feb 9 19:16:18.996460 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 19:16:18.996477 kernel: NET: Registered PF_INET6 protocol family Feb 9 19:16:18.996494 kernel: Segment Routing with IPv6 Feb 9 19:16:18.996511 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 19:16:18.996527 kernel: NET: Registered PF_PACKET protocol family Feb 9 19:16:18.996544 kernel: Key type dns_resolver registered Feb 9 19:16:18.996560 kernel: registered taskstats version 1 Feb 9 19:16:18.996581 kernel: Loading compiled-in X.509 certificates Feb 9 19:16:18.996598 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 947a80114e81e2815f6db72a0d388260762488f9' Feb 9 19:16:18.996614 kernel: Key type .fscrypt registered Feb 9 19:16:18.996630 kernel: Key type fscrypt-provisioning registered Feb 9 19:16:18.996647 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 19:16:18.996663 kernel: ima: Allocated hash algorithm: sha1 Feb 9 19:16:18.996679 kernel: ima: No architecture policies found Feb 9 19:16:18.996696 kernel: Freeing unused kernel memory: 34688K Feb 9 19:16:18.996712 kernel: Run /init as init process Feb 9 19:16:18.996733 kernel: with arguments: Feb 9 19:16:18.996750 kernel: /init Feb 9 19:16:18.996766 kernel: with environment: Feb 9 19:16:18.996781 kernel: HOME=/ Feb 9 19:16:18.996798 kernel: TERM=linux Feb 9 19:16:18.996837 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 19:16:18.996860 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:16:18.996881 systemd[1]: Detected virtualization amazon. Feb 9 19:16:18.996905 systemd[1]: Detected architecture arm64. Feb 9 19:16:18.996922 systemd[1]: Running in initrd. Feb 9 19:16:18.996940 systemd[1]: No hostname configured, using default hostname. Feb 9 19:16:18.996957 systemd[1]: Hostname set to . Feb 9 19:16:18.996976 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:16:18.996993 systemd[1]: Queued start job for default target initrd.target. Feb 9 19:16:18.997011 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:16:18.997028 systemd[1]: Reached target cryptsetup.target. Feb 9 19:16:18.997050 systemd[1]: Reached target paths.target. Feb 9 19:16:18.997067 systemd[1]: Reached target slices.target. Feb 9 19:16:18.997085 systemd[1]: Reached target swap.target. Feb 9 19:16:18.997102 systemd[1]: Reached target timers.target. Feb 9 19:16:18.997120 systemd[1]: Listening on iscsid.socket. Feb 9 19:16:18.997138 systemd[1]: Listening on iscsiuio.socket. Feb 9 19:16:18.997156 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 19:16:18.997173 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 19:16:18.997196 systemd[1]: Listening on systemd-journald.socket. Feb 9 19:16:18.997214 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:16:18.997231 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:16:18.997249 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:16:18.997266 systemd[1]: Reached target sockets.target. Feb 9 19:16:18.997284 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:16:18.997302 systemd[1]: Finished network-cleanup.service. Feb 9 19:16:18.997319 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 19:16:18.997337 systemd[1]: Starting systemd-journald.service... Feb 9 19:16:18.997359 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:16:18.997377 systemd[1]: Starting systemd-resolved.service... Feb 9 19:16:18.997394 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 19:16:18.997412 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:16:18.997430 kernel: audit: type=1130 audit(1707506178.962:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:18.997447 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 19:16:18.997465 kernel: audit: type=1130 audit(1707506178.985:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:18.997482 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 19:16:18.997506 systemd-journald[308]: Journal started Feb 9 19:16:18.997605 systemd-journald[308]: Runtime Journal (/run/log/journal/ec2aa5bf7691f1a84ae98494ab46e977) is 8.0M, max 75.4M, 67.4M free. Feb 9 19:16:18.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:18.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:18.950967 systemd-modules-load[309]: Inserted module 'overlay' Feb 9 19:16:19.012835 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 19:16:19.018428 systemd-modules-load[309]: Inserted module 'br_netfilter' Feb 9 19:16:19.022422 kernel: Bridge firewalling registered Feb 9 19:16:19.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:19.031797 kernel: audit: type=1130 audit(1707506179.020:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:19.031851 systemd[1]: Started systemd-journald.service. Feb 9 19:16:19.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:19.055846 kernel: audit: type=1130 audit(1707506179.044:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:19.055911 kernel: SCSI subsystem initialized Feb 9 19:16:19.063256 systemd-resolved[310]: Positive Trust Anchors: Feb 9 19:16:19.063285 systemd-resolved[310]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:16:19.063341 systemd-resolved[310]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:16:19.068314 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 19:16:19.078404 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 19:16:19.078448 kernel: device-mapper: uevent: version 1.0.3 Feb 9 19:16:19.082234 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 19:16:19.115232 systemd-modules-load[309]: Inserted module 'dm_multipath' Feb 9 19:16:19.120082 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:16:19.131318 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:16:19.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:19.144514 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:16:19.155220 kernel: audit: type=1130 audit(1707506179.138:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:19.173319 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:16:19.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:19.189467 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 19:16:19.197062 kernel: audit: type=1130 audit(1707506179.179:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:19.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:19.197392 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:16:19.209866 kernel: audit: type=1130 audit(1707506179.195:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:19.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:19.211352 systemd[1]: Starting dracut-cmdline.service... Feb 9 19:16:19.223937 kernel: audit: type=1130 audit(1707506179.208:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:19.237334 dracut-cmdline[331]: dracut-dracut-053 Feb 9 19:16:19.243249 dracut-cmdline[331]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=680ffc8c0dfb23738bd19ec96ea37b5bbadfb5cebf23767d1d52c89a6d5c00b4 Feb 9 19:16:19.360833 kernel: Loading iSCSI transport class v2.0-870. Feb 9 19:16:19.371842 kernel: iscsi: registered transport (tcp) Feb 9 19:16:19.394840 kernel: iscsi: registered transport (qla4xxx) Feb 9 19:16:19.396837 kernel: QLogic iSCSI HBA Driver Feb 9 19:16:19.561323 systemd-resolved[310]: Defaulting to hostname 'linux'. Feb 9 19:16:19.564097 kernel: random: crng init done Feb 9 19:16:19.564389 systemd[1]: Started systemd-resolved.service. Feb 9 19:16:19.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:19.567461 systemd[1]: Reached target nss-lookup.target. Feb 9 19:16:19.577838 kernel: audit: type=1130 audit(1707506179.565:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:19.588846 systemd[1]: Finished dracut-cmdline.service. Feb 9 19:16:19.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:19.593421 systemd[1]: Starting dracut-pre-udev.service... Feb 9 19:16:19.660850 kernel: raid6: neonx8 gen() 6216 MB/s Feb 9 19:16:19.676830 kernel: raid6: neonx8 xor() 4729 MB/s Feb 9 19:16:19.694837 kernel: raid6: neonx4 gen() 6612 MB/s Feb 9 19:16:19.712830 kernel: raid6: neonx4 xor() 4931 MB/s Feb 9 19:16:19.730830 kernel: raid6: neonx2 gen() 5797 MB/s Feb 9 19:16:19.748834 kernel: raid6: neonx2 xor() 4546 MB/s Feb 9 19:16:19.766829 kernel: raid6: neonx1 gen() 4510 MB/s Feb 9 19:16:19.784831 kernel: raid6: neonx1 xor() 3692 MB/s Feb 9 19:16:19.802837 kernel: raid6: int64x8 gen() 3432 MB/s Feb 9 19:16:19.820836 kernel: raid6: int64x8 xor() 2089 MB/s Feb 9 19:16:19.838837 kernel: raid6: int64x4 gen() 3851 MB/s Feb 9 19:16:19.856837 kernel: raid6: int64x4 xor() 2200 MB/s Feb 9 19:16:19.874837 kernel: raid6: int64x2 gen() 3625 MB/s Feb 9 19:16:19.892837 kernel: raid6: int64x2 xor() 1954 MB/s Feb 9 19:16:19.910837 kernel: raid6: int64x1 gen() 2774 MB/s Feb 9 19:16:19.930327 kernel: raid6: int64x1 xor() 1453 MB/s Feb 9 19:16:19.930356 kernel: raid6: using algorithm neonx4 gen() 6612 MB/s Feb 9 19:16:19.930380 kernel: raid6: .... xor() 4931 MB/s, rmw enabled Feb 9 19:16:19.932132 kernel: raid6: using neon recovery algorithm Feb 9 19:16:19.950844 kernel: xor: measuring software checksum speed Feb 9 19:16:19.952841 kernel: 8regs : 9332 MB/sec Feb 9 19:16:19.955837 kernel: 32regs : 11108 MB/sec Feb 9 19:16:19.959691 kernel: arm64_neon : 9658 MB/sec Feb 9 19:16:19.959723 kernel: xor: using function: 32regs (11108 MB/sec) Feb 9 19:16:20.049858 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 9 19:16:20.066473 systemd[1]: Finished dracut-pre-udev.service. Feb 9 19:16:20.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.068000 audit: BPF prog-id=7 op=LOAD Feb 9 19:16:20.068000 audit: BPF prog-id=8 op=LOAD Feb 9 19:16:20.071036 systemd[1]: Starting systemd-udevd.service... Feb 9 19:16:20.098511 systemd-udevd[508]: Using default interface naming scheme 'v252'. Feb 9 19:16:20.108540 systemd[1]: Started systemd-udevd.service. Feb 9 19:16:20.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.117880 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 19:16:20.144025 dracut-pre-trigger[518]: rd.md=0: removing MD RAID activation Feb 9 19:16:20.203333 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 19:16:20.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.207868 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:16:20.313433 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:16:20.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:20.440419 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Feb 9 19:16:20.440500 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Feb 9 19:16:20.451542 kernel: ena 0000:00:05.0: ENA device version: 0.10 Feb 9 19:16:20.451931 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Feb 9 19:16:20.454836 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Feb 9 19:16:20.456837 kernel: nvme nvme0: pci function 0000:00:04.0 Feb 9 19:16:20.457134 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:51:6b:1e:34:fb Feb 9 19:16:20.469853 kernel: nvme nvme0: 2/0/0 default/read/poll queues Feb 9 19:16:20.475517 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 19:16:20.475551 kernel: GPT:9289727 != 16777215 Feb 9 19:16:20.475575 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 19:16:20.477702 kernel: GPT:9289727 != 16777215 Feb 9 19:16:20.479006 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 19:16:20.482306 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 19:16:20.485611 (udev-worker)[560]: Network interface NamePolicy= disabled on kernel command line. Feb 9 19:16:20.549854 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (564) Feb 9 19:16:20.574376 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 19:16:20.660097 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:16:20.674271 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 19:16:20.695258 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 19:16:20.695419 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 19:16:20.704661 systemd[1]: Starting disk-uuid.service... Feb 9 19:16:20.720522 disk-uuid[665]: Primary Header is updated. Feb 9 19:16:20.720522 disk-uuid[665]: Secondary Entries is updated. Feb 9 19:16:20.720522 disk-uuid[665]: Secondary Header is updated. Feb 9 19:16:20.730858 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 19:16:20.738830 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 19:16:21.736350 disk-uuid[666]: The operation has completed successfully. Feb 9 19:16:21.738970 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 9 19:16:21.910160 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 19:16:21.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:21.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:21.910370 systemd[1]: Finished disk-uuid.service. Feb 9 19:16:21.913957 systemd[1]: Starting verity-setup.service... Feb 9 19:16:21.951853 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 9 19:16:22.020367 systemd[1]: Found device dev-mapper-usr.device. Feb 9 19:16:22.025233 systemd[1]: Mounting sysusr-usr.mount... Feb 9 19:16:22.029205 systemd[1]: Finished verity-setup.service. Feb 9 19:16:22.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:22.113844 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 19:16:22.114409 systemd[1]: Mounted sysusr-usr.mount. Feb 9 19:16:22.117609 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 19:16:22.124061 systemd[1]: Starting ignition-setup.service... Feb 9 19:16:22.128678 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 19:16:22.155275 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Feb 9 19:16:22.155338 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 9 19:16:22.157507 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 9 19:16:22.164849 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 9 19:16:22.181391 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 19:16:22.214332 systemd[1]: Finished ignition-setup.service. Feb 9 19:16:22.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:22.218299 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 19:16:22.281116 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 19:16:22.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:22.282000 audit: BPF prog-id=9 op=LOAD Feb 9 19:16:22.285060 systemd[1]: Starting systemd-networkd.service... Feb 9 19:16:22.338580 systemd-networkd[1094]: lo: Link UP Feb 9 19:16:22.338602 systemd-networkd[1094]: lo: Gained carrier Feb 9 19:16:22.342199 systemd-networkd[1094]: Enumeration completed Feb 9 19:16:22.342652 systemd-networkd[1094]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:16:22.343190 systemd[1]: Started systemd-networkd.service. Feb 9 19:16:22.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:22.349410 systemd[1]: Reached target network.target. Feb 9 19:16:22.353011 systemd[1]: Starting iscsiuio.service... Feb 9 19:16:22.358390 systemd-networkd[1094]: eth0: Link UP Feb 9 19:16:22.358399 systemd-networkd[1094]: eth0: Gained carrier Feb 9 19:16:22.369799 systemd[1]: Started iscsiuio.service. Feb 9 19:16:22.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:22.372696 systemd[1]: Starting iscsid.service... Feb 9 19:16:22.384464 systemd[1]: Started iscsid.service. Feb 9 19:16:22.386871 iscsid[1100]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:16:22.386871 iscsid[1100]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 19:16:22.386871 iscsid[1100]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 19:16:22.386871 iscsid[1100]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 19:16:22.386871 iscsid[1100]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 19:16:22.386871 iscsid[1100]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:16:22.386871 iscsid[1100]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 19:16:22.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:22.422245 systemd[1]: Starting dracut-initqueue.service... Feb 9 19:16:22.442139 systemd-networkd[1094]: eth0: DHCPv4 address 172.31.31.30/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 9 19:16:22.452786 systemd[1]: Finished dracut-initqueue.service. Feb 9 19:16:22.456626 systemd[1]: Reached target remote-fs-pre.target. Feb 9 19:16:22.459955 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:16:22.463419 systemd[1]: Reached target remote-fs.target. Feb 9 19:16:22.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:22.469471 systemd[1]: Starting dracut-pre-mount.service... Feb 9 19:16:22.489289 systemd[1]: Finished dracut-pre-mount.service. Feb 9 19:16:22.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:22.762618 ignition[1042]: Ignition 2.14.0 Feb 9 19:16:22.763167 ignition[1042]: Stage: fetch-offline Feb 9 19:16:22.763486 ignition[1042]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:16:22.763551 ignition[1042]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 19:16:22.783157 ignition[1042]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 19:16:22.785781 ignition[1042]: Ignition finished successfully Feb 9 19:16:22.788779 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 19:16:22.799020 kernel: kauditd_printk_skb: 18 callbacks suppressed Feb 9 19:16:22.799090 kernel: audit: type=1130 audit(1707506182.791:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:22.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:22.793490 systemd[1]: Starting ignition-fetch.service... Feb 9 19:16:22.812527 ignition[1119]: Ignition 2.14.0 Feb 9 19:16:22.814185 ignition[1119]: Stage: fetch Feb 9 19:16:22.824702 ignition[1119]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:16:22.826925 ignition[1119]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 19:16:22.838226 ignition[1119]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 19:16:22.840480 ignition[1119]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 19:16:22.847525 ignition[1119]: INFO : PUT result: OK Feb 9 19:16:22.850629 ignition[1119]: DEBUG : parsed url from cmdline: "" Feb 9 19:16:22.854487 ignition[1119]: INFO : no config URL provided Feb 9 19:16:22.854487 ignition[1119]: INFO : reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:16:22.854487 ignition[1119]: INFO : no config at "/usr/lib/ignition/user.ign" Feb 9 19:16:22.854487 ignition[1119]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 19:16:22.865850 ignition[1119]: INFO : PUT result: OK Feb 9 19:16:22.865850 ignition[1119]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Feb 9 19:16:22.869663 ignition[1119]: INFO : GET result: OK Feb 9 19:16:22.871345 ignition[1119]: DEBUG : parsing config with SHA512: 01e1f1c12c2dd319116a3cbfbea8d1dc0cd3a3d5967877832fe57c633cd21935bef9f7d1a06ae1e509582a0a876de7989ff67ecdcc342fc7ecec948d8be25f29 Feb 9 19:16:22.937997 unknown[1119]: fetched base config from "system" Feb 9 19:16:22.938241 unknown[1119]: fetched base config from "system" Feb 9 19:16:22.939644 ignition[1119]: fetch: fetch complete Feb 9 19:16:22.938257 unknown[1119]: fetched user config from "aws" Feb 9 19:16:22.939657 ignition[1119]: fetch: fetch passed Feb 9 19:16:22.939744 ignition[1119]: Ignition finished successfully Feb 9 19:16:22.950070 systemd[1]: Finished ignition-fetch.service. Feb 9 19:16:22.973689 kernel: audit: type=1130 audit(1707506182.949:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:22.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:22.963031 systemd[1]: Starting ignition-kargs.service... Feb 9 19:16:22.989467 ignition[1125]: Ignition 2.14.0 Feb 9 19:16:22.991118 ignition[1125]: Stage: kargs Feb 9 19:16:22.992567 ignition[1125]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:16:22.994841 ignition[1125]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 19:16:23.005503 ignition[1125]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 19:16:23.007869 ignition[1125]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 19:16:23.010428 ignition[1125]: INFO : PUT result: OK Feb 9 19:16:23.017339 ignition[1125]: kargs: kargs passed Feb 9 19:16:23.017676 ignition[1125]: Ignition finished successfully Feb 9 19:16:23.021921 systemd[1]: Finished ignition-kargs.service. Feb 9 19:16:23.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:23.032441 systemd[1]: Starting ignition-disks.service... Feb 9 19:16:23.035840 kernel: audit: type=1130 audit(1707506183.020:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:23.047778 ignition[1131]: Ignition 2.14.0 Feb 9 19:16:23.049329 ignition[1131]: Stage: disks Feb 9 19:16:23.050672 ignition[1131]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:16:23.050750 ignition[1131]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 19:16:23.063673 ignition[1131]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 19:16:23.065912 ignition[1131]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 19:16:23.068930 ignition[1131]: INFO : PUT result: OK Feb 9 19:16:23.074472 ignition[1131]: disks: disks passed Feb 9 19:16:23.074581 ignition[1131]: Ignition finished successfully Feb 9 19:16:23.080428 systemd[1]: Finished ignition-disks.service. Feb 9 19:16:23.083646 systemd[1]: Reached target initrd-root-device.target. Feb 9 19:16:23.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:23.088603 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:16:23.115179 kernel: audit: type=1130 audit(1707506183.081:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:23.090281 systemd[1]: Reached target local-fs.target. Feb 9 19:16:23.098919 systemd[1]: Reached target sysinit.target. Feb 9 19:16:23.100425 systemd[1]: Reached target basic.target. Feb 9 19:16:23.114547 systemd[1]: Starting systemd-fsck-root.service... Feb 9 19:16:23.154340 systemd-fsck[1139]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 9 19:16:23.162580 systemd[1]: Finished systemd-fsck-root.service. Feb 9 19:16:23.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:23.165766 systemd[1]: Mounting sysroot.mount... Feb 9 19:16:23.175516 kernel: audit: type=1130 audit(1707506183.160:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:23.186851 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 19:16:23.188412 systemd[1]: Mounted sysroot.mount. Feb 9 19:16:23.193915 systemd[1]: Reached target initrd-root-fs.target. Feb 9 19:16:23.199094 systemd[1]: Mounting sysroot-usr.mount... Feb 9 19:16:23.206088 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 9 19:16:23.207353 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 19:16:23.207414 systemd[1]: Reached target ignition-diskful.target. Feb 9 19:16:23.218713 systemd[1]: Mounted sysroot-usr.mount. Feb 9 19:16:23.231671 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:16:23.236518 systemd[1]: Starting initrd-setup-root.service... Feb 9 19:16:23.257832 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1156) Feb 9 19:16:23.259021 initrd-setup-root[1161]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 19:16:23.267232 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Feb 9 19:16:23.267305 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 9 19:16:23.269998 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 9 19:16:23.276850 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 9 19:16:23.281049 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:16:23.286856 initrd-setup-root[1187]: cut: /sysroot/etc/group: No such file or directory Feb 9 19:16:23.295029 initrd-setup-root[1195]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 19:16:23.303601 initrd-setup-root[1203]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 19:16:23.521692 systemd[1]: Finished initrd-setup-root.service. Feb 9 19:16:23.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:23.526102 systemd[1]: Starting ignition-mount.service... Feb 9 19:16:23.535570 kernel: audit: type=1130 audit(1707506183.523:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:23.536300 systemd[1]: Starting sysroot-boot.service... Feb 9 19:16:23.550389 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 19:16:23.550619 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 19:16:23.575994 systemd-networkd[1094]: eth0: Gained IPv6LL Feb 9 19:16:23.579849 systemd[1]: Finished sysroot-boot.service. Feb 9 19:16:23.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:23.590846 kernel: audit: type=1130 audit(1707506183.582:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:23.598015 ignition[1224]: INFO : Ignition 2.14.0 Feb 9 19:16:23.599872 ignition[1224]: INFO : Stage: mount Feb 9 19:16:23.601567 ignition[1224]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:16:23.604014 ignition[1224]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 19:16:23.618025 ignition[1224]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 19:16:23.621164 ignition[1224]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 19:16:23.623741 ignition[1224]: INFO : PUT result: OK Feb 9 19:16:23.628938 ignition[1224]: INFO : mount: mount passed Feb 9 19:16:23.630847 ignition[1224]: INFO : Ignition finished successfully Feb 9 19:16:23.633613 systemd[1]: Finished ignition-mount.service. Feb 9 19:16:23.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:23.645117 systemd[1]: Starting ignition-files.service... Feb 9 19:16:23.651846 kernel: audit: type=1130 audit(1707506183.634:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:23.659547 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:16:23.678048 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1231) Feb 9 19:16:23.683476 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Feb 9 19:16:23.683509 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 9 19:16:23.683533 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 9 19:16:23.692847 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 9 19:16:23.697219 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:16:23.715171 ignition[1250]: INFO : Ignition 2.14.0 Feb 9 19:16:23.715171 ignition[1250]: INFO : Stage: files Feb 9 19:16:23.718437 ignition[1250]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:16:23.718437 ignition[1250]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 19:16:23.735134 ignition[1250]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 19:16:23.738067 ignition[1250]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 19:16:23.740751 ignition[1250]: INFO : PUT result: OK Feb 9 19:16:23.746134 ignition[1250]: DEBUG : files: compiled without relabeling support, skipping Feb 9 19:16:23.750075 ignition[1250]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 19:16:23.750075 ignition[1250]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 19:16:23.798697 ignition[1250]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 19:16:23.803995 ignition[1250]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 19:16:23.807245 unknown[1250]: wrote ssh authorized keys file for user: core Feb 9 19:16:23.809494 ignition[1250]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 19:16:23.813111 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 9 19:16:23.817036 ignition[1250]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Feb 9 19:16:24.278725 ignition[1250]: INFO : GET result: OK Feb 9 19:16:24.811328 ignition[1250]: DEBUG : file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Feb 9 19:16:24.816712 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 9 19:16:24.816712 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 19:16:24.816712 ignition[1250]: INFO : GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Feb 9 19:16:24.887913 ignition[1250]: INFO : GET result: OK Feb 9 19:16:24.984662 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 19:16:24.988506 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 9 19:16:24.988506 ignition[1250]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Feb 9 19:16:25.376870 ignition[1250]: INFO : GET result: OK Feb 9 19:16:25.643274 ignition[1250]: DEBUG : file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Feb 9 19:16:25.647771 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 9 19:16:25.651874 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 19:16:25.655216 ignition[1250]: INFO : GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubectl: attempt #1 Feb 9 19:16:25.780154 ignition[1250]: INFO : GET result: OK Feb 9 19:16:26.436329 ignition[1250]: DEBUG : file matches expected sum of: 6a5c9c02a29126949f096415bb1761a0c0ad44168e2ab3d0409982701da58f96223bec354828ddf958e945ef1ce63c0ad41e77cbcbcce0756163e71b4fbae432 Feb 9 19:16:26.441719 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 19:16:26.441719 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 9 19:16:26.441719 ignition[1250]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:16:26.462883 ignition[1250]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1641292481" Feb 9 19:16:26.469620 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1252) Feb 9 19:16:26.469656 ignition[1250]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1641292481": device or resource busy Feb 9 19:16:26.469656 ignition[1250]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1641292481", trying btrfs: device or resource busy Feb 9 19:16:26.469656 ignition[1250]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1641292481" Feb 9 19:16:26.469656 ignition[1250]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1641292481" Feb 9 19:16:26.487015 ignition[1250]: INFO : op(3): [started] unmounting "/mnt/oem1641292481" Feb 9 19:16:26.489284 ignition[1250]: INFO : op(3): [finished] unmounting "/mnt/oem1641292481" Feb 9 19:16:26.489284 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 9 19:16:26.489284 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:16:26.497974 ignition[1250]: INFO : GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubeadm: attempt #1 Feb 9 19:16:26.493266 systemd[1]: mnt-oem1641292481.mount: Deactivated successfully. Feb 9 19:16:26.557833 ignition[1250]: INFO : GET result: OK Feb 9 19:16:27.190615 ignition[1250]: DEBUG : file matches expected sum of: 5a08b81f9cc82d3cce21130856ca63b8dafca9149d9775dd25b376eb0f18209aa0e4a47c0a6d7e6fb1316aacd5d59dec770f26c09120c866949d70bc415518b3 Feb 9 19:16:27.195472 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:16:27.195472 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:16:27.195472 ignition[1250]: INFO : GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubelet: attempt #1 Feb 9 19:16:27.255755 ignition[1250]: INFO : GET result: OK Feb 9 19:16:28.503747 ignition[1250]: DEBUG : file matches expected sum of: 5a898ef543a6482895101ea58e33602e3c0a7682d322aaf08ac3dc8a5a3c8da8f09600d577024549288f8cebb1a86f9c79927796b69a3d8fe989ca8f12b147d6 Feb 9 19:16:28.508627 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:16:28.508627 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:16:28.508627 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:16:28.508627 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" Feb 9 19:16:28.508627 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 19:16:28.508627 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 19:16:28.508627 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 19:16:28.508627 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 19:16:28.508627 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 19:16:28.508627 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 19:16:28.508627 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 19:16:28.508627 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:16:28.508627 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:16:28.590025 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 19:16:28.590025 ignition[1250]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:16:28.590025 ignition[1250]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3349085119" Feb 9 19:16:28.590025 ignition[1250]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3349085119": device or resource busy Feb 9 19:16:28.590025 ignition[1250]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3349085119", trying btrfs: device or resource busy Feb 9 19:16:28.590025 ignition[1250]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3349085119" Feb 9 19:16:28.590025 ignition[1250]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3349085119" Feb 9 19:16:28.590025 ignition[1250]: INFO : op(6): [started] unmounting "/mnt/oem3349085119" Feb 9 19:16:28.590025 ignition[1250]: INFO : op(6): [finished] unmounting "/mnt/oem3349085119" Feb 9 19:16:28.590025 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 19:16:28.590025 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 9 19:16:28.590025 ignition[1250]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:16:28.590025 ignition[1250]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1987134931" Feb 9 19:16:28.590025 ignition[1250]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1987134931": device or resource busy Feb 9 19:16:28.590025 ignition[1250]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1987134931", trying btrfs: device or resource busy Feb 9 19:16:28.590025 ignition[1250]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1987134931" Feb 9 19:16:28.590025 ignition[1250]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1987134931" Feb 9 19:16:28.590025 ignition[1250]: INFO : op(9): [started] unmounting "/mnt/oem1987134931" Feb 9 19:16:28.590025 ignition[1250]: INFO : op(9): [finished] unmounting "/mnt/oem1987134931" Feb 9 19:16:28.590025 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 9 19:16:28.646392 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 9 19:16:28.646392 ignition[1250]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:16:28.646392 ignition[1250]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem520551629" Feb 9 19:16:28.646392 ignition[1250]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem520551629": device or resource busy Feb 9 19:16:28.646392 ignition[1250]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem520551629", trying btrfs: device or resource busy Feb 9 19:16:28.646392 ignition[1250]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem520551629" Feb 9 19:16:28.646392 ignition[1250]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem520551629" Feb 9 19:16:28.646392 ignition[1250]: INFO : op(c): [started] unmounting "/mnt/oem520551629" Feb 9 19:16:28.646392 ignition[1250]: INFO : op(c): [finished] unmounting "/mnt/oem520551629" Feb 9 19:16:28.646392 ignition[1250]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 9 19:16:28.646392 ignition[1250]: INFO : files: op(13): [started] processing unit "nvidia.service" Feb 9 19:16:28.646392 ignition[1250]: INFO : files: op(13): [finished] processing unit "nvidia.service" Feb 9 19:16:28.646392 ignition[1250]: INFO : files: op(14): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 19:16:28.646392 ignition[1250]: INFO : files: op(14): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 19:16:28.646392 ignition[1250]: INFO : files: op(15): [started] processing unit "amazon-ssm-agent.service" Feb 9 19:16:28.646392 ignition[1250]: INFO : files: op(15): op(16): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 9 19:16:28.646392 ignition[1250]: INFO : files: op(15): op(16): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 9 19:16:28.646392 ignition[1250]: INFO : files: op(15): [finished] processing unit "amazon-ssm-agent.service" Feb 9 19:16:28.646392 ignition[1250]: INFO : files: op(17): [started] processing unit "prepare-critools.service" Feb 9 19:16:28.646392 ignition[1250]: INFO : files: op(17): op(18): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:16:28.702820 ignition[1250]: INFO : files: op(17): op(18): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:16:28.702820 ignition[1250]: INFO : files: op(17): [finished] processing unit "prepare-critools.service" Feb 9 19:16:28.702820 ignition[1250]: INFO : files: op(19): [started] processing unit "prepare-helm.service" Feb 9 19:16:28.702820 ignition[1250]: INFO : files: op(19): op(1a): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 19:16:28.702820 ignition[1250]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 19:16:28.702820 ignition[1250]: INFO : files: op(19): [finished] processing unit "prepare-helm.service" Feb 9 19:16:28.702820 ignition[1250]: INFO : files: op(1b): [started] processing unit "prepare-cni-plugins.service" Feb 9 19:16:28.702820 ignition[1250]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:16:28.702820 ignition[1250]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:16:28.702820 ignition[1250]: INFO : files: op(1b): [finished] processing unit "prepare-cni-plugins.service" Feb 9 19:16:28.702820 ignition[1250]: INFO : files: op(1d): [started] setting preset to enabled for "nvidia.service" Feb 9 19:16:28.702820 ignition[1250]: INFO : files: op(1d): [finished] setting preset to enabled for "nvidia.service" Feb 9 19:16:28.702820 ignition[1250]: INFO : files: op(1e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 19:16:28.702820 ignition[1250]: INFO : files: op(1e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 19:16:28.702820 ignition[1250]: INFO : files: op(1f): [started] setting preset to enabled for "amazon-ssm-agent.service" Feb 9 19:16:28.702820 ignition[1250]: INFO : files: op(1f): [finished] setting preset to enabled for "amazon-ssm-agent.service" Feb 9 19:16:28.702820 ignition[1250]: INFO : files: op(20): [started] setting preset to enabled for "prepare-critools.service" Feb 9 19:16:28.702820 ignition[1250]: INFO : files: op(20): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 19:16:28.702820 ignition[1250]: INFO : files: op(21): [started] setting preset to enabled for "prepare-helm.service" Feb 9 19:16:28.702820 ignition[1250]: INFO : files: op(21): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 19:16:28.820708 kernel: audit: type=1130 audit(1707506188.745:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:28.820762 kernel: audit: type=1130 audit(1707506188.800:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:28.820789 kernel: audit: type=1131 audit(1707506188.800:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:28.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:28.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:28.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:28.821055 ignition[1250]: INFO : files: op(22): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:16:28.821055 ignition[1250]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:16:28.821055 ignition[1250]: INFO : files: createResultFile: createFiles: op(23): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:16:28.821055 ignition[1250]: INFO : files: createResultFile: createFiles: op(23): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:16:28.821055 ignition[1250]: INFO : files: files passed Feb 9 19:16:28.821055 ignition[1250]: INFO : Ignition finished successfully Feb 9 19:16:28.862543 kernel: audit: type=1130 audit(1707506188.824:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:28.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:28.734823 systemd[1]: Finished ignition-files.service. Feb 9 19:16:28.757909 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 19:16:28.866982 initrd-setup-root-after-ignition[1275]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 19:16:28.788149 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 19:16:28.789716 systemd[1]: Starting ignition-quench.service... Feb 9 19:16:28.797401 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 19:16:28.797634 systemd[1]: Finished ignition-quench.service. Feb 9 19:16:28.821572 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 19:16:28.825907 systemd[1]: Reached target ignition-complete.target. Feb 9 19:16:28.853795 systemd[1]: Starting initrd-parse-etc.service... Feb 9 19:16:28.911770 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 19:16:28.913748 systemd[1]: Finished initrd-parse-etc.service. Feb 9 19:16:28.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:28.917025 systemd[1]: Reached target initrd-fs.target. Feb 9 19:16:28.934020 kernel: audit: type=1130 audit(1707506188.915:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:28.934058 kernel: audit: type=1131 audit(1707506188.915:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:28.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:28.934052 systemd[1]: Reached target initrd.target. Feb 9 19:16:28.935614 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 19:16:28.937077 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 19:16:28.961278 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 19:16:28.979108 kernel: audit: type=1130 audit(1707506188.959:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:28.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:28.971256 systemd[1]: Starting initrd-cleanup.service... Feb 9 19:16:28.996699 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 19:16:28.997407 systemd[1]: Finished initrd-cleanup.service. Feb 9 19:16:29.017916 kernel: audit: type=1130 audit(1707506188.997:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.022713 kernel: audit: type=1131 audit(1707506188.997:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:28.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:28.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.007744 systemd[1]: Stopped target nss-lookup.target. Feb 9 19:16:29.032947 kernel: audit: type=1131 audit(1707506189.021:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.016521 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 19:16:29.019563 systemd[1]: Stopped target timers.target. Feb 9 19:16:29.021059 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 19:16:29.021153 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 19:16:29.022921 systemd[1]: Stopped target initrd.target. Feb 9 19:16:29.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.032975 systemd[1]: Stopped target basic.target. Feb 9 19:16:29.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.077937 iscsid[1100]: iscsid shutting down. Feb 9 19:16:29.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.034471 systemd[1]: Stopped target ignition-complete.target. Feb 9 19:16:29.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.036134 systemd[1]: Stopped target ignition-diskful.target. Feb 9 19:16:29.111490 ignition[1288]: INFO : Ignition 2.14.0 Feb 9 19:16:29.111490 ignition[1288]: INFO : Stage: umount Feb 9 19:16:29.111490 ignition[1288]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:16:29.111490 ignition[1288]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 9 19:16:29.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.037867 systemd[1]: Stopped target initrd-root-device.target. Feb 9 19:16:29.045761 systemd[1]: Stopped target remote-fs.target. Feb 9 19:16:29.048523 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 19:16:29.051784 systemd[1]: Stopped target sysinit.target. Feb 9 19:16:29.054537 systemd[1]: Stopped target local-fs.target. Feb 9 19:16:29.056075 systemd[1]: Stopped target local-fs-pre.target. Feb 9 19:16:29.058795 systemd[1]: Stopped target swap.target. Feb 9 19:16:29.060231 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 19:16:29.060326 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 19:16:29.061994 systemd[1]: Stopped target cryptsetup.target. Feb 9 19:16:29.063620 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 19:16:29.063702 systemd[1]: Stopped dracut-initqueue.service. Feb 9 19:16:29.065248 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 19:16:29.065327 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 19:16:29.065488 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 19:16:29.065578 systemd[1]: Stopped ignition-files.service. Feb 9 19:16:29.066924 systemd[1]: Stopping ignition-mount.service... Feb 9 19:16:29.070752 systemd[1]: Stopping iscsid.service... Feb 9 19:16:29.071187 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 19:16:29.071296 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 19:16:29.085990 systemd[1]: Stopping sysroot-boot.service... Feb 9 19:16:29.088016 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 19:16:29.088144 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 19:16:29.090085 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 19:16:29.090184 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 19:16:29.093982 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 19:16:29.094207 systemd[1]: Stopped iscsid.service. Feb 9 19:16:29.096334 systemd[1]: Stopping iscsiuio.service... Feb 9 19:16:29.111964 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 19:16:29.112360 systemd[1]: Stopped iscsiuio.service. Feb 9 19:16:29.139460 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 19:16:29.189738 ignition[1288]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 9 19:16:29.192343 ignition[1288]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 9 19:16:29.195866 ignition[1288]: INFO : PUT result: OK Feb 9 19:16:29.200749 ignition[1288]: INFO : umount: umount passed Feb 9 19:16:29.205841 ignition[1288]: INFO : Ignition finished successfully Feb 9 19:16:29.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.202949 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 19:16:29.203130 systemd[1]: Stopped sysroot-boot.service. Feb 9 19:16:29.208685 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 19:16:29.210654 systemd[1]: Stopped ignition-mount.service. Feb 9 19:16:29.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.222194 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 19:16:29.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.222287 systemd[1]: Stopped ignition-disks.service. Feb 9 19:16:29.224017 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 19:16:29.224099 systemd[1]: Stopped ignition-kargs.service. Feb 9 19:16:29.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.232679 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 19:16:29.232761 systemd[1]: Stopped ignition-fetch.service. Feb 9 19:16:29.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.239293 systemd[1]: Stopped target network.target. Feb 9 19:16:29.241326 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 19:16:29.241631 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 19:16:29.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.248702 systemd[1]: Stopped target paths.target. Feb 9 19:16:29.250208 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 19:16:29.255860 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 19:16:29.255981 systemd[1]: Stopped target slices.target. Feb 9 19:16:29.260565 systemd[1]: Stopped target sockets.target. Feb 9 19:16:29.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.262160 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 19:16:29.262230 systemd[1]: Closed iscsid.socket. Feb 9 19:16:29.263628 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 19:16:29.263692 systemd[1]: Closed iscsiuio.socket. Feb 9 19:16:29.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.266420 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 19:16:29.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.266502 systemd[1]: Stopped ignition-setup.service. Feb 9 19:16:29.268127 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 19:16:29.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.268204 systemd[1]: Stopped initrd-setup-root.service. Feb 9 19:16:29.270241 systemd[1]: Stopping systemd-networkd.service... Feb 9 19:16:29.273284 systemd[1]: Stopping systemd-resolved.service... Feb 9 19:16:29.276870 systemd-networkd[1094]: eth0: DHCPv6 lease lost Feb 9 19:16:29.301000 audit: BPF prog-id=9 op=UNLOAD Feb 9 19:16:29.278597 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 19:16:29.278801 systemd[1]: Stopped systemd-networkd.service. Feb 9 19:16:29.282840 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 19:16:29.282911 systemd[1]: Closed systemd-networkd.socket. Feb 9 19:16:29.285575 systemd[1]: Stopping network-cleanup.service... Feb 9 19:16:29.288742 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 19:16:29.288881 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 19:16:29.292553 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 19:16:29.292729 systemd[1]: Stopped systemd-sysctl.service. Feb 9 19:16:29.302590 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 19:16:29.302700 systemd[1]: Stopped systemd-modules-load.service. Feb 9 19:16:29.321000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.323195 systemd[1]: Stopping systemd-udevd.service... Feb 9 19:16:29.329618 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 19:16:29.333165 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 19:16:29.335243 systemd[1]: Stopped systemd-resolved.service. Feb 9 19:16:29.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.339043 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 19:16:29.341019 systemd[1]: Stopped systemd-udevd.service. Feb 9 19:16:29.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.345554 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 19:16:29.343000 audit: BPF prog-id=6 op=UNLOAD Feb 9 19:16:29.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.345646 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 19:16:29.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.351064 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 19:16:29.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:29.351142 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 19:16:29.354696 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 19:16:29.354784 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 19:16:29.356456 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 19:16:29.356536 systemd[1]: Stopped dracut-cmdline.service. Feb 9 19:16:29.358126 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 19:16:29.358203 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 19:16:29.361083 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 19:16:29.367967 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 19:16:29.368095 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 19:16:29.375009 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 19:16:29.442019 systemd-journald[308]: Received SIGTERM from PID 1 (n/a). Feb 9 19:16:29.375203 systemd[1]: Stopped network-cleanup.service. Feb 9 19:16:29.378904 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 19:16:29.379092 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 19:16:29.381924 systemd[1]: Reached target initrd-switch-root.target. Feb 9 19:16:29.384904 systemd[1]: Starting initrd-switch-root.service... Feb 9 19:16:29.400934 systemd[1]: Switching root. Feb 9 19:16:29.457009 systemd-journald[308]: Journal stopped Feb 9 19:16:34.976054 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 19:16:34.976162 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 19:16:34.976205 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 19:16:34.976237 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 19:16:34.976268 kernel: SELinux: policy capability open_perms=1 Feb 9 19:16:34.976391 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 19:16:34.981180 kernel: SELinux: policy capability always_check_network=0 Feb 9 19:16:34.981234 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 19:16:34.981269 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 19:16:34.981300 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 19:16:34.981330 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 19:16:34.981369 systemd[1]: Successfully loaded SELinux policy in 110.321ms. Feb 9 19:16:34.981422 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 19.485ms. Feb 9 19:16:34.981455 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:16:34.981504 systemd[1]: Detected virtualization amazon. Feb 9 19:16:34.981544 systemd[1]: Detected architecture arm64. Feb 9 19:16:34.981576 systemd[1]: Detected first boot. Feb 9 19:16:34.981609 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:16:34.981641 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 19:16:34.981673 systemd[1]: Populated /etc with preset unit settings. Feb 9 19:16:34.981705 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:16:34.981742 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:16:34.981781 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:16:34.981854 kernel: kauditd_printk_skb: 48 callbacks suppressed Feb 9 19:16:34.981892 kernel: audit: type=1334 audit(1707506194.583:88): prog-id=12 op=LOAD Feb 9 19:16:34.981921 kernel: audit: type=1334 audit(1707506194.583:89): prog-id=3 op=UNLOAD Feb 9 19:16:34.981951 kernel: audit: type=1334 audit(1707506194.585:90): prog-id=13 op=LOAD Feb 9 19:16:34.981982 kernel: audit: type=1334 audit(1707506194.587:91): prog-id=14 op=LOAD Feb 9 19:16:34.982012 kernel: audit: type=1334 audit(1707506194.587:92): prog-id=4 op=UNLOAD Feb 9 19:16:34.982040 kernel: audit: type=1334 audit(1707506194.587:93): prog-id=5 op=UNLOAD Feb 9 19:16:34.982069 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 19:16:34.982106 kernel: audit: type=1334 audit(1707506194.590:94): prog-id=15 op=LOAD Feb 9 19:16:34.982138 systemd[1]: Stopped initrd-switch-root.service. Feb 9 19:16:34.982166 kernel: audit: type=1334 audit(1707506194.590:95): prog-id=12 op=UNLOAD Feb 9 19:16:34.982196 kernel: audit: type=1334 audit(1707506194.592:96): prog-id=16 op=LOAD Feb 9 19:16:34.982225 kernel: audit: type=1334 audit(1707506194.595:97): prog-id=17 op=LOAD Feb 9 19:16:34.982256 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 19:16:34.982288 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 19:16:34.982319 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 19:16:34.982351 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 19:16:34.982385 systemd[1]: Created slice system-getty.slice. Feb 9 19:16:34.982416 systemd[1]: Created slice system-modprobe.slice. Feb 9 19:16:34.982445 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 19:16:34.982477 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 19:16:34.982507 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 19:16:34.982541 systemd[1]: Created slice user.slice. Feb 9 19:16:34.982573 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:16:34.982609 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 19:16:34.982640 systemd[1]: Set up automount boot.automount. Feb 9 19:16:34.982672 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 19:16:34.982703 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 19:16:34.982734 systemd[1]: Stopped target initrd-fs.target. Feb 9 19:16:34.982763 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 19:16:34.982792 systemd[1]: Reached target integritysetup.target. Feb 9 19:16:34.983068 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:16:34.983101 systemd[1]: Reached target remote-fs.target. Feb 9 19:16:34.983136 systemd[1]: Reached target slices.target. Feb 9 19:16:34.983166 systemd[1]: Reached target swap.target. Feb 9 19:16:34.983195 systemd[1]: Reached target torcx.target. Feb 9 19:16:34.983226 systemd[1]: Reached target veritysetup.target. Feb 9 19:16:34.983256 systemd[1]: Listening on systemd-coredump.socket. Feb 9 19:16:34.983285 systemd[1]: Listening on systemd-initctl.socket. Feb 9 19:16:34.983315 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:16:34.983346 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:16:34.983378 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:16:34.983408 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 19:16:34.983443 systemd[1]: Mounting dev-hugepages.mount... Feb 9 19:16:34.983475 systemd[1]: Mounting dev-mqueue.mount... Feb 9 19:16:34.983507 systemd[1]: Mounting media.mount... Feb 9 19:16:34.983537 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 19:16:34.983567 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 19:16:34.983615 systemd[1]: Mounting tmp.mount... Feb 9 19:16:34.983650 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 19:16:34.983680 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 19:16:34.983709 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:16:34.983743 systemd[1]: Starting modprobe@configfs.service... Feb 9 19:16:34.984527 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 19:16:34.984570 systemd[1]: Starting modprobe@drm.service... Feb 9 19:16:34.984604 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 19:16:34.984634 systemd[1]: Starting modprobe@fuse.service... Feb 9 19:16:34.984663 systemd[1]: Starting modprobe@loop.service... Feb 9 19:16:34.984702 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 19:16:34.984732 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 19:16:34.984761 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 19:16:34.984796 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 19:16:34.984848 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 19:16:34.984889 systemd[1]: Stopped systemd-journald.service. Feb 9 19:16:34.984919 kernel: fuse: init (API version 7.34) Feb 9 19:16:34.984949 systemd[1]: Starting systemd-journald.service... Feb 9 19:16:34.984979 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:16:34.985008 kernel: loop: module loaded Feb 9 19:16:34.985039 systemd[1]: Starting systemd-network-generator.service... Feb 9 19:16:34.985071 systemd[1]: Starting systemd-remount-fs.service... Feb 9 19:16:34.985106 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:16:34.985135 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 19:16:34.985164 systemd[1]: Stopped verity-setup.service. Feb 9 19:16:34.985193 systemd[1]: Mounted dev-hugepages.mount. Feb 9 19:16:34.985222 systemd[1]: Mounted dev-mqueue.mount. Feb 9 19:16:34.985251 systemd[1]: Mounted media.mount. Feb 9 19:16:34.985280 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 19:16:34.985311 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 19:16:34.985340 systemd[1]: Mounted tmp.mount. Feb 9 19:16:34.985374 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:16:34.985416 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 19:16:34.985448 systemd[1]: Finished modprobe@configfs.service. Feb 9 19:16:34.985493 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 19:16:34.985528 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 19:16:34.985564 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 19:16:34.985595 systemd[1]: Finished modprobe@drm.service. Feb 9 19:16:34.985628 systemd-journald[1399]: Journal started Feb 9 19:16:34.985730 systemd-journald[1399]: Runtime Journal (/run/log/journal/ec2aa5bf7691f1a84ae98494ab46e977) is 8.0M, max 75.4M, 67.4M free. Feb 9 19:16:30.291000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 19:16:30.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:16:30.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:16:30.483000 audit: BPF prog-id=10 op=LOAD Feb 9 19:16:30.483000 audit: BPF prog-id=10 op=UNLOAD Feb 9 19:16:30.483000 audit: BPF prog-id=11 op=LOAD Feb 9 19:16:30.483000 audit: BPF prog-id=11 op=UNLOAD Feb 9 19:16:30.708000 audit[1321]: AVC avc: denied { associate } for pid=1321 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 19:16:30.708000 audit[1321]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458d4 a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1304 pid=1321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:30.708000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:16:30.712000 audit[1321]: AVC avc: denied { associate } for pid=1321 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 19:16:30.712000 audit[1321]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001459b9 a2=1ed a3=0 items=2 ppid=1304 pid=1321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:30.712000 audit: CWD cwd="/" Feb 9 19:16:30.712000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:30.712000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:16:30.712000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:16:34.583000 audit: BPF prog-id=12 op=LOAD Feb 9 19:16:34.583000 audit: BPF prog-id=3 op=UNLOAD Feb 9 19:16:34.585000 audit: BPF prog-id=13 op=LOAD Feb 9 19:16:34.587000 audit: BPF prog-id=14 op=LOAD Feb 9 19:16:34.587000 audit: BPF prog-id=4 op=UNLOAD Feb 9 19:16:34.587000 audit: BPF prog-id=5 op=UNLOAD Feb 9 19:16:34.590000 audit: BPF prog-id=15 op=LOAD Feb 9 19:16:34.590000 audit: BPF prog-id=12 op=UNLOAD Feb 9 19:16:34.592000 audit: BPF prog-id=16 op=LOAD Feb 9 19:16:34.595000 audit: BPF prog-id=17 op=LOAD Feb 9 19:16:34.595000 audit: BPF prog-id=13 op=UNLOAD Feb 9 19:16:34.595000 audit: BPF prog-id=14 op=UNLOAD Feb 9 19:16:34.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:34.613000 audit: BPF prog-id=15 op=UNLOAD Feb 9 19:16:34.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:34.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:34.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:34.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:34.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:34.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:34.873000 audit: BPF prog-id=18 op=LOAD Feb 9 19:16:34.873000 audit: BPF prog-id=19 op=LOAD Feb 9 19:16:34.873000 audit: BPF prog-id=20 op=LOAD Feb 9 19:16:34.873000 audit: BPF prog-id=16 op=UNLOAD Feb 9 19:16:34.873000 audit: BPF prog-id=17 op=UNLOAD Feb 9 19:16:34.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:34.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:34.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:34.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:34.969000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 19:16:34.969000 audit[1399]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=4 a1=ffffd9189b40 a2=4000 a3=1 items=0 ppid=1 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:34.969000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 19:16:34.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:34.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:34.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:34.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:30.677954 /usr/lib/systemd/system-generators/torcx-generator[1321]: time="2024-02-09T19:16:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:16:34.582254 systemd[1]: Queued start job for default target multi-user.target. Feb 9 19:16:30.678680 /usr/lib/systemd/system-generators/torcx-generator[1321]: time="2024-02-09T19:16:30Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:16:34.598778 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 19:16:30.678732 /usr/lib/systemd/system-generators/torcx-generator[1321]: time="2024-02-09T19:16:30Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:16:30.678798 /usr/lib/systemd/system-generators/torcx-generator[1321]: time="2024-02-09T19:16:30Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 19:16:30.678868 /usr/lib/systemd/system-generators/torcx-generator[1321]: time="2024-02-09T19:16:30Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 19:16:34.991865 systemd[1]: Started systemd-journald.service. Feb 9 19:16:30.678935 /usr/lib/systemd/system-generators/torcx-generator[1321]: time="2024-02-09T19:16:30Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 19:16:34.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:30.678967 /usr/lib/systemd/system-generators/torcx-generator[1321]: time="2024-02-09T19:16:30Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 19:16:30.679396 /usr/lib/systemd/system-generators/torcx-generator[1321]: time="2024-02-09T19:16:30Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 19:16:30.679485 /usr/lib/systemd/system-generators/torcx-generator[1321]: time="2024-02-09T19:16:30Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:16:30.679523 /usr/lib/systemd/system-generators/torcx-generator[1321]: time="2024-02-09T19:16:30Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:16:30.691711 /usr/lib/systemd/system-generators/torcx-generator[1321]: time="2024-02-09T19:16:30Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 19:16:34.993005 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 19:16:30.691798 /usr/lib/systemd/system-generators/torcx-generator[1321]: time="2024-02-09T19:16:30Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 19:16:34.993298 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 19:16:30.692899 /usr/lib/systemd/system-generators/torcx-generator[1321]: time="2024-02-09T19:16:30Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 19:16:30.692941 /usr/lib/systemd/system-generators/torcx-generator[1321]: time="2024-02-09T19:16:30Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 19:16:30.692991 /usr/lib/systemd/system-generators/torcx-generator[1321]: time="2024-02-09T19:16:30Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 19:16:30.693029 /usr/lib/systemd/system-generators/torcx-generator[1321]: time="2024-02-09T19:16:30Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 19:16:34.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:34.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:34.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:34.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:35.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:35.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:33.786068 /usr/lib/systemd/system-generators/torcx-generator[1321]: time="2024-02-09T19:16:33Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:16:34.997139 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 19:16:35.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:33.786610 /usr/lib/systemd/system-generators/torcx-generator[1321]: time="2024-02-09T19:16:33Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:16:34.997431 systemd[1]: Finished modprobe@fuse.service. Feb 9 19:16:33.786875 /usr/lib/systemd/system-generators/torcx-generator[1321]: time="2024-02-09T19:16:33Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:16:34.999676 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 19:16:33.787322 /usr/lib/systemd/system-generators/torcx-generator[1321]: time="2024-02-09T19:16:33Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:16:34.999967 systemd[1]: Finished modprobe@loop.service. Feb 9 19:16:33.787444 /usr/lib/systemd/system-generators/torcx-generator[1321]: time="2024-02-09T19:16:33Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 19:16:35.002495 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:16:35.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:33.787578 /usr/lib/systemd/system-generators/torcx-generator[1321]: time="2024-02-09T19:16:33Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 19:16:35.004892 systemd[1]: Finished systemd-network-generator.service. Feb 9 19:16:35.007556 systemd[1]: Finished systemd-remount-fs.service. Feb 9 19:16:35.010697 systemd[1]: Reached target network-pre.target. Feb 9 19:16:35.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:35.015378 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 19:16:35.019579 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 19:16:35.021996 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 19:16:35.025002 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 19:16:35.029650 systemd[1]: Starting systemd-journal-flush.service... Feb 9 19:16:35.031536 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 19:16:35.035181 systemd[1]: Starting systemd-random-seed.service... Feb 9 19:16:35.037138 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 19:16:35.039746 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:16:35.044018 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 19:16:35.046070 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 19:16:35.063379 systemd-journald[1399]: Time spent on flushing to /var/log/journal/ec2aa5bf7691f1a84ae98494ab46e977 is 65.624ms for 1170 entries. Feb 9 19:16:35.063379 systemd-journald[1399]: System Journal (/var/log/journal/ec2aa5bf7691f1a84ae98494ab46e977) is 8.0M, max 195.6M, 187.6M free. Feb 9 19:16:35.139011 systemd-journald[1399]: Received client request to flush runtime journal. Feb 9 19:16:35.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:35.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:35.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:35.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:35.078274 systemd[1]: Finished systemd-random-seed.service. Feb 9 19:16:35.081135 systemd[1]: Reached target first-boot-complete.target. Feb 9 19:16:35.114066 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:16:35.140583 systemd[1]: Finished systemd-journal-flush.service. Feb 9 19:16:35.143656 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 19:16:35.147617 systemd[1]: Starting systemd-sysusers.service... Feb 9 19:16:35.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:35.229604 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:16:35.234184 systemd[1]: Starting systemd-udev-settle.service... Feb 9 19:16:35.251381 udevadm[1440]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 19:16:35.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:35.288262 systemd[1]: Finished systemd-sysusers.service. Feb 9 19:16:35.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:35.952000 audit: BPF prog-id=21 op=LOAD Feb 9 19:16:35.953000 audit: BPF prog-id=22 op=LOAD Feb 9 19:16:35.953000 audit: BPF prog-id=7 op=UNLOAD Feb 9 19:16:35.953000 audit: BPF prog-id=8 op=UNLOAD Feb 9 19:16:35.951453 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 19:16:35.955905 systemd[1]: Starting systemd-udevd.service... Feb 9 19:16:35.994399 systemd-udevd[1441]: Using default interface naming scheme 'v252'. Feb 9 19:16:36.044184 systemd[1]: Started systemd-udevd.service. Feb 9 19:16:36.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:36.045000 audit: BPF prog-id=23 op=LOAD Feb 9 19:16:36.049067 systemd[1]: Starting systemd-networkd.service... Feb 9 19:16:36.076000 audit: BPF prog-id=24 op=LOAD Feb 9 19:16:36.076000 audit: BPF prog-id=25 op=LOAD Feb 9 19:16:36.076000 audit: BPF prog-id=26 op=LOAD Feb 9 19:16:36.079579 systemd[1]: Starting systemd-userdbd.service... Feb 9 19:16:36.166885 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 19:16:36.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:36.177791 systemd[1]: Started systemd-userdbd.service. Feb 9 19:16:36.215180 (udev-worker)[1442]: Network interface NamePolicy= disabled on kernel command line. Feb 9 19:16:36.328615 systemd-networkd[1448]: lo: Link UP Feb 9 19:16:36.329123 systemd-networkd[1448]: lo: Gained carrier Feb 9 19:16:36.330256 systemd-networkd[1448]: Enumeration completed Feb 9 19:16:36.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:36.331750 systemd[1]: Started systemd-networkd.service. Feb 9 19:16:36.335952 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 19:16:36.339390 systemd-networkd[1448]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:16:36.345843 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:16:36.346357 systemd-networkd[1448]: eth0: Link UP Feb 9 19:16:36.346968 systemd-networkd[1448]: eth0: Gained carrier Feb 9 19:16:36.362182 systemd-networkd[1448]: eth0: DHCPv4 address 172.31.31.30/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 9 19:16:36.405845 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1461) Feb 9 19:16:36.522766 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:16:36.525233 systemd[1]: Finished systemd-udev-settle.service. Feb 9 19:16:36.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:36.529418 systemd[1]: Starting lvm2-activation-early.service... Feb 9 19:16:36.564881 lvm[1560]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:16:36.602548 systemd[1]: Finished lvm2-activation-early.service. Feb 9 19:16:36.604539 systemd[1]: Reached target cryptsetup.target. Feb 9 19:16:36.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:36.608310 systemd[1]: Starting lvm2-activation.service... Feb 9 19:16:36.616843 lvm[1561]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:16:36.652447 systemd[1]: Finished lvm2-activation.service. Feb 9 19:16:36.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:36.654410 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:16:36.656182 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 19:16:36.656239 systemd[1]: Reached target local-fs.target. Feb 9 19:16:36.657843 systemd[1]: Reached target machines.target. Feb 9 19:16:36.661564 systemd[1]: Starting ldconfig.service... Feb 9 19:16:36.664462 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 19:16:36.664585 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:16:36.668934 systemd[1]: Starting systemd-boot-update.service... Feb 9 19:16:36.672479 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 19:16:36.676886 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 19:16:36.679053 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:16:36.679262 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:16:36.682087 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 19:16:36.702718 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1563 (bootctl) Feb 9 19:16:36.705118 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 19:16:36.723543 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 19:16:36.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:36.728034 systemd-tmpfiles[1566]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 19:16:36.737130 systemd-tmpfiles[1566]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 19:16:36.745072 systemd-tmpfiles[1566]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 19:16:36.819166 systemd-fsck[1574]: fsck.fat 4.2 (2021-01-31) Feb 9 19:16:36.819166 systemd-fsck[1574]: /dev/nvme0n1p1: 236 files, 113719/258078 clusters Feb 9 19:16:36.828259 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 19:16:36.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:36.833081 systemd[1]: Mounting boot.mount... Feb 9 19:16:36.855792 systemd[1]: Mounted boot.mount. Feb 9 19:16:36.883225 systemd[1]: Finished systemd-boot-update.service. Feb 9 19:16:36.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:37.101329 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 19:16:37.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:37.105727 systemd[1]: Starting audit-rules.service... Feb 9 19:16:37.109711 systemd[1]: Starting clean-ca-certificates.service... Feb 9 19:16:37.117194 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 19:16:37.119000 audit: BPF prog-id=27 op=LOAD Feb 9 19:16:37.125363 systemd[1]: Starting systemd-resolved.service... Feb 9 19:16:37.126000 audit: BPF prog-id=28 op=LOAD Feb 9 19:16:37.130490 systemd[1]: Starting systemd-timesyncd.service... Feb 9 19:16:37.134439 systemd[1]: Starting systemd-update-utmp.service... Feb 9 19:16:37.158028 systemd[1]: Finished clean-ca-certificates.service. Feb 9 19:16:37.160075 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 19:16:37.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:37.165000 audit[1594]: SYSTEM_BOOT pid=1594 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 19:16:37.171389 systemd[1]: Finished systemd-update-utmp.service. Feb 9 19:16:37.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:37.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:37.322180 systemd[1]: Started systemd-timesyncd.service. Feb 9 19:16:37.324208 systemd[1]: Reached target time-set.target. Feb 9 19:16:37.352270 systemd-resolved[1592]: Positive Trust Anchors: Feb 9 19:16:37.352302 systemd-resolved[1592]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:16:37.352353 systemd-resolved[1592]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:16:37.369690 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 19:16:37.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:37.435375 augenrules[1612]: No rules Feb 9 19:16:37.433000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 19:16:37.433000 audit[1612]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc0868dc0 a2=420 a3=0 items=0 ppid=1588 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:37.433000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 19:16:37.437547 systemd[1]: Finished audit-rules.service. Feb 9 19:16:37.488665 systemd-resolved[1592]: Defaulting to hostname 'linux'. Feb 9 19:16:37.491758 systemd[1]: Started systemd-resolved.service. Feb 9 19:16:37.493684 systemd[1]: Reached target network.target. Feb 9 19:16:37.495332 systemd[1]: Reached target nss-lookup.target. Feb 9 19:16:37.572755 systemd-timesyncd[1593]: Contacted time server 216.218.254.202:123 (0.flatcar.pool.ntp.org). Feb 9 19:16:37.573045 systemd-timesyncd[1593]: Initial clock synchronization to Fri 2024-02-09 19:16:37.811261 UTC. Feb 9 19:16:37.883909 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 19:16:37.885008 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 19:16:37.976053 systemd-networkd[1448]: eth0: Gained IPv6LL Feb 9 19:16:37.980360 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 19:16:37.982630 systemd[1]: Reached target network-online.target. Feb 9 19:16:38.010900 ldconfig[1562]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 19:16:38.016601 systemd[1]: Finished ldconfig.service. Feb 9 19:16:38.020595 systemd[1]: Starting systemd-update-done.service... Feb 9 19:16:38.034576 systemd[1]: Finished systemd-update-done.service. Feb 9 19:16:38.036745 systemd[1]: Reached target sysinit.target. Feb 9 19:16:38.038570 systemd[1]: Started motdgen.path. Feb 9 19:16:38.040215 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 19:16:38.042966 systemd[1]: Started logrotate.timer. Feb 9 19:16:38.044772 systemd[1]: Started mdadm.timer. Feb 9 19:16:38.046352 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 19:16:38.049519 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 19:16:38.049797 systemd[1]: Reached target paths.target. Feb 9 19:16:38.051508 systemd[1]: Reached target timers.target. Feb 9 19:16:38.053912 systemd[1]: Listening on dbus.socket. Feb 9 19:16:38.057546 systemd[1]: Starting docker.socket... Feb 9 19:16:38.063975 systemd[1]: Listening on sshd.socket. Feb 9 19:16:38.065992 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:16:38.066985 systemd[1]: Listening on docker.socket. Feb 9 19:16:38.068995 systemd[1]: Reached target sockets.target. Feb 9 19:16:38.070805 systemd[1]: Reached target basic.target. Feb 9 19:16:38.072823 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:16:38.073026 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:16:38.084178 systemd[1]: Started amazon-ssm-agent.service. Feb 9 19:16:38.088962 systemd[1]: Starting containerd.service... Feb 9 19:16:38.094066 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 19:16:38.103367 systemd[1]: Starting dbus.service... Feb 9 19:16:38.113113 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 19:16:38.117794 systemd[1]: Starting extend-filesystems.service... Feb 9 19:16:38.119898 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 19:16:38.122556 systemd[1]: Starting motdgen.service... Feb 9 19:16:38.126532 systemd[1]: Started nvidia.service. Feb 9 19:16:38.132087 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 19:16:38.136685 systemd[1]: Starting prepare-critools.service... Feb 9 19:16:38.147749 systemd[1]: Starting prepare-helm.service... Feb 9 19:16:38.154855 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 19:16:38.162687 systemd[1]: Starting sshd-keygen.service... Feb 9 19:16:38.171332 systemd[1]: Starting systemd-logind.service... Feb 9 19:16:38.174077 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:16:38.185065 jq[1624]: false Feb 9 19:16:38.174206 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 19:16:38.175892 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 19:16:38.179142 systemd[1]: Starting update-engine.service... Feb 9 19:16:38.186369 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 19:16:38.193724 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 19:16:38.194116 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 19:16:38.283940 jq[1638]: true Feb 9 19:16:38.324457 tar[1640]: ./ Feb 9 19:16:38.324457 tar[1640]: ./loopback Feb 9 19:16:38.340527 dbus-daemon[1623]: [system] SELinux support is enabled Feb 9 19:16:38.340821 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 19:16:38.341202 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 19:16:38.344684 systemd[1]: Started dbus.service. Feb 9 19:16:38.349703 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 19:16:38.349766 systemd[1]: Reached target system-config.target. Feb 9 19:16:38.351680 tar[1643]: crictl Feb 9 19:16:38.351995 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 19:16:38.352060 systemd[1]: Reached target user-config.target. Feb 9 19:16:38.358816 tar[1641]: linux-arm64/helm Feb 9 19:16:38.371443 extend-filesystems[1625]: Found nvme0n1 Feb 9 19:16:38.381724 extend-filesystems[1625]: Found nvme0n1p1 Feb 9 19:16:38.386035 extend-filesystems[1625]: Found nvme0n1p2 Feb 9 19:16:38.393409 extend-filesystems[1625]: Found nvme0n1p3 Feb 9 19:16:38.395135 extend-filesystems[1625]: Found usr Feb 9 19:16:38.399716 dbus-daemon[1623]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1448 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Feb 9 19:16:38.400959 extend-filesystems[1625]: Found nvme0n1p4 Feb 9 19:16:38.403936 dbus-daemon[1623]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 19:16:38.406501 extend-filesystems[1625]: Found nvme0n1p6 Feb 9 19:16:38.408333 extend-filesystems[1625]: Found nvme0n1p7 Feb 9 19:16:38.419297 extend-filesystems[1625]: Found nvme0n1p9 Feb 9 19:16:38.421106 extend-filesystems[1625]: Checking size of /dev/nvme0n1p9 Feb 9 19:16:38.427341 systemd[1]: Starting systemd-hostnamed.service... Feb 9 19:16:38.442044 jq[1651]: true Feb 9 19:16:38.507449 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 19:16:38.507852 systemd[1]: Finished motdgen.service. Feb 9 19:16:38.529674 extend-filesystems[1625]: Resized partition /dev/nvme0n1p9 Feb 9 19:16:38.555269 extend-filesystems[1685]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 19:16:38.578780 update_engine[1637]: I0209 19:16:38.578337 1637 main.cc:92] Flatcar Update Engine starting Feb 9 19:16:38.583076 systemd[1]: Started update-engine.service. Feb 9 19:16:38.584829 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Feb 9 19:16:38.587784 systemd[1]: Started locksmithd.service. Feb 9 19:16:38.589462 update_engine[1637]: I0209 19:16:38.588678 1637 update_check_scheduler.cc:74] Next update check in 2m4s Feb 9 19:16:38.590657 amazon-ssm-agent[1620]: 2024/02/09 19:16:38 Failed to load instance info from vault. RegistrationKey does not exist. Feb 9 19:16:38.621806 amazon-ssm-agent[1620]: Initializing new seelog logger Feb 9 19:16:38.626054 amazon-ssm-agent[1620]: New Seelog Logger Creation Complete Feb 9 19:16:38.627441 amazon-ssm-agent[1620]: 2024/02/09 19:16:38 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Feb 9 19:16:38.630329 amazon-ssm-agent[1620]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Feb 9 19:16:38.659956 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Feb 9 19:16:38.681042 amazon-ssm-agent[1620]: 2024/02/09 19:16:38 processing appconfig overrides Feb 9 19:16:38.687104 extend-filesystems[1685]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Feb 9 19:16:38.687104 extend-filesystems[1685]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 9 19:16:38.687104 extend-filesystems[1685]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Feb 9 19:16:38.709084 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 19:16:38.716523 bash[1695]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:16:38.717959 extend-filesystems[1625]: Resized filesystem in /dev/nvme0n1p9 Feb 9 19:16:38.724012 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 19:16:38.724374 systemd[1]: Finished extend-filesystems.service. Feb 9 19:16:38.768084 systemd-logind[1636]: Watching system buttons on /dev/input/event0 (Power Button) Feb 9 19:16:38.770558 systemd[1]: nvidia.service: Deactivated successfully. Feb 9 19:16:38.778652 systemd-logind[1636]: New seat seat0. Feb 9 19:16:38.800449 systemd[1]: Started systemd-logind.service. Feb 9 19:16:38.812421 env[1644]: time="2024-02-09T19:16:38.812322627Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 19:16:38.835116 tar[1640]: ./bandwidth Feb 9 19:16:39.026972 env[1644]: time="2024-02-09T19:16:39.026793639Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 19:16:39.027172 env[1644]: time="2024-02-09T19:16:39.027116483Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:16:39.040871 env[1644]: time="2024-02-09T19:16:39.039132981Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:16:39.040871 env[1644]: time="2024-02-09T19:16:39.039202379Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:16:39.040871 env[1644]: time="2024-02-09T19:16:39.039602416Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:16:39.040871 env[1644]: time="2024-02-09T19:16:39.039638260Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 19:16:39.040871 env[1644]: time="2024-02-09T19:16:39.039670275Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 19:16:39.040871 env[1644]: time="2024-02-09T19:16:39.039695899Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 19:16:39.040871 env[1644]: time="2024-02-09T19:16:39.039886818Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:16:39.040871 env[1644]: time="2024-02-09T19:16:39.040373751Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:16:39.040871 env[1644]: time="2024-02-09T19:16:39.040623405Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:16:39.040871 env[1644]: time="2024-02-09T19:16:39.040659015Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 19:16:39.041464 env[1644]: time="2024-02-09T19:16:39.040774909Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 19:16:39.041464 env[1644]: time="2024-02-09T19:16:39.040802897Z" level=info msg="metadata content store policy set" policy=shared Feb 9 19:16:39.049671 env[1644]: time="2024-02-09T19:16:39.049615033Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 19:16:39.050324 env[1644]: time="2024-02-09T19:16:39.050287775Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 19:16:39.051328 env[1644]: time="2024-02-09T19:16:39.051288988Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 19:16:39.051771 tar[1640]: ./ptp Feb 9 19:16:39.058116 env[1644]: time="2024-02-09T19:16:39.058033916Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 19:16:39.058300 env[1644]: time="2024-02-09T19:16:39.058115406Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 19:16:39.058300 env[1644]: time="2024-02-09T19:16:39.058153503Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 19:16:39.058300 env[1644]: time="2024-02-09T19:16:39.058189298Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 19:16:39.058771 env[1644]: time="2024-02-09T19:16:39.058715806Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 19:16:39.058884 env[1644]: time="2024-02-09T19:16:39.058774467Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 19:16:39.058884 env[1644]: time="2024-02-09T19:16:39.058811481Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 19:16:39.058884 env[1644]: time="2024-02-09T19:16:39.058868406Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 19:16:39.059072 env[1644]: time="2024-02-09T19:16:39.058902280Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 19:16:39.059179 env[1644]: time="2024-02-09T19:16:39.059134326Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 19:16:39.059363 env[1644]: time="2024-02-09T19:16:39.059321699Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 19:16:39.059774 env[1644]: time="2024-02-09T19:16:39.059733200Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 19:16:39.059874 env[1644]: time="2024-02-09T19:16:39.059794644Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 19:16:39.059961 env[1644]: time="2024-02-09T19:16:39.059849377Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 19:16:39.060044 env[1644]: time="2024-02-09T19:16:39.059994293Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 19:16:39.060044 env[1644]: time="2024-02-09T19:16:39.060028684Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 19:16:39.060149 env[1644]: time="2024-02-09T19:16:39.060062250Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 19:16:39.060149 env[1644]: time="2024-02-09T19:16:39.060092591Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 19:16:39.060149 env[1644]: time="2024-02-09T19:16:39.060122857Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 19:16:39.060295 env[1644]: time="2024-02-09T19:16:39.060154231Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 19:16:39.060295 env[1644]: time="2024-02-09T19:16:39.060183845Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 19:16:39.060295 env[1644]: time="2024-02-09T19:16:39.060213237Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 19:16:39.060295 env[1644]: time="2024-02-09T19:16:39.060246877Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 19:16:39.060557 env[1644]: time="2024-02-09T19:16:39.060513721Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 19:16:39.060634 env[1644]: time="2024-02-09T19:16:39.060560647Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 19:16:39.060634 env[1644]: time="2024-02-09T19:16:39.060596097Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 19:16:39.060634 env[1644]: time="2024-02-09T19:16:39.060625502Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 19:16:39.060787 env[1644]: time="2024-02-09T19:16:39.060658046Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 19:16:39.060787 env[1644]: time="2024-02-09T19:16:39.060688374Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 19:16:39.060787 env[1644]: time="2024-02-09T19:16:39.060726200Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 19:16:39.060977 env[1644]: time="2024-02-09T19:16:39.060791388Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 19:16:39.061312 env[1644]: time="2024-02-09T19:16:39.061199207Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 19:16:39.062277 env[1644]: time="2024-02-09T19:16:39.061311961Z" level=info msg="Connect containerd service" Feb 9 19:16:39.062277 env[1644]: time="2024-02-09T19:16:39.061381753Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 19:16:39.062576 env[1644]: time="2024-02-09T19:16:39.062512799Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:16:39.063024 env[1644]: time="2024-02-09T19:16:39.062975166Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 19:16:39.063110 env[1644]: time="2024-02-09T19:16:39.063085371Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 19:16:39.063287 systemd[1]: Started containerd.service. Feb 9 19:16:39.070591 env[1644]: time="2024-02-09T19:16:39.070503841Z" level=info msg="Start subscribing containerd event" Feb 9 19:16:39.082736 env[1644]: time="2024-02-09T19:16:39.082652116Z" level=info msg="Start recovering state" Feb 9 19:16:39.082959 env[1644]: time="2024-02-09T19:16:39.082884839Z" level=info msg="Start event monitor" Feb 9 19:16:39.082959 env[1644]: time="2024-02-09T19:16:39.082937503Z" level=info msg="Start snapshots syncer" Feb 9 19:16:39.083088 env[1644]: time="2024-02-09T19:16:39.082967289Z" level=info msg="Start cni network conf syncer for default" Feb 9 19:16:39.083088 env[1644]: time="2024-02-09T19:16:39.082998627Z" level=info msg="Start streaming server" Feb 9 19:16:39.083204 env[1644]: time="2024-02-09T19:16:39.082587532Z" level=info msg="containerd successfully booted in 0.298895s" Feb 9 19:16:39.103266 dbus-daemon[1623]: [system] Successfully activated service 'org.freedesktop.hostname1' Feb 9 19:16:39.103534 systemd[1]: Started systemd-hostnamed.service. Feb 9 19:16:39.106580 dbus-daemon[1623]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1666 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Feb 9 19:16:39.111306 systemd[1]: Starting polkit.service... Feb 9 19:16:39.166526 polkitd[1751]: Started polkitd version 121 Feb 9 19:16:39.201596 polkitd[1751]: Loading rules from directory /etc/polkit-1/rules.d Feb 9 19:16:39.208490 polkitd[1751]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 9 19:16:39.215308 polkitd[1751]: Finished loading, compiling and executing 2 rules Feb 9 19:16:39.216352 dbus-daemon[1623]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Feb 9 19:16:39.216632 systemd[1]: Started polkit.service. Feb 9 19:16:39.221825 polkitd[1751]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 9 19:16:39.266342 systemd-hostnamed[1666]: Hostname set to (transient) Feb 9 19:16:39.266499 systemd-resolved[1592]: System hostname changed to 'ip-172-31-31-30'. Feb 9 19:16:39.327427 tar[1640]: ./vlan Feb 9 19:16:39.472121 coreos-metadata[1622]: Feb 09 19:16:39.470 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Feb 9 19:16:39.484040 coreos-metadata[1622]: Feb 09 19:16:39.483 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Feb 9 19:16:39.486274 coreos-metadata[1622]: Feb 09 19:16:39.485 INFO Fetch successful Feb 9 19:16:39.486586 coreos-metadata[1622]: Feb 09 19:16:39.486 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Feb 9 19:16:39.487959 coreos-metadata[1622]: Feb 09 19:16:39.487 INFO Fetch successful Feb 9 19:16:39.496807 unknown[1622]: wrote ssh authorized keys file for user: core Feb 9 19:16:39.520533 update-ssh-keys[1800]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:16:39.527114 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 19:16:39.558152 tar[1640]: ./host-device Feb 9 19:16:39.583354 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO Create new startup processor Feb 9 19:16:39.594238 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [LongRunningPluginsManager] registered plugins: {} Feb 9 19:16:39.594753 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO Initializing bookkeeping folders Feb 9 19:16:39.594753 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO removing the completed state files Feb 9 19:16:39.594753 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO Initializing bookkeeping folders for long running plugins Feb 9 19:16:39.594753 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Feb 9 19:16:39.594753 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO Initializing healthcheck folders for long running plugins Feb 9 19:16:39.594753 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO Initializing locations for inventory plugin Feb 9 19:16:39.594753 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO Initializing default location for custom inventory Feb 9 19:16:39.594753 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO Initializing default location for file inventory Feb 9 19:16:39.594753 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO Initializing default location for role inventory Feb 9 19:16:39.594753 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO Init the cloudwatchlogs publisher Feb 9 19:16:39.594753 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [instanceID=i-0b0618be427df54d3] Successfully loaded platform independent plugin aws:downloadContent Feb 9 19:16:39.594753 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [instanceID=i-0b0618be427df54d3] Successfully loaded platform independent plugin aws:softwareInventory Feb 9 19:16:39.594753 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [instanceID=i-0b0618be427df54d3] Successfully loaded platform independent plugin aws:runPowerShellScript Feb 9 19:16:39.594753 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [instanceID=i-0b0618be427df54d3] Successfully loaded platform independent plugin aws:configureDocker Feb 9 19:16:39.594753 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [instanceID=i-0b0618be427df54d3] Successfully loaded platform independent plugin aws:runDockerAction Feb 9 19:16:39.594753 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [instanceID=i-0b0618be427df54d3] Successfully loaded platform independent plugin aws:updateSsmAgent Feb 9 19:16:39.595557 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [instanceID=i-0b0618be427df54d3] Successfully loaded platform independent plugin aws:refreshAssociation Feb 9 19:16:39.595557 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [instanceID=i-0b0618be427df54d3] Successfully loaded platform independent plugin aws:configurePackage Feb 9 19:16:39.600009 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [instanceID=i-0b0618be427df54d3] Successfully loaded platform independent plugin aws:runDocument Feb 9 19:16:39.600163 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [instanceID=i-0b0618be427df54d3] Successfully loaded platform dependent plugin aws:runShellScript Feb 9 19:16:39.600163 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Feb 9 19:16:39.600163 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO OS: linux, Arch: arm64 Feb 9 19:16:39.610041 amazon-ssm-agent[1620]: datastore file /var/lib/amazon/ssm/i-0b0618be427df54d3/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Feb 9 19:16:39.685749 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [MessagingDeliveryService] Starting document processing engine... Feb 9 19:16:39.754522 tar[1640]: ./tuning Feb 9 19:16:39.780698 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [MessagingDeliveryService] [EngineProcessor] Starting Feb 9 19:16:39.875056 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Feb 9 19:16:39.890603 tar[1640]: ./vrf Feb 9 19:16:39.969607 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [MessagingDeliveryService] Starting message polling Feb 9 19:16:40.005071 tar[1640]: ./sbr Feb 9 19:16:40.064297 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [MessagingDeliveryService] Starting send replies to MDS Feb 9 19:16:40.109714 tar[1640]: ./tap Feb 9 19:16:40.159292 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [instanceID=i-0b0618be427df54d3] Starting association polling Feb 9 19:16:40.243981 tar[1640]: ./dhcp Feb 9 19:16:40.254381 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Feb 9 19:16:40.349715 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [MessagingDeliveryService] [Association] Launching response handler Feb 9 19:16:40.445346 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Feb 9 19:16:40.540988 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Feb 9 19:16:40.550393 tar[1640]: ./static Feb 9 19:16:40.636901 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Feb 9 19:16:40.653292 tar[1640]: ./firewall Feb 9 19:16:40.692757 systemd[1]: Finished prepare-critools.service. Feb 9 19:16:40.698515 tar[1641]: linux-arm64/LICENSE Feb 9 19:16:40.699112 tar[1641]: linux-arm64/README.md Feb 9 19:16:40.712335 systemd[1]: Finished prepare-helm.service. Feb 9 19:16:40.732982 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [MessageGatewayService] Starting session document processing engine... Feb 9 19:16:40.751898 tar[1640]: ./macvlan Feb 9 19:16:40.803614 tar[1640]: ./dummy Feb 9 19:16:40.829274 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [MessageGatewayService] [EngineProcessor] Starting Feb 9 19:16:40.855606 tar[1640]: ./bridge Feb 9 19:16:40.912034 tar[1640]: ./ipvlan Feb 9 19:16:40.925791 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Feb 9 19:16:40.963240 tar[1640]: ./portmap Feb 9 19:16:41.011909 tar[1640]: ./host-local Feb 9 19:16:41.022514 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0b0618be427df54d3, requestId: 33244ed9-5779-4c34-a850-045c7a59df63 Feb 9 19:16:41.076184 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 19:16:41.119408 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [OfflineService] Starting document processing engine... Feb 9 19:16:41.170174 locksmithd[1689]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 19:16:41.216626 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [OfflineService] [EngineProcessor] Starting Feb 9 19:16:41.313764 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [OfflineService] [EngineProcessor] Initial processing Feb 9 19:16:41.411240 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [OfflineService] Starting message polling Feb 9 19:16:41.508863 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [OfflineService] Starting send replies to MDS Feb 9 19:16:41.606659 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [LongRunningPluginsManager] starting long running plugin manager Feb 9 19:16:41.704741 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Feb 9 19:16:41.802984 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [HealthCheck] HealthCheck reporting agent health. Feb 9 19:16:41.901340 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [MessageGatewayService] listening reply. Feb 9 19:16:41.999985 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Feb 9 19:16:42.098881 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [StartupProcessor] Executing startup processor tasks Feb 9 19:16:42.197760 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Feb 9 19:16:42.296928 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Feb 9 19:16:42.396401 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.2 Feb 9 19:16:42.495915 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0b0618be427df54d3?role=subscribe&stream=input Feb 9 19:16:42.595708 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0b0618be427df54d3?role=subscribe&stream=input Feb 9 19:16:42.695772 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [MessageGatewayService] Starting receiving message from control channel Feb 9 19:16:42.795906 amazon-ssm-agent[1620]: 2024-02-09 19:16:39 INFO [MessageGatewayService] [EngineProcessor] Initial processing Feb 9 19:16:43.836594 sshd_keygen[1662]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 19:16:43.891536 systemd[1]: Finished sshd-keygen.service. Feb 9 19:16:43.896572 systemd[1]: Starting issuegen.service... Feb 9 19:16:43.907291 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 19:16:43.907664 systemd[1]: Finished issuegen.service. Feb 9 19:16:43.912550 systemd[1]: Starting systemd-user-sessions.service... Feb 9 19:16:43.927012 systemd[1]: Finished systemd-user-sessions.service. Feb 9 19:16:43.931787 systemd[1]: Started getty@tty1.service. Feb 9 19:16:43.936160 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 19:16:43.938397 systemd[1]: Reached target getty.target. Feb 9 19:16:43.940181 systemd[1]: Reached target multi-user.target. Feb 9 19:16:43.947856 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 19:16:43.964915 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 19:16:43.965291 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 19:16:43.969336 systemd[1]: Startup finished in 1.126s (kernel) + 11.561s (initrd) + 13.815s (userspace) = 26.504s. Feb 9 19:16:47.583927 systemd[1]: Created slice system-sshd.slice. Feb 9 19:16:47.586259 systemd[1]: Started sshd@0-172.31.31.30:22-147.75.109.163:53996.service. Feb 9 19:16:47.768971 sshd[1838]: Accepted publickey for core from 147.75.109.163 port 53996 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:16:47.772691 sshd[1838]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:16:47.790145 systemd[1]: Created slice user-500.slice. Feb 9 19:16:47.792582 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 19:16:47.803121 systemd-logind[1636]: New session 1 of user core. Feb 9 19:16:47.812947 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 19:16:47.817153 systemd[1]: Starting user@500.service... Feb 9 19:16:47.824108 (systemd)[1841]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:16:47.998967 systemd[1841]: Queued start job for default target default.target. Feb 9 19:16:48.000486 systemd[1841]: Reached target paths.target. Feb 9 19:16:48.000706 systemd[1841]: Reached target sockets.target. Feb 9 19:16:48.000895 systemd[1841]: Reached target timers.target. Feb 9 19:16:48.001041 systemd[1841]: Reached target basic.target. Feb 9 19:16:48.001281 systemd[1841]: Reached target default.target. Feb 9 19:16:48.001395 systemd[1]: Started user@500.service. Feb 9 19:16:48.001573 systemd[1841]: Startup finished in 165ms. Feb 9 19:16:48.005249 systemd[1]: Started session-1.scope. Feb 9 19:16:48.156217 systemd[1]: Started sshd@1-172.31.31.30:22-147.75.109.163:54008.service. Feb 9 19:16:48.329682 sshd[1850]: Accepted publickey for core from 147.75.109.163 port 54008 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:16:48.332780 sshd[1850]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:16:48.340622 systemd-logind[1636]: New session 2 of user core. Feb 9 19:16:48.341507 systemd[1]: Started session-2.scope. Feb 9 19:16:48.472125 sshd[1850]: pam_unix(sshd:session): session closed for user core Feb 9 19:16:48.477292 systemd-logind[1636]: Session 2 logged out. Waiting for processes to exit. Feb 9 19:16:48.477929 systemd[1]: sshd@1-172.31.31.30:22-147.75.109.163:54008.service: Deactivated successfully. Feb 9 19:16:48.479194 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 19:16:48.480670 systemd-logind[1636]: Removed session 2. Feb 9 19:16:48.501427 systemd[1]: Started sshd@2-172.31.31.30:22-147.75.109.163:54016.service. Feb 9 19:16:48.674551 sshd[1856]: Accepted publickey for core from 147.75.109.163 port 54016 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:16:48.677101 sshd[1856]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:16:48.685765 systemd[1]: Started session-3.scope. Feb 9 19:16:48.686777 systemd-logind[1636]: New session 3 of user core. Feb 9 19:16:48.811047 sshd[1856]: pam_unix(sshd:session): session closed for user core Feb 9 19:16:48.815419 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 19:16:48.816922 systemd[1]: sshd@2-172.31.31.30:22-147.75.109.163:54016.service: Deactivated successfully. Feb 9 19:16:48.817169 systemd-logind[1636]: Session 3 logged out. Waiting for processes to exit. Feb 9 19:16:48.819496 systemd-logind[1636]: Removed session 3. Feb 9 19:16:48.839484 systemd[1]: Started sshd@3-172.31.31.30:22-147.75.109.163:54030.service. Feb 9 19:16:49.012279 sshd[1862]: Accepted publickey for core from 147.75.109.163 port 54030 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:16:49.015252 sshd[1862]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:16:49.021906 systemd-logind[1636]: New session 4 of user core. Feb 9 19:16:49.023605 systemd[1]: Started session-4.scope. Feb 9 19:16:49.155762 sshd[1862]: pam_unix(sshd:session): session closed for user core Feb 9 19:16:49.160385 systemd[1]: sshd@3-172.31.31.30:22-147.75.109.163:54030.service: Deactivated successfully. Feb 9 19:16:49.161638 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 19:16:49.162789 systemd-logind[1636]: Session 4 logged out. Waiting for processes to exit. Feb 9 19:16:49.164753 systemd-logind[1636]: Removed session 4. Feb 9 19:16:49.184372 systemd[1]: Started sshd@4-172.31.31.30:22-147.75.109.163:54042.service. Feb 9 19:16:49.351491 sshd[1868]: Accepted publickey for core from 147.75.109.163 port 54042 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:16:49.354388 sshd[1868]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:16:49.362995 systemd[1]: Started session-5.scope. Feb 9 19:16:49.363951 systemd-logind[1636]: New session 5 of user core. Feb 9 19:16:49.479426 sudo[1871]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 19:16:49.479957 sudo[1871]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:16:49.491090 dbus-daemon[1623]: avc: received setenforce notice (enforcing=1) Feb 9 19:16:49.493742 sudo[1871]: pam_unix(sudo:session): session closed for user root Feb 9 19:16:49.517744 sshd[1868]: pam_unix(sshd:session): session closed for user core Feb 9 19:16:49.522924 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 19:16:49.524091 systemd[1]: sshd@4-172.31.31.30:22-147.75.109.163:54042.service: Deactivated successfully. Feb 9 19:16:49.525797 systemd-logind[1636]: Session 5 logged out. Waiting for processes to exit. Feb 9 19:16:49.527854 systemd-logind[1636]: Removed session 5. Feb 9 19:16:49.547147 systemd[1]: Started sshd@5-172.31.31.30:22-147.75.109.163:54056.service. Feb 9 19:16:49.719312 sshd[1875]: Accepted publickey for core from 147.75.109.163 port 54056 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:16:49.722490 sshd[1875]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:16:49.730954 systemd[1]: Started session-6.scope. Feb 9 19:16:49.732806 systemd-logind[1636]: New session 6 of user core. Feb 9 19:16:49.840059 sudo[1879]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 19:16:49.840560 sudo[1879]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:16:49.845631 sudo[1879]: pam_unix(sudo:session): session closed for user root Feb 9 19:16:49.854511 sudo[1878]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 19:16:49.855508 sudo[1878]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:16:49.872507 systemd[1]: Stopping audit-rules.service... Feb 9 19:16:49.873000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:16:49.876670 kernel: kauditd_printk_skb: 71 callbacks suppressed Feb 9 19:16:49.876757 kernel: audit: type=1305 audit(1707506209.873:165): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:16:49.876929 auditctl[1882]: No rules Feb 9 19:16:49.882480 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 19:16:49.873000 audit[1882]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff66ed700 a2=420 a3=0 items=0 ppid=1 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:49.882859 systemd[1]: Stopped audit-rules.service. Feb 9 19:16:49.892378 systemd[1]: Starting audit-rules.service... Feb 9 19:16:49.873000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:16:49.899134 kernel: audit: type=1300 audit(1707506209.873:165): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff66ed700 a2=420 a3=0 items=0 ppid=1 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:49.899269 kernel: audit: type=1327 audit(1707506209.873:165): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:16:49.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:49.907370 kernel: audit: type=1131 audit(1707506209.882:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:49.923927 augenrules[1899]: No rules Feb 9 19:16:49.925481 systemd[1]: Finished audit-rules.service. Feb 9 19:16:49.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:49.934943 sudo[1878]: pam_unix(sudo:session): session closed for user root Feb 9 19:16:49.934000 audit[1878]: USER_END pid=1878 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:16:49.944599 kernel: audit: type=1130 audit(1707506209.925:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:49.944716 kernel: audit: type=1106 audit(1707506209.934:168): pid=1878 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:16:49.934000 audit[1878]: CRED_DISP pid=1878 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:16:49.953363 kernel: audit: type=1104 audit(1707506209.934:169): pid=1878 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:16:49.958721 sshd[1875]: pam_unix(sshd:session): session closed for user core Feb 9 19:16:49.958000 audit[1875]: USER_END pid=1875 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:49.964503 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 19:16:49.965543 systemd[1]: sshd@5-172.31.31.30:22-147.75.109.163:54056.service: Deactivated successfully. Feb 9 19:16:49.967791 systemd-logind[1636]: Session 6 logged out. Waiting for processes to exit. Feb 9 19:16:49.969792 systemd-logind[1636]: Removed session 6. Feb 9 19:16:49.959000 audit[1875]: CRED_DISP pid=1875 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:49.981946 kernel: audit: type=1106 audit(1707506209.958:170): pid=1875 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:49.982022 kernel: audit: type=1104 audit(1707506209.959:171): pid=1875 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:49.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.31.30:22-147.75.109.163:54056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:49.992856 kernel: audit: type=1131 audit(1707506209.959:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.31.30:22-147.75.109.163:54056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:49.988938 systemd[1]: Started sshd@6-172.31.31.30:22-147.75.109.163:54060.service. Feb 9 19:16:49.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.31.30:22-147.75.109.163:54060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:50.157000 audit[1905]: USER_ACCT pid=1905 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:50.158461 sshd[1905]: Accepted publickey for core from 147.75.109.163 port 54060 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:16:50.159000 audit[1905]: CRED_ACQ pid=1905 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:50.159000 audit[1905]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc44bcc10 a2=3 a3=1 items=0 ppid=1 pid=1905 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:50.159000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:16:50.161370 sshd[1905]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:16:50.169912 systemd[1]: Started session-7.scope. Feb 9 19:16:50.170654 systemd-logind[1636]: New session 7 of user core. Feb 9 19:16:50.178000 audit[1905]: USER_START pid=1905 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:50.181000 audit[1907]: CRED_ACQ pid=1907 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:16:50.275000 audit[1908]: USER_ACCT pid=1908 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:16:50.276788 sudo[1908]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 19:16:50.276000 audit[1908]: CRED_REFR pid=1908 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:16:50.277345 sudo[1908]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:16:50.280000 audit[1908]: USER_START pid=1908 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:16:50.959406 systemd[1]: Starting docker.service... Feb 9 19:16:51.031552 env[1923]: time="2024-02-09T19:16:51.031455651Z" level=info msg="Starting up" Feb 9 19:16:51.034079 env[1923]: time="2024-02-09T19:16:51.034027026Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 19:16:51.034079 env[1923]: time="2024-02-09T19:16:51.034069705Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 19:16:51.034267 env[1923]: time="2024-02-09T19:16:51.034107656Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 19:16:51.034267 env[1923]: time="2024-02-09T19:16:51.034133217Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 19:16:51.036872 env[1923]: time="2024-02-09T19:16:51.036777827Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 19:16:51.037693 env[1923]: time="2024-02-09T19:16:51.037649460Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 19:16:51.037805 env[1923]: time="2024-02-09T19:16:51.037734155Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 19:16:51.037805 env[1923]: time="2024-02-09T19:16:51.037761527Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 19:16:51.046766 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport358571698-merged.mount: Deactivated successfully. Feb 9 19:16:51.086128 env[1923]: time="2024-02-09T19:16:51.086041552Z" level=info msg="Loading containers: start." Feb 9 19:16:51.156000 audit[1954]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1954 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:51.156000 audit[1954]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=fffffbb797c0 a2=0 a3=1 items=0 ppid=1923 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:51.156000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 19:16:51.160000 audit[1956]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1956 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:51.160000 audit[1956]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffead8e210 a2=0 a3=1 items=0 ppid=1923 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:51.160000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 19:16:51.165000 audit[1958]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1958 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:51.165000 audit[1958]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffff74326c0 a2=0 a3=1 items=0 ppid=1923 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:51.165000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 19:16:51.169000 audit[1960]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1960 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:51.169000 audit[1960]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffd6fe6aa0 a2=0 a3=1 items=0 ppid=1923 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:51.169000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 19:16:51.177000 audit[1962]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1962 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:51.177000 audit[1962]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe129cb80 a2=0 a3=1 items=0 ppid=1923 pid=1962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:51.177000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 19:16:51.205000 audit[1967]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1967 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:51.205000 audit[1967]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd5c0fe10 a2=0 a3=1 items=0 ppid=1923 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:51.205000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 19:16:51.217000 audit[1969]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1969 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:51.217000 audit[1969]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe84b8890 a2=0 a3=1 items=0 ppid=1923 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:51.217000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 19:16:51.222000 audit[1971]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1971 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:51.222000 audit[1971]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffc6293220 a2=0 a3=1 items=0 ppid=1923 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:51.222000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 19:16:51.226000 audit[1973]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1973 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:51.226000 audit[1973]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffd615b3c0 a2=0 a3=1 items=0 ppid=1923 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:51.226000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:16:51.240000 audit[1977]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1977 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:51.240000 audit[1977]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffe4876910 a2=0 a3=1 items=0 ppid=1923 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:51.240000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:16:51.242000 audit[1978]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1978 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:51.242000 audit[1978]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffca1bacc0 a2=0 a3=1 items=0 ppid=1923 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:51.242000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:16:51.253836 kernel: Initializing XFRM netlink socket Feb 9 19:16:51.296562 env[1923]: time="2024-02-09T19:16:51.296515187Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 19:16:51.299458 (udev-worker)[1934]: Network interface NamePolicy= disabled on kernel command line. Feb 9 19:16:51.330000 audit[1986]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1986 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:51.330000 audit[1986]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffc80b7f10 a2=0 a3=1 items=0 ppid=1923 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:51.330000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 19:16:51.344000 audit[1989]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1989 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:51.344000 audit[1989]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffcefc9960 a2=0 a3=1 items=0 ppid=1923 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:51.344000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 19:16:51.352000 audit[1992]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1992 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:51.352000 audit[1992]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffdaf74f00 a2=0 a3=1 items=0 ppid=1923 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:51.352000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 19:16:51.357000 audit[1994]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1994 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:51.357000 audit[1994]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd6cd05a0 a2=0 a3=1 items=0 ppid=1923 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:51.357000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 19:16:51.361000 audit[1996]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1996 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:51.361000 audit[1996]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffd909fb00 a2=0 a3=1 items=0 ppid=1923 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:51.361000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 19:16:51.366000 audit[1998]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1998 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:51.366000 audit[1998]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=fffff7f2b250 a2=0 a3=1 items=0 ppid=1923 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:51.366000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 19:16:51.370000 audit[2000]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2000 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:51.370000 audit[2000]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffd6381d10 a2=0 a3=1 items=0 ppid=1923 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:51.370000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 19:16:51.385000 audit[2003]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2003 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:51.385000 audit[2003]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffe2e170d0 a2=0 a3=1 items=0 ppid=1923 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:51.385000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 19:16:51.389000 audit[2005]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2005 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:51.389000 audit[2005]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffdf6cf830 a2=0 a3=1 items=0 ppid=1923 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:51.389000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 19:16:51.394000 audit[2007]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2007 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:51.394000 audit[2007]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffd4502a20 a2=0 a3=1 items=0 ppid=1923 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:51.394000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 19:16:51.398000 audit[2009]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2009 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:51.398000 audit[2009]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe4a7ca90 a2=0 a3=1 items=0 ppid=1923 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:51.398000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 19:16:51.399807 systemd-networkd[1448]: docker0: Link UP Feb 9 19:16:51.417000 audit[2013]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2013 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:51.417000 audit[2013]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc628d220 a2=0 a3=1 items=0 ppid=1923 pid=2013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:51.417000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:16:51.419000 audit[2014]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2014 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:16:51.419000 audit[2014]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffe630cc00 a2=0 a3=1 items=0 ppid=1923 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:16:51.419000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:16:51.420633 env[1923]: time="2024-02-09T19:16:51.420593339Z" level=info msg="Loading containers: done." Feb 9 19:16:51.445612 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2288024443-merged.mount: Deactivated successfully. Feb 9 19:16:51.461456 env[1923]: time="2024-02-09T19:16:51.461395785Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 19:16:51.461743 env[1923]: time="2024-02-09T19:16:51.461700464Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 19:16:51.461952 env[1923]: time="2024-02-09T19:16:51.461908166Z" level=info msg="Daemon has completed initialization" Feb 9 19:16:51.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:51.489482 systemd[1]: Started docker.service. Feb 9 19:16:51.505770 env[1923]: time="2024-02-09T19:16:51.505651987Z" level=info msg="API listen on /run/docker.sock" Feb 9 19:16:51.541204 systemd[1]: Reloading. Feb 9 19:16:51.663421 /usr/lib/systemd/system-generators/torcx-generator[2060]: time="2024-02-09T19:16:51Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:16:51.663483 /usr/lib/systemd/system-generators/torcx-generator[2060]: time="2024-02-09T19:16:51Z" level=info msg="torcx already run" Feb 9 19:16:51.825688 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:16:51.826373 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:16:51.864843 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:16:52.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.024000 audit: BPF prog-id=37 op=LOAD Feb 9 19:16:52.024000 audit: BPF prog-id=23 op=UNLOAD Feb 9 19:16:52.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.031000 audit: BPF prog-id=38 op=LOAD Feb 9 19:16:52.031000 audit: BPF prog-id=29 op=UNLOAD Feb 9 19:16:52.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.032000 audit: BPF prog-id=39 op=LOAD Feb 9 19:16:52.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.033000 audit: BPF prog-id=40 op=LOAD Feb 9 19:16:52.034000 audit: BPF prog-id=30 op=UNLOAD Feb 9 19:16:52.034000 audit: BPF prog-id=31 op=UNLOAD Feb 9 19:16:52.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.038000 audit: BPF prog-id=41 op=LOAD Feb 9 19:16:52.038000 audit: BPF prog-id=24 op=UNLOAD Feb 9 19:16:52.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.039000 audit: BPF prog-id=42 op=LOAD Feb 9 19:16:52.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.040000 audit: BPF prog-id=43 op=LOAD Feb 9 19:16:52.040000 audit: BPF prog-id=25 op=UNLOAD Feb 9 19:16:52.040000 audit: BPF prog-id=26 op=UNLOAD Feb 9 19:16:52.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.044000 audit: BPF prog-id=44 op=LOAD Feb 9 19:16:52.044000 audit: BPF prog-id=28 op=UNLOAD Feb 9 19:16:52.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.046000 audit: BPF prog-id=45 op=LOAD Feb 9 19:16:52.046000 audit: BPF prog-id=35 op=UNLOAD Feb 9 19:16:52.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.049000 audit: BPF prog-id=46 op=LOAD Feb 9 19:16:52.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.050000 audit: BPF prog-id=47 op=LOAD Feb 9 19:16:52.050000 audit: BPF prog-id=21 op=UNLOAD Feb 9 19:16:52.050000 audit: BPF prog-id=22 op=UNLOAD Feb 9 19:16:52.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.053000 audit: BPF prog-id=48 op=LOAD Feb 9 19:16:52.053000 audit: BPF prog-id=18 op=UNLOAD Feb 9 19:16:52.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.055000 audit: BPF prog-id=49 op=LOAD Feb 9 19:16:52.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.056000 audit: BPF prog-id=50 op=LOAD Feb 9 19:16:52.056000 audit: BPF prog-id=19 op=UNLOAD Feb 9 19:16:52.056000 audit: BPF prog-id=20 op=UNLOAD Feb 9 19:16:52.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.059000 audit: BPF prog-id=51 op=LOAD Feb 9 19:16:52.059000 audit: BPF prog-id=27 op=UNLOAD Feb 9 19:16:52.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.062000 audit: BPF prog-id=52 op=LOAD Feb 9 19:16:52.063000 audit: BPF prog-id=32 op=UNLOAD Feb 9 19:16:52.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.064000 audit: BPF prog-id=53 op=LOAD Feb 9 19:16:52.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:16:52.065000 audit: BPF prog-id=54 op=LOAD Feb 9 19:16:52.065000 audit: BPF prog-id=33 op=UNLOAD Feb 9 19:16:52.065000 audit: BPF prog-id=34 op=UNLOAD Feb 9 19:16:52.091233 systemd[1]: Started kubelet.service. Feb 9 19:16:52.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:16:52.219480 kubelet[2116]: E0209 19:16:52.219406 2116 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 9 19:16:52.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:16:52.223775 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:16:52.224121 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:16:52.644031 env[1644]: time="2024-02-09T19:16:52.643948772Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\"" Feb 9 19:16:53.309007 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3628048001.mount: Deactivated successfully. Feb 9 19:16:56.635217 env[1644]: time="2024-02-09T19:16:56.635137150Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:56.638045 env[1644]: time="2024-02-09T19:16:56.637985803Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:68142d88471bf00b1317307442bd31edbbc7532061d623e85659df2d417308fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:56.641251 env[1644]: time="2024-02-09T19:16:56.641198712Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:56.644285 env[1644]: time="2024-02-09T19:16:56.644227694Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:98a686df810b9f1de8e3b2ae869e79c51a36e7434d33c53f011852618aec0a68,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:56.646126 env[1644]: time="2024-02-09T19:16:56.646040311Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\" returns image reference \"sha256:68142d88471bf00b1317307442bd31edbbc7532061d623e85659df2d417308fb\"" Feb 9 19:16:56.663795 env[1644]: time="2024-02-09T19:16:56.663739285Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\"" Feb 9 19:16:59.950931 env[1644]: time="2024-02-09T19:16:59.950859264Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:59.955039 env[1644]: time="2024-02-09T19:16:59.954976669Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8dbd4fd1241644100b94eb40a9d284c5cf08fa7f2d15cafdf1ca8cec8443b31f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:59.960094 env[1644]: time="2024-02-09T19:16:59.960038232Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:59.963212 env[1644]: time="2024-02-09T19:16:59.963162417Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:80bdcd72cfe26028bb2fed75732fc2f511c35fa8d1edc03deae11f3490713c9e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:16:59.964789 env[1644]: time="2024-02-09T19:16:59.964733087Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\" returns image reference \"sha256:8dbd4fd1241644100b94eb40a9d284c5cf08fa7f2d15cafdf1ca8cec8443b31f\"" Feb 9 19:16:59.984834 env[1644]: time="2024-02-09T19:16:59.984756232Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\"" Feb 9 19:17:02.051329 env[1644]: time="2024-02-09T19:17:02.051272761Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:02.055705 env[1644]: time="2024-02-09T19:17:02.055643335Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:541cddf10a6c9bb71f141eeefea4203714984b67ec3582fb4538058af9e43663,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:02.059944 env[1644]: time="2024-02-09T19:17:02.059896755Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:02.063623 env[1644]: time="2024-02-09T19:17:02.063555936Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:a89db556c34d652d403d909882dbd97336f2e935b1c726b2e2b2c0400186ac39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:02.065490 env[1644]: time="2024-02-09T19:17:02.065420110Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\" returns image reference \"sha256:541cddf10a6c9bb71f141eeefea4203714984b67ec3582fb4538058af9e43663\"" Feb 9 19:17:02.082439 env[1644]: time="2024-02-09T19:17:02.082391487Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 9 19:17:02.475446 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 19:17:02.475829 systemd[1]: Stopped kubelet.service. Feb 9 19:17:02.487796 kernel: kauditd_printk_skb: 292 callbacks suppressed Feb 9 19:17:02.495935 kernel: audit: type=1130 audit(1707506222.474:415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:02.496039 kernel: audit: type=1131 audit(1707506222.474:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:02.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:02.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:02.478776 systemd[1]: Started kubelet.service. Feb 9 19:17:02.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:02.504883 kernel: audit: type=1130 audit(1707506222.477:417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:02.596733 kubelet[2151]: E0209 19:17:02.596649 2151 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 9 19:17:02.606952 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:17:02.607293 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:17:02.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:17:02.616854 kernel: audit: type=1131 audit(1707506222.606:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:17:03.361707 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2286544841.mount: Deactivated successfully. Feb 9 19:17:04.143315 env[1644]: time="2024-02-09T19:17:04.143256255Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:04.147929 env[1644]: time="2024-02-09T19:17:04.147881631Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2d8b4f784b5f439fa536676861ad1144130a981e5ac011d08829ed921477ec74,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:04.150532 env[1644]: time="2024-02-09T19:17:04.150464083Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:04.152950 env[1644]: time="2024-02-09T19:17:04.152892672Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:04.154000 env[1644]: time="2024-02-09T19:17:04.153947057Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:2d8b4f784b5f439fa536676861ad1144130a981e5ac011d08829ed921477ec74\"" Feb 9 19:17:04.171745 env[1644]: time="2024-02-09T19:17:04.171676161Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 19:17:04.676942 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4254804495.mount: Deactivated successfully. Feb 9 19:17:04.688245 env[1644]: time="2024-02-09T19:17:04.688171668Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:04.692102 env[1644]: time="2024-02-09T19:17:04.692043106Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:04.694603 env[1644]: time="2024-02-09T19:17:04.694542176Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:04.697570 env[1644]: time="2024-02-09T19:17:04.697523746Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:04.698595 env[1644]: time="2024-02-09T19:17:04.698553351Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Feb 9 19:17:04.716139 env[1644]: time="2024-02-09T19:17:04.716068333Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Feb 9 19:17:05.276335 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3884706578.mount: Deactivated successfully. Feb 9 19:17:07.312002 amazon-ssm-agent[1620]: 2024-02-09 19:17:07 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Feb 9 19:17:09.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:09.277468 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 9 19:17:09.287838 kernel: audit: type=1131 audit(1707506229.277:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:09.303000 audit: BPF prog-id=54 op=UNLOAD Feb 9 19:17:09.310946 kernel: audit: type=1334 audit(1707506229.303:420): prog-id=54 op=UNLOAD Feb 9 19:17:09.311065 kernel: audit: type=1334 audit(1707506229.303:421): prog-id=53 op=UNLOAD Feb 9 19:17:09.303000 audit: BPF prog-id=53 op=UNLOAD Feb 9 19:17:09.303000 audit: BPF prog-id=52 op=UNLOAD Feb 9 19:17:09.313907 kernel: audit: type=1334 audit(1707506229.303:422): prog-id=52 op=UNLOAD Feb 9 19:17:10.542734 env[1644]: time="2024-02-09T19:17:10.542664295Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:10.546295 env[1644]: time="2024-02-09T19:17:10.546230537Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:10.550001 env[1644]: time="2024-02-09T19:17:10.549950642Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:10.553529 env[1644]: time="2024-02-09T19:17:10.553480952Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:10.555311 env[1644]: time="2024-02-09T19:17:10.555261846Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace\"" Feb 9 19:17:10.571525 env[1644]: time="2024-02-09T19:17:10.571466841Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 9 19:17:11.058388 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1325421521.mount: Deactivated successfully. Feb 9 19:17:11.968577 env[1644]: time="2024-02-09T19:17:11.968503257Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:11.972870 env[1644]: time="2024-02-09T19:17:11.972780515Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:11.975931 env[1644]: time="2024-02-09T19:17:11.975884859Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:11.980658 env[1644]: time="2024-02-09T19:17:11.980607007Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:11.981787 env[1644]: time="2024-02-09T19:17:11.981744145Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\"" Feb 9 19:17:12.844072 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 9 19:17:12.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:12.844393 systemd[1]: Stopped kubelet.service. Feb 9 19:17:12.859263 systemd[1]: Started kubelet.service. Feb 9 19:17:12.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:12.872432 kernel: audit: type=1130 audit(1707506232.842:423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:12.872522 kernel: audit: type=1131 audit(1707506232.842:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:12.873828 kernel: audit: type=1130 audit(1707506232.857:425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:12.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:12.960861 kubelet[2233]: E0209 19:17:12.960376 2233 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 9 19:17:12.965220 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:17:12.965538 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:17:12.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:17:12.974849 kernel: audit: type=1131 audit(1707506232.964:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:17:19.319621 systemd[1]: Stopped kubelet.service. Feb 9 19:17:19.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:19.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:19.335864 kernel: audit: type=1130 audit(1707506239.319:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:19.336010 kernel: audit: type=1131 audit(1707506239.319:428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:19.355108 systemd[1]: Reloading. Feb 9 19:17:19.478520 /usr/lib/systemd/system-generators/torcx-generator[2264]: time="2024-02-09T19:17:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:17:19.479232 /usr/lib/systemd/system-generators/torcx-generator[2264]: time="2024-02-09T19:17:19Z" level=info msg="torcx already run" Feb 9 19:17:19.642686 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:17:19.642964 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:17:19.680617 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:17:19.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.844833 kernel: audit: type=1400 audit(1707506239.836:429): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.861185 kernel: audit: type=1400 audit(1707506239.844:430): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.861298 kernel: audit: type=1400 audit(1707506239.844:431): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.861844 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:17:19.873494 kernel: audit: type=1400 audit(1707506239.844:432): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.873627 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 19:17:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.873855 kernel: audit: backlog limit exceeded Feb 9 19:17:19.882839 kernel: audit: type=1400 audit(1707506239.844:433): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.844000 audit: BPF prog-id=55 op=LOAD Feb 9 19:17:19.844000 audit: BPF prog-id=37 op=UNLOAD Feb 9 19:17:19.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.852000 audit: BPF prog-id=56 op=LOAD Feb 9 19:17:19.852000 audit: BPF prog-id=38 op=UNLOAD Feb 9 19:17:19.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.852000 audit: BPF prog-id=57 op=LOAD Feb 9 19:17:19.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.852000 audit: BPF prog-id=58 op=LOAD Feb 9 19:17:19.852000 audit: BPF prog-id=39 op=UNLOAD Feb 9 19:17:19.852000 audit: BPF prog-id=40 op=UNLOAD Feb 9 19:17:19.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.860000 audit: BPF prog-id=59 op=LOAD Feb 9 19:17:19.860000 audit: BPF prog-id=41 op=UNLOAD Feb 9 19:17:19.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.860000 audit: BPF prog-id=60 op=LOAD Feb 9 19:17:19.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.883000 audit: BPF prog-id=62 op=LOAD Feb 9 19:17:19.883000 audit: BPF prog-id=44 op=UNLOAD Feb 9 19:17:19.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.885000 audit: BPF prog-id=63 op=LOAD Feb 9 19:17:19.885000 audit: BPF prog-id=45 op=UNLOAD Feb 9 19:17:19.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.886000 audit: BPF prog-id=64 op=LOAD Feb 9 19:17:19.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.886000 audit: BPF prog-id=65 op=LOAD Feb 9 19:17:19.886000 audit: BPF prog-id=46 op=UNLOAD Feb 9 19:17:19.886000 audit: BPF prog-id=47 op=UNLOAD Feb 9 19:17:19.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.889000 audit: BPF prog-id=66 op=LOAD Feb 9 19:17:19.889000 audit: BPF prog-id=48 op=UNLOAD Feb 9 19:17:19.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.889000 audit: BPF prog-id=67 op=LOAD Feb 9 19:17:19.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.889000 audit: BPF prog-id=68 op=LOAD Feb 9 19:17:19.889000 audit: BPF prog-id=49 op=UNLOAD Feb 9 19:17:19.889000 audit: BPF prog-id=50 op=UNLOAD Feb 9 19:17:19.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:19.891000 audit: BPF prog-id=69 op=LOAD Feb 9 19:17:19.891000 audit: BPF prog-id=51 op=UNLOAD Feb 9 19:17:19.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:19.927983 systemd[1]: Started kubelet.service. Feb 9 19:17:20.020875 kubelet[2321]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:17:20.021608 kubelet[2321]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 19:17:20.021608 kubelet[2321]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:17:20.021785 kubelet[2321]: I0209 19:17:20.021720 2321 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:17:20.763255 kubelet[2321]: I0209 19:17:20.763214 2321 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 9 19:17:20.763452 kubelet[2321]: I0209 19:17:20.763430 2321 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:17:20.763901 kubelet[2321]: I0209 19:17:20.763878 2321 server.go:895] "Client rotation is on, will bootstrap in background" Feb 9 19:17:20.772081 kubelet[2321]: E0209 19:17:20.772026 2321 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.31.30:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.31.30:6443: connect: connection refused Feb 9 19:17:20.773357 kubelet[2321]: I0209 19:17:20.773303 2321 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:17:20.783099 kubelet[2321]: W0209 19:17:20.783061 2321 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 19:17:20.784203 kubelet[2321]: I0209 19:17:20.784165 2321 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:17:20.784689 kubelet[2321]: I0209 19:17:20.784662 2321 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:17:20.784972 kubelet[2321]: I0209 19:17:20.784939 2321 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 9 19:17:20.785192 kubelet[2321]: I0209 19:17:20.784985 2321 topology_manager.go:138] "Creating topology manager with none policy" Feb 9 19:17:20.785192 kubelet[2321]: I0209 19:17:20.785007 2321 container_manager_linux.go:301] "Creating device plugin manager" Feb 9 19:17:20.785192 kubelet[2321]: I0209 19:17:20.785176 2321 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:17:20.785387 kubelet[2321]: I0209 19:17:20.785365 2321 kubelet.go:393] "Attempting to sync node with API server" Feb 9 19:17:20.785456 kubelet[2321]: I0209 19:17:20.785392 2321 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:17:20.785456 kubelet[2321]: I0209 19:17:20.785423 2321 kubelet.go:309] "Adding apiserver pod source" Feb 9 19:17:20.785456 kubelet[2321]: I0209 19:17:20.785451 2321 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:17:20.787142 kubelet[2321]: W0209 19:17:20.787073 2321 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.31.30:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.31.30:6443: connect: connection refused Feb 9 19:17:20.787347 kubelet[2321]: E0209 19:17:20.787323 2321 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.31.30:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.31.30:6443: connect: connection refused Feb 9 19:17:20.787592 kubelet[2321]: W0209 19:17:20.787544 2321 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.31.30:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-31-30&limit=500&resourceVersion=0": dial tcp 172.31.31.30:6443: connect: connection refused Feb 9 19:17:20.787723 kubelet[2321]: E0209 19:17:20.787701 2321 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.31.30:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-31-30&limit=500&resourceVersion=0": dial tcp 172.31.31.30:6443: connect: connection refused Feb 9 19:17:20.788063 kubelet[2321]: I0209 19:17:20.788038 2321 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:17:20.788682 kubelet[2321]: W0209 19:17:20.788655 2321 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 19:17:20.790248 kubelet[2321]: I0209 19:17:20.790213 2321 server.go:1232] "Started kubelet" Feb 9 19:17:20.791000 audit[2321]: AVC avc: denied { mac_admin } for pid=2321 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:20.791000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:17:20.791000 audit[2321]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d30ff0 a1=4000d38a08 a2=4000d30fc0 a3=25 items=0 ppid=1 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:20.791000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:17:20.793254 kubelet[2321]: I0209 19:17:20.793223 2321 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:17:20.792000 audit[2321]: AVC avc: denied { mac_admin } for pid=2321 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:20.792000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:17:20.792000 audit[2321]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d00bc0 a1=4000d38a20 a2=4000d31080 a3=25 items=0 ppid=1 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:20.792000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:17:20.794789 kubelet[2321]: I0209 19:17:20.794081 2321 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 19:17:20.794789 kubelet[2321]: I0209 19:17:20.794513 2321 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 9 19:17:20.794789 kubelet[2321]: I0209 19:17:20.794598 2321 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:17:20.795157 kubelet[2321]: I0209 19:17:20.795128 2321 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:17:20.795406 kubelet[2321]: I0209 19:17:20.795384 2321 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:17:20.795736 kubelet[2321]: I0209 19:17:20.795693 2321 server.go:462] "Adding debug handlers to kubelet server" Feb 9 19:17:20.797616 kubelet[2321]: E0209 19:17:20.797567 2321 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:17:20.797616 kubelet[2321]: E0209 19:17:20.797620 2321 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:17:20.800000 audit[2332]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:20.800000 audit[2332]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc1e42770 a2=0 a3=1 items=0 ppid=2321 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:20.800000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:17:20.804407 kubelet[2321]: E0209 19:17:20.802326 2321 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-31-30.17b247e1160fac51", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-31-30", UID:"ip-172-31-31-30", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-31-30"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 17, 20, 790178897, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 17, 20, 790178897, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ip-172-31-31-30"}': 'Post "https://172.31.31.30:6443/api/v1/namespaces/default/events": dial tcp 172.31.31.30:6443: connect: connection refused'(may retry after sleeping) Feb 9 19:17:20.804407 kubelet[2321]: I0209 19:17:20.802541 2321 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 9 19:17:20.804407 kubelet[2321]: I0209 19:17:20.802724 2321 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 19:17:20.804407 kubelet[2321]: I0209 19:17:20.802844 2321 reconciler_new.go:29] "Reconciler: start to sync state" Feb 9 19:17:20.804407 kubelet[2321]: W0209 19:17:20.803384 2321 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.31.30:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.31.30:6443: connect: connection refused Feb 9 19:17:20.804958 kubelet[2321]: E0209 19:17:20.803454 2321 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.31.30:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.31.30:6443: connect: connection refused Feb 9 19:17:20.804958 kubelet[2321]: E0209 19:17:20.804276 2321 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.31.30:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-31-30?timeout=10s\": dial tcp 172.31.31.30:6443: connect: connection refused" interval="200ms" Feb 9 19:17:20.810000 audit[2333]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:20.810000 audit[2333]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffafa26d0 a2=0 a3=1 items=0 ppid=2321 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:20.810000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:17:20.830000 audit[2337]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:20.830000 audit[2337]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffea8a9e40 a2=0 a3=1 items=0 ppid=2321 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:20.830000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:17:20.834000 audit[2339]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:20.834000 audit[2339]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe3f2bc60 a2=0 a3=1 items=0 ppid=2321 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:20.834000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:17:20.856517 kubelet[2321]: I0209 19:17:20.856466 2321 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:17:20.856517 kubelet[2321]: I0209 19:17:20.856507 2321 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:17:20.856727 kubelet[2321]: I0209 19:17:20.856543 2321 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:17:20.857000 audit[2343]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:20.857000 audit[2343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffe801a960 a2=0 a3=1 items=0 ppid=2321 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:20.857000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 19:17:20.858951 kubelet[2321]: I0209 19:17:20.858329 2321 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 9 19:17:20.859283 kubelet[2321]: I0209 19:17:20.859239 2321 policy_none.go:49] "None policy: Start" Feb 9 19:17:20.860317 kubelet[2321]: I0209 19:17:20.860274 2321 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:17:20.860444 kubelet[2321]: I0209 19:17:20.860324 2321 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:17:20.860000 audit[2344]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2344 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:20.860000 audit[2344]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd2f28200 a2=0 a3=1 items=0 ppid=2321 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:20.860000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:17:20.862249 kubelet[2321]: I0209 19:17:20.862072 2321 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 9 19:17:20.862394 kubelet[2321]: I0209 19:17:20.862372 2321 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 9 19:17:20.862517 kubelet[2321]: I0209 19:17:20.862497 2321 kubelet.go:2303] "Starting kubelet main sync loop" Feb 9 19:17:20.862000 audit[2345]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:20.862000 audit[2345]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc38526a0 a2=0 a3=1 items=0 ppid=2321 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:20.862000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:17:20.864000 audit[2346]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=2346 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:20.864000 audit[2346]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff180cc30 a2=0 a3=1 items=0 ppid=2321 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:20.864000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:17:20.866000 audit[2347]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:20.866000 audit[2347]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff2420c80 a2=0 a3=1 items=0 ppid=2321 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:20.866000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:17:20.867000 audit[2348]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:20.867000 audit[2348]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff3a42b80 a2=0 a3=1 items=0 ppid=2321 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:20.867000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:17:20.869551 kubelet[2321]: E0209 19:17:20.869515 2321 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 19:17:20.869000 audit[2349]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=2349 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:20.869000 audit[2349]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe381bd90 a2=0 a3=1 items=0 ppid=2321 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:20.869000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:17:20.871598 kubelet[2321]: W0209 19:17:20.871529 2321 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.31.30:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.31.30:6443: connect: connection refused Feb 9 19:17:20.871870 kubelet[2321]: E0209 19:17:20.871797 2321 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.31.30:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.31.30:6443: connect: connection refused Feb 9 19:17:20.877406 systemd[1]: Created slice kubepods.slice. Feb 9 19:17:20.878000 audit[2350]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:20.878000 audit[2350]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd6d8ad50 a2=0 a3=1 items=0 ppid=2321 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:20.878000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:17:20.887652 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 19:17:20.893687 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 19:17:20.906401 kubelet[2321]: I0209 19:17:20.906369 2321 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:17:20.905000 audit[2321]: AVC avc: denied { mac_admin } for pid=2321 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:20.906835 kubelet[2321]: I0209 19:17:20.906793 2321 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-31-30" Feb 9 19:17:20.905000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:17:20.905000 audit[2321]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400067dad0 a1=4000666720 a2=400067daa0 a3=25 items=0 ppid=1 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:20.905000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:17:20.907466 kubelet[2321]: I0209 19:17:20.907439 2321 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:17:20.908055 kubelet[2321]: I0209 19:17:20.908028 2321 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:17:20.909580 kubelet[2321]: E0209 19:17:20.909543 2321 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-31-30\" not found" Feb 9 19:17:20.911622 kubelet[2321]: E0209 19:17:20.911576 2321 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.31.30:6443/api/v1/nodes\": dial tcp 172.31.31.30:6443: connect: connection refused" node="ip-172-31-31-30" Feb 9 19:17:20.970679 kubelet[2321]: I0209 19:17:20.970645 2321 topology_manager.go:215] "Topology Admit Handler" podUID="e55c83318a74e7976b29fedeabfce93c" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-31-30" Feb 9 19:17:20.973029 kubelet[2321]: I0209 19:17:20.972988 2321 topology_manager.go:215] "Topology Admit Handler" podUID="8db5c03745b7018ec350163fcf206e50" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-31-30" Feb 9 19:17:20.976338 kubelet[2321]: I0209 19:17:20.976289 2321 topology_manager.go:215] "Topology Admit Handler" podUID="3a28abe51565cfc4a914d846bfea2f82" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-31-30" Feb 9 19:17:20.987188 systemd[1]: Created slice kubepods-burstable-pode55c83318a74e7976b29fedeabfce93c.slice. Feb 9 19:17:21.005998 kubelet[2321]: E0209 19:17:21.005963 2321 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.31.30:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-31-30?timeout=10s\": dial tcp 172.31.31.30:6443: connect: connection refused" interval="400ms" Feb 9 19:17:21.008674 systemd[1]: Created slice kubepods-burstable-pod8db5c03745b7018ec350163fcf206e50.slice. Feb 9 19:17:21.018387 systemd[1]: Created slice kubepods-burstable-pod3a28abe51565cfc4a914d846bfea2f82.slice. Feb 9 19:17:21.104483 kubelet[2321]: I0209 19:17:21.104446 2321 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/3a28abe51565cfc4a914d846bfea2f82-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-31-30\" (UID: \"3a28abe51565cfc4a914d846bfea2f82\") " pod="kube-system/kube-controller-manager-ip-172-31-31-30" Feb 9 19:17:21.105257 kubelet[2321]: I0209 19:17:21.105207 2321 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3a28abe51565cfc4a914d846bfea2f82-k8s-certs\") pod \"kube-controller-manager-ip-172-31-31-30\" (UID: \"3a28abe51565cfc4a914d846bfea2f82\") " pod="kube-system/kube-controller-manager-ip-172-31-31-30" Feb 9 19:17:21.105501 kubelet[2321]: I0209 19:17:21.105438 2321 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3a28abe51565cfc4a914d846bfea2f82-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-31-30\" (UID: \"3a28abe51565cfc4a914d846bfea2f82\") " pod="kube-system/kube-controller-manager-ip-172-31-31-30" Feb 9 19:17:21.105729 kubelet[2321]: I0209 19:17:21.105665 2321 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8db5c03745b7018ec350163fcf206e50-ca-certs\") pod \"kube-apiserver-ip-172-31-31-30\" (UID: \"8db5c03745b7018ec350163fcf206e50\") " pod="kube-system/kube-apiserver-ip-172-31-31-30" Feb 9 19:17:21.105968 kubelet[2321]: I0209 19:17:21.105907 2321 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3a28abe51565cfc4a914d846bfea2f82-ca-certs\") pod \"kube-controller-manager-ip-172-31-31-30\" (UID: \"3a28abe51565cfc4a914d846bfea2f82\") " pod="kube-system/kube-controller-manager-ip-172-31-31-30" Feb 9 19:17:21.106181 kubelet[2321]: I0209 19:17:21.106121 2321 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8db5c03745b7018ec350163fcf206e50-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-31-30\" (UID: \"8db5c03745b7018ec350163fcf206e50\") " pod="kube-system/kube-apiserver-ip-172-31-31-30" Feb 9 19:17:21.106416 kubelet[2321]: I0209 19:17:21.106354 2321 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3a28abe51565cfc4a914d846bfea2f82-kubeconfig\") pod \"kube-controller-manager-ip-172-31-31-30\" (UID: \"3a28abe51565cfc4a914d846bfea2f82\") " pod="kube-system/kube-controller-manager-ip-172-31-31-30" Feb 9 19:17:21.106633 kubelet[2321]: I0209 19:17:21.106571 2321 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e55c83318a74e7976b29fedeabfce93c-kubeconfig\") pod \"kube-scheduler-ip-172-31-31-30\" (UID: \"e55c83318a74e7976b29fedeabfce93c\") " pod="kube-system/kube-scheduler-ip-172-31-31-30" Feb 9 19:17:21.106880 kubelet[2321]: I0209 19:17:21.106859 2321 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8db5c03745b7018ec350163fcf206e50-k8s-certs\") pod \"kube-apiserver-ip-172-31-31-30\" (UID: \"8db5c03745b7018ec350163fcf206e50\") " pod="kube-system/kube-apiserver-ip-172-31-31-30" Feb 9 19:17:21.114254 kubelet[2321]: I0209 19:17:21.114223 2321 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-31-30" Feb 9 19:17:21.114968 kubelet[2321]: E0209 19:17:21.114941 2321 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.31.30:6443/api/v1/nodes\": dial tcp 172.31.31.30:6443: connect: connection refused" node="ip-172-31-31-30" Feb 9 19:17:21.306599 env[1644]: time="2024-02-09T19:17:21.306442392Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-31-30,Uid:e55c83318a74e7976b29fedeabfce93c,Namespace:kube-system,Attempt:0,}" Feb 9 19:17:21.317318 env[1644]: time="2024-02-09T19:17:21.317228743Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-31-30,Uid:8db5c03745b7018ec350163fcf206e50,Namespace:kube-system,Attempt:0,}" Feb 9 19:17:21.327494 env[1644]: time="2024-02-09T19:17:21.327434866Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-31-30,Uid:3a28abe51565cfc4a914d846bfea2f82,Namespace:kube-system,Attempt:0,}" Feb 9 19:17:21.407857 kubelet[2321]: E0209 19:17:21.407759 2321 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.31.30:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-31-30?timeout=10s\": dial tcp 172.31.31.30:6443: connect: connection refused" interval="800ms" Feb 9 19:17:21.517560 kubelet[2321]: I0209 19:17:21.517052 2321 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-31-30" Feb 9 19:17:21.517560 kubelet[2321]: E0209 19:17:21.517526 2321 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.31.30:6443/api/v1/nodes\": dial tcp 172.31.31.30:6443: connect: connection refused" node="ip-172-31-31-30" Feb 9 19:17:21.817934 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1418460934.mount: Deactivated successfully. Feb 9 19:17:21.825698 env[1644]: time="2024-02-09T19:17:21.825644088Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:21.836068 env[1644]: time="2024-02-09T19:17:21.836019190Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:21.839172 env[1644]: time="2024-02-09T19:17:21.839102846Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:21.842253 env[1644]: time="2024-02-09T19:17:21.842208240Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:21.845274 env[1644]: time="2024-02-09T19:17:21.845230656Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:21.848757 env[1644]: time="2024-02-09T19:17:21.847268931Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:21.852075 env[1644]: time="2024-02-09T19:17:21.850545188Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:21.855668 env[1644]: time="2024-02-09T19:17:21.855622407Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:21.858118 env[1644]: time="2024-02-09T19:17:21.858076731Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:21.860426 env[1644]: time="2024-02-09T19:17:21.860380621Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:21.876624 env[1644]: time="2024-02-09T19:17:21.876569689Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:21.896088 env[1644]: time="2024-02-09T19:17:21.889051711Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:17:21.896088 env[1644]: time="2024-02-09T19:17:21.889117236Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:17:21.896088 env[1644]: time="2024-02-09T19:17:21.889142454Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:17:21.896088 env[1644]: time="2024-02-09T19:17:21.889504010Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0b50f65fb89403193d6f8bbd15cf1f67ebb3d77fb42a8969662a6165a50d445d pid=2360 runtime=io.containerd.runc.v2 Feb 9 19:17:21.906138 kubelet[2321]: W0209 19:17:21.906019 2321 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.31.30:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.31.30:6443: connect: connection refused Feb 9 19:17:21.906138 kubelet[2321]: E0209 19:17:21.906110 2321 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.31.30:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.31.30:6443: connect: connection refused Feb 9 19:17:21.911441 env[1644]: time="2024-02-09T19:17:21.900780025Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:21.934371 env[1644]: time="2024-02-09T19:17:21.934236805Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:17:21.934584 env[1644]: time="2024-02-09T19:17:21.934324259Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:17:21.934584 env[1644]: time="2024-02-09T19:17:21.934351902Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:17:21.935608 env[1644]: time="2024-02-09T19:17:21.935508492Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7bf3c03643797b5f5fc8e9d925e897d5e25d99b0ab68ba3b0d67321b78071db4 pid=2380 runtime=io.containerd.runc.v2 Feb 9 19:17:21.957637 systemd[1]: Started cri-containerd-0b50f65fb89403193d6f8bbd15cf1f67ebb3d77fb42a8969662a6165a50d445d.scope. Feb 9 19:17:21.981871 kubelet[2321]: W0209 19:17:21.978411 2321 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.31.30:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.31.30:6443: connect: connection refused Feb 9 19:17:21.981871 kubelet[2321]: E0209 19:17:21.978495 2321 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.31.30:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.31.30:6443: connect: connection refused Feb 9 19:17:22.002125 env[1644]: time="2024-02-09T19:17:21.999762199Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:17:22.002125 env[1644]: time="2024-02-09T19:17:21.999890067Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:17:22.002125 env[1644]: time="2024-02-09T19:17:21.999917494Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:17:22.005018 env[1644]: time="2024-02-09T19:17:22.003170988Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/577a0c1b6bf9769d502287ab9ac03f0647533d49d7bcec1374b60bdb47295285 pid=2407 runtime=io.containerd.runc.v2 Feb 9 19:17:22.007138 systemd[1]: Started cri-containerd-7bf3c03643797b5f5fc8e9d925e897d5e25d99b0ab68ba3b0d67321b78071db4.scope. Feb 9 19:17:22.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.011000 audit: BPF prog-id=70 op=LOAD Feb 9 19:17:22.012000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.012000 audit[2385]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2360 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062353066363566623839343033313933643666386262643135636631 Feb 9 19:17:22.012000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.012000 audit[2385]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2360 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062353066363566623839343033313933643666386262643135636631 Feb 9 19:17:22.013000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.013000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.013000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.013000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.013000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.013000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.013000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.013000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.013000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.013000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.013000 audit: BPF prog-id=71 op=LOAD Feb 9 19:17:22.013000 audit[2385]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2360 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062353066363566623839343033313933643666386262643135636631 Feb 9 19:17:22.016000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.016000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.016000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.016000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.016000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.016000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.016000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.016000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.016000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.016000 audit: BPF prog-id=72 op=LOAD Feb 9 19:17:22.016000 audit[2385]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2360 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062353066363566623839343033313933643666386262643135636631 Feb 9 19:17:22.017000 audit: BPF prog-id=72 op=UNLOAD Feb 9 19:17:22.017000 audit: BPF prog-id=71 op=UNLOAD Feb 9 19:17:22.018000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.018000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.018000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.018000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.018000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.018000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.018000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.018000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.018000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.018000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.018000 audit: BPF prog-id=73 op=LOAD Feb 9 19:17:22.018000 audit[2385]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2360 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062353066363566623839343033313933643666386262643135636631 Feb 9 19:17:22.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.043000 audit: BPF prog-id=74 op=LOAD Feb 9 19:17:22.046165 kubelet[2321]: W0209 19:17:22.045989 2321 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.31.30:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.31.30:6443: connect: connection refused Feb 9 19:17:22.046165 kubelet[2321]: E0209 19:17:22.046090 2321 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.31.30:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.31.30:6443: connect: connection refused Feb 9 19:17:22.044000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.044000 audit[2403]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2380 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762663363303336343337393762356635666338653964393235653839 Feb 9 19:17:22.045000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.045000 audit[2403]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2380 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762663363303336343337393762356635666338653964393235653839 Feb 9 19:17:22.046000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.046000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.046000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.046000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.046000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.046000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.046000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.046000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.046000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.046000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.046000 audit: BPF prog-id=75 op=LOAD Feb 9 19:17:22.052033 kubelet[2321]: W0209 19:17:22.050773 2321 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.31.30:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-31-30&limit=500&resourceVersion=0": dial tcp 172.31.31.30:6443: connect: connection refused Feb 9 19:17:22.052033 kubelet[2321]: E0209 19:17:22.050885 2321 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.31.30:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-31-30&limit=500&resourceVersion=0": dial tcp 172.31.31.30:6443: connect: connection refused Feb 9 19:17:22.046000 audit[2403]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2380 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762663363303336343337393762356635666338653964393235653839 Feb 9 19:17:22.050000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.050000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.050000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.050000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.050000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.050000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.050000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.050000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.050000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.050000 audit: BPF prog-id=76 op=LOAD Feb 9 19:17:22.050000 audit[2403]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2380 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762663363303336343337393762356635666338653964393235653839 Feb 9 19:17:22.052000 audit: BPF prog-id=76 op=UNLOAD Feb 9 19:17:22.052000 audit: BPF prog-id=75 op=UNLOAD Feb 9 19:17:22.052000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.052000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.052000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.052000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.052000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.052000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.052000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.052000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.052000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.052000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.052000 audit: BPF prog-id=77 op=LOAD Feb 9 19:17:22.052000 audit[2403]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2380 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762663363303336343337393762356635666338653964393235653839 Feb 9 19:17:22.070691 systemd[1]: Started cri-containerd-577a0c1b6bf9769d502287ab9ac03f0647533d49d7bcec1374b60bdb47295285.scope. Feb 9 19:17:22.109763 env[1644]: time="2024-02-09T19:17:22.109699799Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-31-30,Uid:3a28abe51565cfc4a914d846bfea2f82,Namespace:kube-system,Attempt:0,} returns sandbox id \"0b50f65fb89403193d6f8bbd15cf1f67ebb3d77fb42a8969662a6165a50d445d\"" Feb 9 19:17:22.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.119000 audit: BPF prog-id=78 op=LOAD Feb 9 19:17:22.122474 env[1644]: time="2024-02-09T19:17:22.122404593Z" level=info msg="CreateContainer within sandbox \"0b50f65fb89403193d6f8bbd15cf1f67ebb3d77fb42a8969662a6165a50d445d\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 19:17:22.121000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.121000 audit[2434]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2407 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537376130633162366266393736396435303232383761623961633033 Feb 9 19:17:22.122000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.122000 audit[2434]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2407 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537376130633162366266393736396435303232383761623961633033 Feb 9 19:17:22.122000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.122000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.122000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.122000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.122000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.122000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.122000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.122000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.122000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.122000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.122000 audit: BPF prog-id=79 op=LOAD Feb 9 19:17:22.122000 audit[2434]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2407 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537376130633162366266393736396435303232383761623961633033 Feb 9 19:17:22.125000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.125000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.125000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.125000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.125000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.125000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.125000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.125000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.125000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.125000 audit: BPF prog-id=80 op=LOAD Feb 9 19:17:22.125000 audit[2434]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2407 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537376130633162366266393736396435303232383761623961633033 Feb 9 19:17:22.127000 audit: BPF prog-id=80 op=UNLOAD Feb 9 19:17:22.127000 audit: BPF prog-id=79 op=UNLOAD Feb 9 19:17:22.128000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.128000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.128000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.128000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.128000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.128000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.128000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.128000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.128000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.128000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.128000 audit: BPF prog-id=81 op=LOAD Feb 9 19:17:22.128000 audit[2434]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2407 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537376130633162366266393736396435303232383761623961633033 Feb 9 19:17:22.151887 env[1644]: time="2024-02-09T19:17:22.151763975Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-31-30,Uid:8db5c03745b7018ec350163fcf206e50,Namespace:kube-system,Attempt:0,} returns sandbox id \"7bf3c03643797b5f5fc8e9d925e897d5e25d99b0ab68ba3b0d67321b78071db4\"" Feb 9 19:17:22.154088 env[1644]: time="2024-02-09T19:17:22.153992997Z" level=info msg="CreateContainer within sandbox \"0b50f65fb89403193d6f8bbd15cf1f67ebb3d77fb42a8969662a6165a50d445d\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"1f48f084c6bc3dcabbb4f849d7428108c4977b187fddb3b38acc1bfd937b6687\"" Feb 9 19:17:22.156189 env[1644]: time="2024-02-09T19:17:22.156135815Z" level=info msg="StartContainer for \"1f48f084c6bc3dcabbb4f849d7428108c4977b187fddb3b38acc1bfd937b6687\"" Feb 9 19:17:22.159110 env[1644]: time="2024-02-09T19:17:22.159040457Z" level=info msg="CreateContainer within sandbox \"7bf3c03643797b5f5fc8e9d925e897d5e25d99b0ab68ba3b0d67321b78071db4\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 19:17:22.190606 env[1644]: time="2024-02-09T19:17:22.190518146Z" level=info msg="CreateContainer within sandbox \"7bf3c03643797b5f5fc8e9d925e897d5e25d99b0ab68ba3b0d67321b78071db4\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"f47786021e9dce85d09b63e21fad9bc2ef75687f3953c9c2b6ed7be13b467b70\"" Feb 9 19:17:22.192458 env[1644]: time="2024-02-09T19:17:22.192391079Z" level=info msg="StartContainer for \"f47786021e9dce85d09b63e21fad9bc2ef75687f3953c9c2b6ed7be13b467b70\"" Feb 9 19:17:22.203570 systemd[1]: Started cri-containerd-1f48f084c6bc3dcabbb4f849d7428108c4977b187fddb3b38acc1bfd937b6687.scope. Feb 9 19:17:22.212638 kubelet[2321]: E0209 19:17:22.212582 2321 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.31.30:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-31-30?timeout=10s\": dial tcp 172.31.31.30:6443: connect: connection refused" interval="1.6s" Feb 9 19:17:22.213265 env[1644]: time="2024-02-09T19:17:22.213090596Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-31-30,Uid:e55c83318a74e7976b29fedeabfce93c,Namespace:kube-system,Attempt:0,} returns sandbox id \"577a0c1b6bf9769d502287ab9ac03f0647533d49d7bcec1374b60bdb47295285\"" Feb 9 19:17:22.218598 env[1644]: time="2024-02-09T19:17:22.218480678Z" level=info msg="CreateContainer within sandbox \"577a0c1b6bf9769d502287ab9ac03f0647533d49d7bcec1374b60bdb47295285\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 19:17:22.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.247000 audit: BPF prog-id=82 op=LOAD Feb 9 19:17:22.248000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.248000 audit[2479]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2360 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166343866303834633662633364636162626234663834396437343238 Feb 9 19:17:22.248000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.248000 audit[2479]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2360 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166343866303834633662633364636162626234663834396437343238 Feb 9 19:17:22.248000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.248000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.248000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.248000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.248000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.248000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.248000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.248000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.248000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.248000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.248000 audit: BPF prog-id=83 op=LOAD Feb 9 19:17:22.248000 audit[2479]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2360 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166343866303834633662633364636162626234663834396437343238 Feb 9 19:17:22.252480 env[1644]: time="2024-02-09T19:17:22.251694287Z" level=info msg="CreateContainer within sandbox \"577a0c1b6bf9769d502287ab9ac03f0647533d49d7bcec1374b60bdb47295285\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"ad0db9a3ac49184bd486d0ad4140e5f8d6367a6a0604aa4a212a980b035b3087\"" Feb 9 19:17:22.249000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.249000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.249000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.253239 env[1644]: time="2024-02-09T19:17:22.253183403Z" level=info msg="StartContainer for \"ad0db9a3ac49184bd486d0ad4140e5f8d6367a6a0604aa4a212a980b035b3087\"" Feb 9 19:17:22.249000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.249000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.249000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.249000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.249000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.249000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.249000 audit: BPF prog-id=84 op=LOAD Feb 9 19:17:22.249000 audit[2479]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2360 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166343866303834633662633364636162626234663834396437343238 Feb 9 19:17:22.252000 audit: BPF prog-id=84 op=UNLOAD Feb 9 19:17:22.252000 audit: BPF prog-id=83 op=UNLOAD Feb 9 19:17:22.252000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.252000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.252000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.252000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.252000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.252000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.252000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.252000 audit[2479]: AVC avc: denied { perfmon } for pid=2479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.252000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.252000 audit[2479]: AVC avc: denied { bpf } for pid=2479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.252000 audit: BPF prog-id=85 op=LOAD Feb 9 19:17:22.252000 audit[2479]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2360 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166343866303834633662633364636162626234663834396437343238 Feb 9 19:17:22.292925 systemd[1]: Started cri-containerd-f47786021e9dce85d09b63e21fad9bc2ef75687f3953c9c2b6ed7be13b467b70.scope. Feb 9 19:17:22.306847 systemd[1]: Started cri-containerd-ad0db9a3ac49184bd486d0ad4140e5f8d6367a6a0604aa4a212a980b035b3087.scope. Feb 9 19:17:22.320789 kubelet[2321]: I0209 19:17:22.320739 2321 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-31-30" Feb 9 19:17:22.321693 kubelet[2321]: E0209 19:17:22.321646 2321 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.31.30:6443/api/v1/nodes\": dial tcp 172.31.31.30:6443: connect: connection refused" node="ip-172-31-31-30" Feb 9 19:17:22.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.352000 audit: BPF prog-id=86 op=LOAD Feb 9 19:17:22.354000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.354000 audit[2523]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2407 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164306462396133616334393138346264343836643061643431343065 Feb 9 19:17:22.354000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.354000 audit[2523]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2407 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164306462396133616334393138346264343836643061643431343065 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit: BPF prog-id=87 op=LOAD Feb 9 19:17:22.356000 audit[2523]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2407 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164306462396133616334393138346264343836643061643431343065 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit: BPF prog-id=88 op=LOAD Feb 9 19:17:22.356000 audit[2523]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2407 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164306462396133616334393138346264343836643061643431343065 Feb 9 19:17:22.356000 audit: BPF prog-id=88 op=UNLOAD Feb 9 19:17:22.356000 audit: BPF prog-id=87 op=UNLOAD Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.356000 audit: BPF prog-id=89 op=LOAD Feb 9 19:17:22.356000 audit[2523]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2407 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164306462396133616334393138346264343836643061643431343065 Feb 9 19:17:22.370028 env[1644]: time="2024-02-09T19:17:22.369961910Z" level=info msg="StartContainer for \"1f48f084c6bc3dcabbb4f849d7428108c4977b187fddb3b38acc1bfd937b6687\" returns successfully" Feb 9 19:17:22.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.375000 audit: BPF prog-id=90 op=LOAD Feb 9 19:17:22.376000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.376000 audit[2510]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=2380 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634373738363032316539646365383564303962363365323166616439 Feb 9 19:17:22.377000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.377000 audit[2510]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2380 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634373738363032316539646365383564303962363365323166616439 Feb 9 19:17:22.377000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.377000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.377000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.377000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.377000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.377000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.377000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.377000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.377000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.377000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.377000 audit: BPF prog-id=91 op=LOAD Feb 9 19:17:22.377000 audit[2510]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2380 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634373738363032316539646365383564303962363365323166616439 Feb 9 19:17:22.379000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.379000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.379000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.379000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.379000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.379000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.379000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.379000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.379000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.379000 audit: BPF prog-id=92 op=LOAD Feb 9 19:17:22.379000 audit[2510]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2380 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634373738363032316539646365383564303962363365323166616439 Feb 9 19:17:22.383000 audit: BPF prog-id=92 op=UNLOAD Feb 9 19:17:22.383000 audit: BPF prog-id=91 op=UNLOAD Feb 9 19:17:22.383000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.383000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.383000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.383000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.383000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.383000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.383000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.383000 audit[2510]: AVC avc: denied { perfmon } for pid=2510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.383000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.383000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:22.383000 audit: BPF prog-id=93 op=LOAD Feb 9 19:17:22.383000 audit[2510]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2380 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:22.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634373738363032316539646365383564303962363365323166616439 Feb 9 19:17:22.457414 env[1644]: time="2024-02-09T19:17:22.457340658Z" level=info msg="StartContainer for \"f47786021e9dce85d09b63e21fad9bc2ef75687f3953c9c2b6ed7be13b467b70\" returns successfully" Feb 9 19:17:22.461792 env[1644]: time="2024-02-09T19:17:22.461708574Z" level=info msg="StartContainer for \"ad0db9a3ac49184bd486d0ad4140e5f8d6367a6a0604aa4a212a980b035b3087\" returns successfully" Feb 9 19:17:22.514632 kubelet[2321]: E0209 19:17:22.514507 2321 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-31-30.17b247e1160fac51", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-31-30", UID:"ip-172-31-31-30", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-31-30"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 17, 20, 790178897, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 17, 20, 790178897, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ip-172-31-31-30"}': 'Post "https://172.31.31.30:6443/api/v1/namespaces/default/events": dial tcp 172.31.31.30:6443: connect: connection refused'(may retry after sleeping) Feb 9 19:17:23.465930 update_engine[1637]: I0209 19:17:23.465867 1637 update_attempter.cc:509] Updating boot flags... Feb 9 19:17:23.924547 kubelet[2321]: I0209 19:17:23.923993 2321 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-31-30" Feb 9 19:17:25.960000 audit[2537]: AVC avc: denied { watch } for pid=2537 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:25.963831 kernel: kauditd_printk_skb: 577 callbacks suppressed Feb 9 19:17:25.963922 kernel: audit: type=1400 audit(1707506245.960:714): avc: denied { watch } for pid=2537 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:25.973000 audit[2537]: AVC avc: denied { watch } for pid=2537 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:25.986413 kernel: audit: type=1400 audit(1707506245.973:715): avc: denied { watch } for pid=2537 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:25.973000 audit[2537]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=4006f14b60 a2=fc6 a3=0 items=0 ppid=2380 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 key=(null) Feb 9 19:17:26.001757 kernel: audit: type=1300 audit(1707506245.973:715): arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=4006f14b60 a2=fc6 a3=0 items=0 ppid=2380 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 key=(null) Feb 9 19:17:25.973000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:17:26.015138 kernel: audit: type=1327 audit(1707506245.973:715): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:17:25.960000 audit[2537]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=40067c0cc0 a2=fc6 a3=0 items=0 ppid=2380 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 key=(null) Feb 9 19:17:26.032934 kernel: audit: type=1300 audit(1707506245.960:714): arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=40067c0cc0 a2=fc6 a3=0 items=0 ppid=2380 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 key=(null) Feb 9 19:17:25.960000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:17:26.045131 kernel: audit: type=1327 audit(1707506245.960:714): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:17:25.981000 audit[2537]: AVC avc: denied { watch } for pid=2537 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520990 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:26.056227 kernel: audit: type=1400 audit(1707506245.981:716): avc: denied { watch } for pid=2537 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520990 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:25.981000 audit[2537]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=40067c0d20 a2=fc6 a3=0 items=0 ppid=2380 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 key=(null) Feb 9 19:17:26.071937 kernel: audit: type=1300 audit(1707506245.981:716): arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=40067c0d20 a2=fc6 a3=0 items=0 ppid=2380 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 key=(null) Feb 9 19:17:25.981000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:17:26.083966 kernel: audit: type=1327 audit(1707506245.981:716): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:17:26.022000 audit[2537]: AVC avc: denied { watch } for pid=2537 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:26.095839 kernel: audit: type=1400 audit(1707506246.022:717): avc: denied { watch } for pid=2537 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:26.022000 audit[2537]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4a a1=40063752f0 a2=fc6 a3=0 items=0 ppid=2380 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 key=(null) Feb 9 19:17:26.022000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:17:26.028000 audit[2537]: AVC avc: denied { watch } for pid=2537 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:26.028000 audit[2537]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=4001dcd900 a2=fc6 a3=0 items=0 ppid=2380 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 key=(null) Feb 9 19:17:26.028000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:17:26.054000 audit[2537]: AVC avc: denied { watch } for pid=2537 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:26.054000 audit[2537]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4f a1=4006c1d440 a2=fc6 a3=0 items=0 ppid=2380 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 key=(null) Feb 9 19:17:26.054000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:17:26.294732 kubelet[2321]: E0209 19:17:26.294613 2321 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-31-30\" not found" node="ip-172-31-31-30" Feb 9 19:17:26.604783 kubelet[2321]: I0209 19:17:26.604742 2321 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-31-30" Feb 9 19:17:26.789400 kubelet[2321]: I0209 19:17:26.789346 2321 apiserver.go:52] "Watching apiserver" Feb 9 19:17:26.803432 kubelet[2321]: I0209 19:17:26.803390 2321 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 19:17:27.255000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:27.255000 audit[2502]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000784030 a2=fc6 a3=0 items=0 ppid=2360 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 key=(null) Feb 9 19:17:27.255000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:27.256000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:27.256000 audit[2502]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40000e80a0 a2=fc6 a3=0 items=0 ppid=2360 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 key=(null) Feb 9 19:17:27.256000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:29.075380 systemd[1]: Reloading. Feb 9 19:17:29.288874 /usr/lib/systemd/system-generators/torcx-generator[2791]: time="2024-02-09T19:17:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:17:29.288957 /usr/lib/systemd/system-generators/torcx-generator[2791]: time="2024-02-09T19:17:29Z" level=info msg="torcx already run" Feb 9 19:17:29.495853 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:17:29.495891 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:17:29.534310 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:17:29.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.733000 audit: BPF prog-id=94 op=LOAD Feb 9 19:17:29.733000 audit: BPF prog-id=55 op=UNLOAD Feb 9 19:17:29.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.754000 audit: BPF prog-id=95 op=LOAD Feb 9 19:17:29.754000 audit: BPF prog-id=56 op=UNLOAD Feb 9 19:17:29.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.754000 audit: BPF prog-id=96 op=LOAD Feb 9 19:17:29.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.755000 audit: BPF prog-id=97 op=LOAD Feb 9 19:17:29.755000 audit: BPF prog-id=57 op=UNLOAD Feb 9 19:17:29.755000 audit: BPF prog-id=58 op=UNLOAD Feb 9 19:17:29.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.756000 audit: BPF prog-id=98 op=LOAD Feb 9 19:17:29.756000 audit: BPF prog-id=74 op=UNLOAD Feb 9 19:17:29.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.764000 audit: BPF prog-id=99 op=LOAD Feb 9 19:17:29.764000 audit: BPF prog-id=59 op=UNLOAD Feb 9 19:17:29.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.764000 audit: BPF prog-id=100 op=LOAD Feb 9 19:17:29.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.764000 audit: BPF prog-id=101 op=LOAD Feb 9 19:17:29.764000 audit: BPF prog-id=60 op=UNLOAD Feb 9 19:17:29.764000 audit: BPF prog-id=61 op=UNLOAD Feb 9 19:17:29.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.766000 audit: BPF prog-id=102 op=LOAD Feb 9 19:17:29.766000 audit: BPF prog-id=62 op=UNLOAD Feb 9 19:17:29.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.768000 audit: BPF prog-id=103 op=LOAD Feb 9 19:17:29.768000 audit: BPF prog-id=63 op=UNLOAD Feb 9 19:17:29.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.769000 audit: BPF prog-id=104 op=LOAD Feb 9 19:17:29.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.769000 audit: BPF prog-id=105 op=LOAD Feb 9 19:17:29.769000 audit: BPF prog-id=64 op=UNLOAD Feb 9 19:17:29.769000 audit: BPF prog-id=65 op=UNLOAD Feb 9 19:17:29.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.775000 audit: BPF prog-id=106 op=LOAD Feb 9 19:17:29.775000 audit: BPF prog-id=66 op=UNLOAD Feb 9 19:17:29.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.776000 audit: BPF prog-id=107 op=LOAD Feb 9 19:17:29.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.776000 audit: BPF prog-id=108 op=LOAD Feb 9 19:17:29.776000 audit: BPF prog-id=67 op=UNLOAD Feb 9 19:17:29.776000 audit: BPF prog-id=68 op=UNLOAD Feb 9 19:17:29.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.779000 audit: BPF prog-id=109 op=LOAD Feb 9 19:17:29.779000 audit: BPF prog-id=90 op=UNLOAD Feb 9 19:17:29.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.782000 audit: BPF prog-id=110 op=LOAD Feb 9 19:17:29.782000 audit: BPF prog-id=69 op=UNLOAD Feb 9 19:17:29.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.784000 audit: BPF prog-id=111 op=LOAD Feb 9 19:17:29.784000 audit: BPF prog-id=78 op=UNLOAD Feb 9 19:17:29.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.785000 audit: BPF prog-id=112 op=LOAD Feb 9 19:17:29.785000 audit: BPF prog-id=86 op=UNLOAD Feb 9 19:17:29.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.787000 audit: BPF prog-id=113 op=LOAD Feb 9 19:17:29.787000 audit: BPF prog-id=82 op=UNLOAD Feb 9 19:17:29.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:29.788000 audit: BPF prog-id=114 op=LOAD Feb 9 19:17:29.788000 audit: BPF prog-id=70 op=UNLOAD Feb 9 19:17:29.822405 systemd[1]: Stopping kubelet.service... Feb 9 19:17:29.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:29.838440 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 19:17:29.838873 systemd[1]: Stopped kubelet.service. Feb 9 19:17:29.838960 systemd[1]: kubelet.service: Consumed 1.385s CPU time. Feb 9 19:17:29.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:29.844355 systemd[1]: Started kubelet.service. Feb 9 19:17:29.989682 kubelet[2844]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:17:29.989682 kubelet[2844]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 19:17:29.989682 kubelet[2844]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:17:29.994034 kubelet[2844]: I0209 19:17:29.993940 2844 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:17:30.007567 kubelet[2844]: I0209 19:17:30.007435 2844 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 9 19:17:30.007763 kubelet[2844]: I0209 19:17:30.007739 2844 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:17:30.008252 kubelet[2844]: I0209 19:17:30.008221 2844 server.go:895] "Client rotation is on, will bootstrap in background" Feb 9 19:17:30.015070 kubelet[2844]: I0209 19:17:30.015017 2844 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 19:17:30.018232 kubelet[2844]: I0209 19:17:30.018199 2844 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:17:30.031130 kubelet[2844]: W0209 19:17:30.031090 2844 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 19:17:30.032749 kubelet[2844]: I0209 19:17:30.032711 2844 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:17:30.033413 kubelet[2844]: I0209 19:17:30.033387 2844 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:17:30.033799 kubelet[2844]: I0209 19:17:30.033771 2844 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 9 19:17:30.034154 kubelet[2844]: I0209 19:17:30.034128 2844 topology_manager.go:138] "Creating topology manager with none policy" Feb 9 19:17:30.034282 kubelet[2844]: I0209 19:17:30.034261 2844 container_manager_linux.go:301] "Creating device plugin manager" Feb 9 19:17:30.034438 kubelet[2844]: I0209 19:17:30.034417 2844 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:17:30.034710 kubelet[2844]: I0209 19:17:30.034689 2844 kubelet.go:393] "Attempting to sync node with API server" Feb 9 19:17:30.034866 kubelet[2844]: I0209 19:17:30.034846 2844 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:17:30.035082 kubelet[2844]: I0209 19:17:30.035046 2844 kubelet.go:309] "Adding apiserver pod source" Feb 9 19:17:30.035225 kubelet[2844]: I0209 19:17:30.035204 2844 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:17:30.050865 kubelet[2844]: I0209 19:17:30.048977 2844 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:17:30.058096 kubelet[2844]: I0209 19:17:30.058027 2844 server.go:1232] "Started kubelet" Feb 9 19:17:30.098678 kubelet[2844]: I0209 19:17:30.098619 2844 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:17:30.099925 kubelet[2844]: I0209 19:17:30.099870 2844 server.go:462] "Adding debug handlers to kubelet server" Feb 9 19:17:30.104958 kubelet[2844]: I0209 19:17:30.101802 2844 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 19:17:30.105285 kubelet[2844]: I0209 19:17:30.105243 2844 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 9 19:17:30.108000 audit[2844]: AVC avc: denied { mac_admin } for pid=2844 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.108000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:17:30.108000 audit[2844]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b404b0 a1=40007b06c0 a2=4000b40480 a3=25 items=0 ppid=1 pid=2844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:30.108000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:17:30.109000 audit[2844]: AVC avc: denied { mac_admin } for pid=2844 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.109000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:17:30.109000 audit[2844]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c7acc0 a1=40007b06f0 a2=4000b40540 a3=25 items=0 ppid=1 pid=2844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:30.109000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:17:30.110887 kubelet[2844]: I0209 19:17:30.110405 2844 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:17:30.110887 kubelet[2844]: I0209 19:17:30.110519 2844 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:17:30.110887 kubelet[2844]: I0209 19:17:30.110565 2844 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:17:30.119495 kubelet[2844]: E0209 19:17:30.119454 2844 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:17:30.163024 kubelet[2844]: E0209 19:17:30.162973 2844 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:17:30.163600 kubelet[2844]: I0209 19:17:30.147291 2844 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 9 19:17:30.163724 kubelet[2844]: I0209 19:17:30.147316 2844 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 19:17:30.164025 kubelet[2844]: I0209 19:17:30.163986 2844 reconciler_new.go:29] "Reconciler: start to sync state" Feb 9 19:17:30.186049 kubelet[2844]: I0209 19:17:30.185989 2844 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 9 19:17:30.192865 kubelet[2844]: I0209 19:17:30.192486 2844 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 9 19:17:30.192865 kubelet[2844]: I0209 19:17:30.192541 2844 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 9 19:17:30.192865 kubelet[2844]: I0209 19:17:30.192574 2844 kubelet.go:2303] "Starting kubelet main sync loop" Feb 9 19:17:30.192865 kubelet[2844]: E0209 19:17:30.192655 2844 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 19:17:30.251735 kubelet[2844]: I0209 19:17:30.251699 2844 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-31-30" Feb 9 19:17:30.277429 kubelet[2844]: I0209 19:17:30.277297 2844 kubelet_node_status.go:108] "Node was previously registered" node="ip-172-31-31-30" Feb 9 19:17:30.281481 kubelet[2844]: I0209 19:17:30.281434 2844 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-31-30" Feb 9 19:17:30.293663 kubelet[2844]: E0209 19:17:30.293607 2844 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 9 19:17:30.366017 kubelet[2844]: I0209 19:17:30.365980 2844 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:17:30.366219 kubelet[2844]: I0209 19:17:30.366196 2844 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:17:30.366369 kubelet[2844]: I0209 19:17:30.366348 2844 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:17:30.366697 kubelet[2844]: I0209 19:17:30.366674 2844 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 19:17:30.366882 kubelet[2844]: I0209 19:17:30.366860 2844 state_mem.go:96] "Updated CPUSet assignments" assignments={} Feb 9 19:17:30.367025 kubelet[2844]: I0209 19:17:30.367004 2844 policy_none.go:49] "None policy: Start" Feb 9 19:17:30.368635 kubelet[2844]: I0209 19:17:30.368602 2844 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:17:30.368907 kubelet[2844]: I0209 19:17:30.368885 2844 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:17:30.369314 kubelet[2844]: I0209 19:17:30.369289 2844 state_mem.go:75] "Updated machine memory state" Feb 9 19:17:30.377635 kubelet[2844]: I0209 19:17:30.377602 2844 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:17:30.377000 audit[2844]: AVC avc: denied { mac_admin } for pid=2844 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:30.377000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:17:30.377000 audit[2844]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b40d20 a1=4000d071a0 a2=4000b40cf0 a3=25 items=0 ppid=1 pid=2844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:30.377000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:17:30.378396 kubelet[2844]: I0209 19:17:30.378364 2844 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:17:30.380093 kubelet[2844]: I0209 19:17:30.380059 2844 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:17:30.496089 kubelet[2844]: I0209 19:17:30.496044 2844 topology_manager.go:215] "Topology Admit Handler" podUID="8db5c03745b7018ec350163fcf206e50" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-31-30" Feb 9 19:17:30.496442 kubelet[2844]: I0209 19:17:30.496413 2844 topology_manager.go:215] "Topology Admit Handler" podUID="3a28abe51565cfc4a914d846bfea2f82" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-31-30" Feb 9 19:17:30.496651 kubelet[2844]: I0209 19:17:30.496627 2844 topology_manager.go:215] "Topology Admit Handler" podUID="e55c83318a74e7976b29fedeabfce93c" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-31-30" Feb 9 19:17:30.566461 kubelet[2844]: I0209 19:17:30.566318 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8db5c03745b7018ec350163fcf206e50-k8s-certs\") pod \"kube-apiserver-ip-172-31-31-30\" (UID: \"8db5c03745b7018ec350163fcf206e50\") " pod="kube-system/kube-apiserver-ip-172-31-31-30" Feb 9 19:17:30.566855 kubelet[2844]: I0209 19:17:30.566829 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3a28abe51565cfc4a914d846bfea2f82-k8s-certs\") pod \"kube-controller-manager-ip-172-31-31-30\" (UID: \"3a28abe51565cfc4a914d846bfea2f82\") " pod="kube-system/kube-controller-manager-ip-172-31-31-30" Feb 9 19:17:30.567101 kubelet[2844]: I0209 19:17:30.567080 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3a28abe51565cfc4a914d846bfea2f82-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-31-30\" (UID: \"3a28abe51565cfc4a914d846bfea2f82\") " pod="kube-system/kube-controller-manager-ip-172-31-31-30" Feb 9 19:17:30.567349 kubelet[2844]: I0209 19:17:30.567328 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e55c83318a74e7976b29fedeabfce93c-kubeconfig\") pod \"kube-scheduler-ip-172-31-31-30\" (UID: \"e55c83318a74e7976b29fedeabfce93c\") " pod="kube-system/kube-scheduler-ip-172-31-31-30" Feb 9 19:17:30.567620 kubelet[2844]: I0209 19:17:30.567596 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8db5c03745b7018ec350163fcf206e50-ca-certs\") pod \"kube-apiserver-ip-172-31-31-30\" (UID: \"8db5c03745b7018ec350163fcf206e50\") " pod="kube-system/kube-apiserver-ip-172-31-31-30" Feb 9 19:17:30.568200 kubelet[2844]: I0209 19:17:30.568170 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8db5c03745b7018ec350163fcf206e50-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-31-30\" (UID: \"8db5c03745b7018ec350163fcf206e50\") " pod="kube-system/kube-apiserver-ip-172-31-31-30" Feb 9 19:17:30.568506 kubelet[2844]: I0209 19:17:30.568483 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3a28abe51565cfc4a914d846bfea2f82-ca-certs\") pod \"kube-controller-manager-ip-172-31-31-30\" (UID: \"3a28abe51565cfc4a914d846bfea2f82\") " pod="kube-system/kube-controller-manager-ip-172-31-31-30" Feb 9 19:17:30.568748 kubelet[2844]: I0209 19:17:30.568726 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/3a28abe51565cfc4a914d846bfea2f82-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-31-30\" (UID: \"3a28abe51565cfc4a914d846bfea2f82\") " pod="kube-system/kube-controller-manager-ip-172-31-31-30" Feb 9 19:17:30.569024 kubelet[2844]: I0209 19:17:30.569002 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3a28abe51565cfc4a914d846bfea2f82-kubeconfig\") pod \"kube-controller-manager-ip-172-31-31-30\" (UID: \"3a28abe51565cfc4a914d846bfea2f82\") " pod="kube-system/kube-controller-manager-ip-172-31-31-30" Feb 9 19:17:31.036633 kubelet[2844]: I0209 19:17:31.036580 2844 apiserver.go:52] "Watching apiserver" Feb 9 19:17:31.064735 kubelet[2844]: I0209 19:17:31.064685 2844 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 19:17:31.296492 kubelet[2844]: I0209 19:17:31.296343 2844 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-31-30" podStartSLOduration=1.29627678 podCreationTimestamp="2024-02-09 19:17:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:17:31.296253713 +0000 UTC m=+1.441029092" watchObservedRunningTime="2024-02-09 19:17:31.29627678 +0000 UTC m=+1.441052135" Feb 9 19:17:31.309922 kubelet[2844]: I0209 19:17:31.309867 2844 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-31-30" podStartSLOduration=1.309774123 podCreationTimestamp="2024-02-09 19:17:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:17:31.308622662 +0000 UTC m=+1.453398041" watchObservedRunningTime="2024-02-09 19:17:31.309774123 +0000 UTC m=+1.454549478" Feb 9 19:17:31.339095 kubelet[2844]: I0209 19:17:31.339043 2844 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-31-30" podStartSLOduration=1.338989712 podCreationTimestamp="2024-02-09 19:17:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:17:31.323070891 +0000 UTC m=+1.467846270" watchObservedRunningTime="2024-02-09 19:17:31.338989712 +0000 UTC m=+1.483765103" Feb 9 19:17:33.605530 amazon-ssm-agent[1620]: 2024-02-09 19:17:33 INFO [HealthCheck] HealthCheck reporting agent health. Feb 9 19:17:36.357969 sudo[1908]: pam_unix(sudo:session): session closed for user root Feb 9 19:17:36.357000 audit[1908]: USER_END pid=1908 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:17:36.360693 kernel: kauditd_printk_skb: 272 callbacks suppressed Feb 9 19:17:36.360833 kernel: audit: type=1106 audit(1707506256.357:971): pid=1908 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:17:36.358000 audit[1908]: CRED_DISP pid=1908 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:17:36.377974 kernel: audit: type=1104 audit(1707506256.358:972): pid=1908 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:17:36.381951 sshd[1905]: pam_unix(sshd:session): session closed for user core Feb 9 19:17:36.382000 audit[1905]: USER_END pid=1905 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:36.398258 systemd-logind[1636]: Session 7 logged out. Waiting for processes to exit. Feb 9 19:17:36.399595 systemd[1]: sshd@6-172.31.31.30:22-147.75.109.163:54060.service: Deactivated successfully. Feb 9 19:17:36.382000 audit[1905]: CRED_DISP pid=1905 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:36.400941 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 19:17:36.401307 systemd[1]: session-7.scope: Consumed 10.242s CPU time. Feb 9 19:17:36.411147 kernel: audit: type=1106 audit(1707506256.382:973): pid=1905 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:36.411220 kernel: audit: type=1104 audit(1707506256.382:974): pid=1905 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:17:36.411547 systemd-logind[1636]: Removed session 7. Feb 9 19:17:36.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.31.30:22-147.75.109.163:54060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:36.421630 kernel: audit: type=1131 audit(1707506256.399:975): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.31.30:22-147.75.109.163:54060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:17:37.323178 amazon-ssm-agent[1620]: 2024-02-09 19:17:37 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Feb 9 19:17:39.947000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521021 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 19:17:39.947000 audit[2502]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000c986c0 a2=fc6 a3=0 items=0 ppid=2360 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 key=(null) Feb 9 19:17:39.971650 kernel: audit: type=1400 audit(1707506259.947:976): avc: denied { watch } for pid=2502 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521021 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 19:17:39.971838 kernel: audit: type=1300 audit(1707506259.947:976): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000c986c0 a2=fc6 a3=0 items=0 ppid=2360 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 key=(null) Feb 9 19:17:39.947000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:39.982566 kernel: audit: type=1327 audit(1707506259.947:976): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:42.152000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:42.152000 audit[2502]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001089b00 a2=fc6 a3=0 items=0 ppid=2360 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 key=(null) Feb 9 19:17:42.175920 kernel: audit: type=1400 audit(1707506262.152:977): avc: denied { watch } for pid=2502 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:42.176021 kernel: audit: type=1300 audit(1707506262.152:977): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001089b00 a2=fc6 a3=0 items=0 ppid=2360 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 key=(null) Feb 9 19:17:42.152000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:42.186402 kernel: audit: type=1327 audit(1707506262.152:977): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:42.156000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:42.195904 kernel: audit: type=1400 audit(1707506262.156:978): avc: denied { watch } for pid=2502 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:42.156000 audit[2502]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000990440 a2=fc6 a3=0 items=0 ppid=2360 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 key=(null) Feb 9 19:17:42.209520 kernel: audit: type=1300 audit(1707506262.156:978): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000990440 a2=fc6 a3=0 items=0 ppid=2360 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 key=(null) Feb 9 19:17:42.156000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:42.221121 kernel: audit: type=1327 audit(1707506262.156:978): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:42.157000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:42.232339 kernel: audit: type=1400 audit(1707506262.157:979): avc: denied { watch } for pid=2502 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:42.157000 audit[2502]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000990480 a2=fc6 a3=0 items=0 ppid=2360 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 key=(null) Feb 9 19:17:42.157000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:42.257584 kernel: audit: type=1300 audit(1707506262.157:979): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000990480 a2=fc6 a3=0 items=0 ppid=2360 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 key=(null) Feb 9 19:17:42.257721 kernel: audit: type=1327 audit(1707506262.157:979): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:42.157000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:42.267994 kernel: audit: type=1400 audit(1707506262.157:980): avc: denied { watch } for pid=2502 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:17:42.157000 audit[2502]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40009904c0 a2=fc6 a3=0 items=0 ppid=2360 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 key=(null) Feb 9 19:17:42.157000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:17:43.599650 kubelet[2844]: I0209 19:17:43.599601 2844 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 9 19:17:43.601387 env[1644]: time="2024-02-09T19:17:43.601311575Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 19:17:43.602449 kubelet[2844]: I0209 19:17:43.602420 2844 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 9 19:17:44.380372 kubelet[2844]: I0209 19:17:44.380309 2844 topology_manager.go:215] "Topology Admit Handler" podUID="1d46c910-c974-4f6f-9ae3-36fa132878ba" podNamespace="kube-system" podName="kube-proxy-5m9p7" Feb 9 19:17:44.392625 systemd[1]: Created slice kubepods-besteffort-pod1d46c910_c974_4f6f_9ae3_36fa132878ba.slice. Feb 9 19:17:44.561771 kubelet[2844]: I0209 19:17:44.561724 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/1d46c910-c974-4f6f-9ae3-36fa132878ba-kube-proxy\") pod \"kube-proxy-5m9p7\" (UID: \"1d46c910-c974-4f6f-9ae3-36fa132878ba\") " pod="kube-system/kube-proxy-5m9p7" Feb 9 19:17:44.562076 kubelet[2844]: I0209 19:17:44.562049 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1d46c910-c974-4f6f-9ae3-36fa132878ba-xtables-lock\") pod \"kube-proxy-5m9p7\" (UID: \"1d46c910-c974-4f6f-9ae3-36fa132878ba\") " pod="kube-system/kube-proxy-5m9p7" Feb 9 19:17:44.562338 kubelet[2844]: I0209 19:17:44.562313 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1d46c910-c974-4f6f-9ae3-36fa132878ba-lib-modules\") pod \"kube-proxy-5m9p7\" (UID: \"1d46c910-c974-4f6f-9ae3-36fa132878ba\") " pod="kube-system/kube-proxy-5m9p7" Feb 9 19:17:44.562566 kubelet[2844]: I0209 19:17:44.562522 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t2dw8\" (UniqueName: \"kubernetes.io/projected/1d46c910-c974-4f6f-9ae3-36fa132878ba-kube-api-access-t2dw8\") pod \"kube-proxy-5m9p7\" (UID: \"1d46c910-c974-4f6f-9ae3-36fa132878ba\") " pod="kube-system/kube-proxy-5m9p7" Feb 9 19:17:44.617932 kubelet[2844]: I0209 19:17:44.617875 2844 topology_manager.go:215] "Topology Admit Handler" podUID="d973b9b3-a2ff-45ad-9a01-f58640f70060" podNamespace="tigera-operator" podName="tigera-operator-55585899bf-mvtbz" Feb 9 19:17:44.628985 systemd[1]: Created slice kubepods-besteffort-podd973b9b3_a2ff_45ad_9a01_f58640f70060.slice. Feb 9 19:17:44.663109 kubelet[2844]: I0209 19:17:44.662965 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d973b9b3-a2ff-45ad-9a01-f58640f70060-var-lib-calico\") pod \"tigera-operator-55585899bf-mvtbz\" (UID: \"d973b9b3-a2ff-45ad-9a01-f58640f70060\") " pod="tigera-operator/tigera-operator-55585899bf-mvtbz" Feb 9 19:17:44.663499 kubelet[2844]: I0209 19:17:44.663474 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zdwc5\" (UniqueName: \"kubernetes.io/projected/d973b9b3-a2ff-45ad-9a01-f58640f70060-kube-api-access-zdwc5\") pod \"tigera-operator-55585899bf-mvtbz\" (UID: \"d973b9b3-a2ff-45ad-9a01-f58640f70060\") " pod="tigera-operator/tigera-operator-55585899bf-mvtbz" Feb 9 19:17:44.709110 env[1644]: time="2024-02-09T19:17:44.708961778Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-5m9p7,Uid:1d46c910-c974-4f6f-9ae3-36fa132878ba,Namespace:kube-system,Attempt:0,}" Feb 9 19:17:44.734708 env[1644]: time="2024-02-09T19:17:44.734608387Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:17:44.735074 env[1644]: time="2024-02-09T19:17:44.735015250Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:17:44.735244 env[1644]: time="2024-02-09T19:17:44.735199708Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:17:44.735720 env[1644]: time="2024-02-09T19:17:44.735620793Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/623675e7f3bf1d5ed82f2cd8a049ccaa41b7d8b937a73929306286c8cf1b0118 pid=2928 runtime=io.containerd.runc.v2 Feb 9 19:17:44.778876 systemd[1]: run-containerd-runc-k8s.io-623675e7f3bf1d5ed82f2cd8a049ccaa41b7d8b937a73929306286c8cf1b0118-runc.48n8I0.mount: Deactivated successfully. Feb 9 19:17:44.782393 systemd[1]: Started cri-containerd-623675e7f3bf1d5ed82f2cd8a049ccaa41b7d8b937a73929306286c8cf1b0118.scope. Feb 9 19:17:44.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.813000 audit: BPF prog-id=115 op=LOAD Feb 9 19:17:44.815000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.815000 audit[2938]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2928 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:44.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632333637356537663362663164356564383266326364386130343963 Feb 9 19:17:44.815000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.815000 audit[2938]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2928 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:44.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632333637356537663362663164356564383266326364386130343963 Feb 9 19:17:44.815000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.815000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.815000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.815000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.815000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.815000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.815000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.815000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.815000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.815000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.815000 audit: BPF prog-id=116 op=LOAD Feb 9 19:17:44.815000 audit[2938]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2928 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:44.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632333637356537663362663164356564383266326364386130343963 Feb 9 19:17:44.816000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.816000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.816000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.816000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.816000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.816000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.816000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.816000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.816000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.816000 audit: BPF prog-id=117 op=LOAD Feb 9 19:17:44.816000 audit[2938]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2928 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:44.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632333637356537663362663164356564383266326364386130343963 Feb 9 19:17:44.816000 audit: BPF prog-id=117 op=UNLOAD Feb 9 19:17:44.816000 audit: BPF prog-id=116 op=UNLOAD Feb 9 19:17:44.816000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.816000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.816000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.816000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.816000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.816000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.816000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.816000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.816000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.816000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.816000 audit: BPF prog-id=118 op=LOAD Feb 9 19:17:44.816000 audit[2938]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2928 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:44.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632333637356537663362663164356564383266326364386130343963 Feb 9 19:17:44.848192 env[1644]: time="2024-02-09T19:17:44.848117615Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-5m9p7,Uid:1d46c910-c974-4f6f-9ae3-36fa132878ba,Namespace:kube-system,Attempt:0,} returns sandbox id \"623675e7f3bf1d5ed82f2cd8a049ccaa41b7d8b937a73929306286c8cf1b0118\"" Feb 9 19:17:44.854499 env[1644]: time="2024-02-09T19:17:44.854184747Z" level=info msg="CreateContainer within sandbox \"623675e7f3bf1d5ed82f2cd8a049ccaa41b7d8b937a73929306286c8cf1b0118\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 19:17:44.884617 env[1644]: time="2024-02-09T19:17:44.884557176Z" level=info msg="CreateContainer within sandbox \"623675e7f3bf1d5ed82f2cd8a049ccaa41b7d8b937a73929306286c8cf1b0118\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"8247e527d5d34d58c330cb0977970e2f62995e07b02a361c8fd2dd99cdfc908f\"" Feb 9 19:17:44.889008 env[1644]: time="2024-02-09T19:17:44.888503605Z" level=info msg="StartContainer for \"8247e527d5d34d58c330cb0977970e2f62995e07b02a361c8fd2dd99cdfc908f\"" Feb 9 19:17:44.921550 systemd[1]: Started cri-containerd-8247e527d5d34d58c330cb0977970e2f62995e07b02a361c8fd2dd99cdfc908f.scope. Feb 9 19:17:44.937713 env[1644]: time="2024-02-09T19:17:44.937658694Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-mvtbz,Uid:d973b9b3-a2ff-45ad-9a01-f58640f70060,Namespace:tigera-operator,Attempt:0,}" Feb 9 19:17:44.967000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.967000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2928 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:44.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832343765353237643564333464353863333330636230393737393730 Feb 9 19:17:44.967000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.967000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.967000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.967000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.967000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.967000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.967000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.967000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.967000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.967000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.967000 audit: BPF prog-id=119 op=LOAD Feb 9 19:17:44.967000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2928 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:44.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832343765353237643564333464353863333330636230393737393730 Feb 9 19:17:44.969000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.969000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.969000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.969000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.969000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.969000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.969000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.969000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.969000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.969000 audit: BPF prog-id=120 op=LOAD Feb 9 19:17:44.969000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2928 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:44.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832343765353237643564333464353863333330636230393737393730 Feb 9 19:17:44.970000 audit: BPF prog-id=120 op=UNLOAD Feb 9 19:17:44.970000 audit: BPF prog-id=119 op=UNLOAD Feb 9 19:17:44.970000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.970000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.970000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.970000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.970000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.970000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.970000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.970000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.970000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.970000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:44.970000 audit: BPF prog-id=121 op=LOAD Feb 9 19:17:44.970000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2928 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:44.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832343765353237643564333464353863333330636230393737393730 Feb 9 19:17:44.991205 env[1644]: time="2024-02-09T19:17:44.991083056Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:17:44.991418 env[1644]: time="2024-02-09T19:17:44.991225557Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:17:44.991418 env[1644]: time="2024-02-09T19:17:44.991289368Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:17:44.991769 env[1644]: time="2024-02-09T19:17:44.991663060Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dace44349bd01bf93a55c4cb6f0a4a5be992fc61bc28886f352da630b0de3827 pid=3001 runtime=io.containerd.runc.v2 Feb 9 19:17:45.015695 env[1644]: time="2024-02-09T19:17:45.015612673Z" level=info msg="StartContainer for \"8247e527d5d34d58c330cb0977970e2f62995e07b02a361c8fd2dd99cdfc908f\" returns successfully" Feb 9 19:17:45.024065 systemd[1]: Started cri-containerd-dace44349bd01bf93a55c4cb6f0a4a5be992fc61bc28886f352da630b0de3827.scope. Feb 9 19:17:45.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.068000 audit: BPF prog-id=122 op=LOAD Feb 9 19:17:45.069000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.069000 audit[3018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3001 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461636534343334396264303162663933613535633463623666306134 Feb 9 19:17:45.069000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.069000 audit[3018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3001 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461636534343334396264303162663933613535633463623666306134 Feb 9 19:17:45.069000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.069000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.069000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.069000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.069000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.069000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.069000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.069000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.069000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.069000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.069000 audit: BPF prog-id=123 op=LOAD Feb 9 19:17:45.069000 audit[3018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3001 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461636534343334396264303162663933613535633463623666306134 Feb 9 19:17:45.070000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.070000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.070000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.070000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.070000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.070000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.070000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.070000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.070000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.070000 audit: BPF prog-id=124 op=LOAD Feb 9 19:17:45.070000 audit[3018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3001 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461636534343334396264303162663933613535633463623666306134 Feb 9 19:17:45.070000 audit: BPF prog-id=124 op=UNLOAD Feb 9 19:17:45.070000 audit: BPF prog-id=123 op=UNLOAD Feb 9 19:17:45.070000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.070000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.070000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.070000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.070000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.070000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.070000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.070000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.070000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.070000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:45.070000 audit: BPF prog-id=125 op=LOAD Feb 9 19:17:45.070000 audit[3018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3001 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461636534343334396264303162663933613535633463623666306134 Feb 9 19:17:45.117715 env[1644]: time="2024-02-09T19:17:45.117655450Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-mvtbz,Uid:d973b9b3-a2ff-45ad-9a01-f58640f70060,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"dace44349bd01bf93a55c4cb6f0a4a5be992fc61bc28886f352da630b0de3827\"" Feb 9 19:17:45.121332 env[1644]: time="2024-02-09T19:17:45.121220687Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 9 19:17:45.170000 audit[3068]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=3068 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:45.170000 audit[3068]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe07a9a20 a2=0 a3=ffff9e6136c0 items=0 ppid=2987 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.170000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:17:45.173000 audit[3069]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=3069 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:45.173000 audit[3069]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffca0ce780 a2=0 a3=ffff885916c0 items=0 ppid=2987 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.173000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:17:45.183000 audit[3070]: NETFILTER_CFG table=mangle:40 family=10 entries=1 op=nft_register_chain pid=3070 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:45.183000 audit[3070]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffed7c20e0 a2=0 a3=ffffb65346c0 items=0 ppid=2987 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.183000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:17:45.190000 audit[3071]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=3071 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:45.190000 audit[3071]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe1629db0 a2=0 a3=ffffb442b6c0 items=0 ppid=2987 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.190000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:17:45.195000 audit[3072]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=3072 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:45.195000 audit[3072]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdcb02180 a2=0 a3=ffff98a5d6c0 items=0 ppid=2987 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.195000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:17:45.198000 audit[3073]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=3073 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:45.198000 audit[3073]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd13e4d70 a2=0 a3=ffff833d36c0 items=0 ppid=2987 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.198000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:17:45.278000 audit[3074]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=3074 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:45.278000 audit[3074]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff768a010 a2=0 a3=ffffafa8a6c0 items=0 ppid=2987 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.278000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:17:45.284000 audit[3076]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=3076 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:45.284000 audit[3076]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffffecb1510 a2=0 a3=ffffa21d76c0 items=0 ppid=2987 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.284000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 19:17:45.302000 audit[3079]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=3079 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:45.302000 audit[3079]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc85ccbe0 a2=0 a3=ffff94edb6c0 items=0 ppid=2987 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.302000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 19:17:45.307000 audit[3080]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=3080 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:45.307000 audit[3080]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdd8afed0 a2=0 a3=ffff98bb36c0 items=0 ppid=2987 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.307000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:17:45.317000 audit[3082]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=3082 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:45.317000 audit[3082]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcdf4c780 a2=0 a3=ffffbd3ad6c0 items=0 ppid=2987 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.317000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:17:45.322000 audit[3083]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=3083 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:45.322000 audit[3083]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe73d13e0 a2=0 a3=ffff9a4b96c0 items=0 ppid=2987 pid=3083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.322000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:17:45.328000 audit[3085]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=3085 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:45.328000 audit[3085]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffed01a9c0 a2=0 a3=ffffac2056c0 items=0 ppid=2987 pid=3085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.328000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:17:45.336000 audit[3088]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=3088 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:45.336000 audit[3088]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd4f81b40 a2=0 a3=ffff96a006c0 items=0 ppid=2987 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.336000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 19:17:45.339000 audit[3089]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=3089 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:45.339000 audit[3089]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe8d912f0 a2=0 a3=ffff928236c0 items=0 ppid=2987 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.339000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:17:45.344000 audit[3091]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=3091 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:45.344000 audit[3091]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe17670e0 a2=0 a3=ffffb4b836c0 items=0 ppid=2987 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.344000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:17:45.346000 audit[3092]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=3092 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:45.346000 audit[3092]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe7a31bd0 a2=0 a3=ffff83ee46c0 items=0 ppid=2987 pid=3092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.346000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:17:45.352000 audit[3094]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=3094 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:45.352000 audit[3094]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc5fa59f0 a2=0 a3=ffffbdb7f6c0 items=0 ppid=2987 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.352000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:17:45.359000 audit[3097]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3097 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:45.359000 audit[3097]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffe53aa50 a2=0 a3=ffff875956c0 items=0 ppid=2987 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.359000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:17:45.369000 audit[3100]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3100 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:45.369000 audit[3100]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff60f5c00 a2=0 a3=ffff8fb7e6c0 items=0 ppid=2987 pid=3100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.369000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:17:45.371000 audit[3101]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3101 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:45.371000 audit[3101]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdc57dc10 a2=0 a3=ffff9abe86c0 items=0 ppid=2987 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.371000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:17:45.379000 audit[3103]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3103 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:45.379000 audit[3103]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=fffffd14c730 a2=0 a3=ffffa8fbf6c0 items=0 ppid=2987 pid=3103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.379000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:17:45.387000 audit[3106]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3106 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:45.387000 audit[3106]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc046f4a0 a2=0 a3=ffff842916c0 items=0 ppid=2987 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.387000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:17:45.389000 audit[3107]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3107 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:45.389000 audit[3107]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd17bbe70 a2=0 a3=ffff832dc6c0 items=0 ppid=2987 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.389000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:17:45.394000 audit[3109]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3109 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:17:45.394000 audit[3109]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffd9168370 a2=0 a3=ffffa327a6c0 items=0 ppid=2987 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.394000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:17:45.427000 audit[3115]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3115 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:45.427000 audit[3115]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffe7e707e0 a2=0 a3=ffffb19076c0 items=0 ppid=2987 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.427000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:45.445000 audit[3115]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3115 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:45.445000 audit[3115]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffe7e707e0 a2=0 a3=ffffb19076c0 items=0 ppid=2987 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.445000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:45.451000 audit[3121]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3121 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:45.451000 audit[3121]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffee1e3cc0 a2=0 a3=ffffa64d16c0 items=0 ppid=2987 pid=3121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.451000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:17:45.456000 audit[3123]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3123 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:45.456000 audit[3123]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff4f26af0 a2=0 a3=ffff7fa0c6c0 items=0 ppid=2987 pid=3123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.456000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 19:17:45.464000 audit[3126]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3126 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:45.464000 audit[3126]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffea786f20 a2=0 a3=ffffb8d916c0 items=0 ppid=2987 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.464000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 19:17:45.467000 audit[3127]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3127 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:45.467000 audit[3127]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdf335ee0 a2=0 a3=ffffbb0e66c0 items=0 ppid=2987 pid=3127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.467000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:17:45.472000 audit[3129]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3129 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:45.472000 audit[3129]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff3cb9910 a2=0 a3=ffffaaf3d6c0 items=0 ppid=2987 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.472000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:17:45.475000 audit[3130]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3130 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:45.475000 audit[3130]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffce313c00 a2=0 a3=ffff87ec96c0 items=0 ppid=2987 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.475000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:17:45.484000 audit[3132]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3132 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:45.484000 audit[3132]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe0e28e50 a2=0 a3=ffff8c7496c0 items=0 ppid=2987 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.484000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 19:17:45.491000 audit[3135]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3135 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:45.491000 audit[3135]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffc5503840 a2=0 a3=ffffa11436c0 items=0 ppid=2987 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.491000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:17:45.493000 audit[3136]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3136 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:45.493000 audit[3136]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc3a40000 a2=0 a3=ffff9ab3c6c0 items=0 ppid=2987 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.493000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:17:45.499000 audit[3138]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3138 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:45.499000 audit[3138]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd1dda7f0 a2=0 a3=ffff98a9f6c0 items=0 ppid=2987 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.499000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:17:45.501000 audit[3139]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3139 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:45.501000 audit[3139]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc2031350 a2=0 a3=ffffba2ed6c0 items=0 ppid=2987 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.501000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:17:45.506000 audit[3141]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3141 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:45.506000 audit[3141]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffceed0460 a2=0 a3=ffff944946c0 items=0 ppid=2987 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.506000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:17:45.514000 audit[3144]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3144 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:45.514000 audit[3144]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe575b3e0 a2=0 a3=ffffa403e6c0 items=0 ppid=2987 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.514000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:17:45.521000 audit[3147]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3147 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:45.521000 audit[3147]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe7f799b0 a2=0 a3=ffffa79416c0 items=0 ppid=2987 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.521000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 19:17:45.524000 audit[3148]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3148 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:45.524000 audit[3148]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff95e12f0 a2=0 a3=ffffbde086c0 items=0 ppid=2987 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.524000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:17:45.529000 audit[3150]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3150 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:45.529000 audit[3150]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffff2da7c10 a2=0 a3=ffff85c366c0 items=0 ppid=2987 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.529000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:17:45.536000 audit[3153]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3153 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:45.536000 audit[3153]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffea1fc850 a2=0 a3=ffffa95af6c0 items=0 ppid=2987 pid=3153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.536000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:17:45.538000 audit[3154]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3154 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:45.538000 audit[3154]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd1e91d90 a2=0 a3=ffff9cc6e6c0 items=0 ppid=2987 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.538000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:17:45.543000 audit[3156]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3156 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:45.543000 audit[3156]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffdfed7d90 a2=0 a3=ffff8a72d6c0 items=0 ppid=2987 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.543000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:17:45.545000 audit[3157]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3157 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:45.545000 audit[3157]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd0a7eac0 a2=0 a3=ffff95cad6c0 items=0 ppid=2987 pid=3157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.545000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:17:45.550000 audit[3159]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3159 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:45.550000 audit[3159]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffebc683d0 a2=0 a3=ffffb15226c0 items=0 ppid=2987 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.550000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:17:45.558000 audit[3162]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3162 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:17:45.558000 audit[3162]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcc1a3450 a2=0 a3=ffff901516c0 items=0 ppid=2987 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.558000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:17:45.564000 audit[3164]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3164 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:17:45.564000 audit[3164]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffd84ed880 a2=0 a3=ffff9e57d6c0 items=0 ppid=2987 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.564000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:45.565000 audit[3164]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3164 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:17:45.565000 audit[3164]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffd84ed880 a2=0 a3=ffff9e57d6c0 items=0 ppid=2987 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:45.565000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:46.453867 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3240821098.mount: Deactivated successfully. Feb 9 19:17:47.588047 env[1644]: time="2024-02-09T19:17:47.587990290Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:47.593259 env[1644]: time="2024-02-09T19:17:47.593210109Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:47.597437 env[1644]: time="2024-02-09T19:17:47.597389639Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:47.600396 env[1644]: time="2024-02-09T19:17:47.600332734Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:47.601954 env[1644]: time="2024-02-09T19:17:47.601891229Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f\"" Feb 9 19:17:47.609235 env[1644]: time="2024-02-09T19:17:47.609173168Z" level=info msg="CreateContainer within sandbox \"dace44349bd01bf93a55c4cb6f0a4a5be992fc61bc28886f352da630b0de3827\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 9 19:17:47.626401 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount433624566.mount: Deactivated successfully. Feb 9 19:17:47.638144 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1302854881.mount: Deactivated successfully. Feb 9 19:17:47.644259 env[1644]: time="2024-02-09T19:17:47.644188495Z" level=info msg="CreateContainer within sandbox \"dace44349bd01bf93a55c4cb6f0a4a5be992fc61bc28886f352da630b0de3827\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"eec34b3d6ea91bc045981ad25ea7d8de1951e7650e1f9904c65b57141d7a5a04\"" Feb 9 19:17:47.645254 env[1644]: time="2024-02-09T19:17:47.645200498Z" level=info msg="StartContainer for \"eec34b3d6ea91bc045981ad25ea7d8de1951e7650e1f9904c65b57141d7a5a04\"" Feb 9 19:17:47.685379 systemd[1]: Started cri-containerd-eec34b3d6ea91bc045981ad25ea7d8de1951e7650e1f9904c65b57141d7a5a04.scope. Feb 9 19:17:47.723851 kernel: kauditd_printk_skb: 312 callbacks suppressed Feb 9 19:17:47.723978 kernel: audit: type=1400 audit(1707506267.722:1074): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.740618 kernel: audit: type=1400 audit(1707506267.725:1075): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.748508 kernel: audit: type=1400 audit(1707506267.725:1076): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.757985 kernel: audit: type=1400 audit(1707506267.725:1077): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.774030 kernel: audit: type=1400 audit(1707506267.725:1078): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.774152 kernel: audit: type=1400 audit(1707506267.725:1079): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.783531 kernel: audit: type=1400 audit(1707506267.725:1080): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.793836 kernel: audit: type=1400 audit(1707506267.725:1081): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.804516 kernel: audit: type=1400 audit(1707506267.725:1082): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.812656 kernel: audit: type=1400 audit(1707506267.732:1083): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.732000 audit: BPF prog-id=126 op=LOAD Feb 9 19:17:47.732000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.732000 audit[3173]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3001 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:47.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565633334623364366561393162633034353938316164323565613764 Feb 9 19:17:47.732000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.732000 audit[3173]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3001 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:47.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565633334623364366561393162633034353938316164323565613764 Feb 9 19:17:47.732000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.732000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.732000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.732000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.732000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.732000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.732000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.732000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.732000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.732000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.732000 audit: BPF prog-id=127 op=LOAD Feb 9 19:17:47.732000 audit[3173]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3001 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:47.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565633334623364366561393162633034353938316164323565613764 Feb 9 19:17:47.740000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.740000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.740000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.740000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.740000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.740000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.740000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.740000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.740000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.740000 audit: BPF prog-id=128 op=LOAD Feb 9 19:17:47.740000 audit[3173]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3001 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:47.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565633334623364366561393162633034353938316164323565613764 Feb 9 19:17:47.740000 audit: BPF prog-id=128 op=UNLOAD Feb 9 19:17:47.740000 audit: BPF prog-id=127 op=UNLOAD Feb 9 19:17:47.740000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.740000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.740000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.740000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.740000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.740000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.740000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.740000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.740000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.740000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:47.740000 audit: BPF prog-id=129 op=LOAD Feb 9 19:17:47.740000 audit[3173]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3001 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:47.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565633334623364366561393162633034353938316164323565613764 Feb 9 19:17:47.834899 env[1644]: time="2024-02-09T19:17:47.834786803Z" level=info msg="StartContainer for \"eec34b3d6ea91bc045981ad25ea7d8de1951e7650e1f9904c65b57141d7a5a04\" returns successfully" Feb 9 19:17:48.321124 kubelet[2844]: I0209 19:17:48.321059 2844 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-5m9p7" podStartSLOduration=4.32100524 podCreationTimestamp="2024-02-09 19:17:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:17:45.312630654 +0000 UTC m=+15.457406069" watchObservedRunningTime="2024-02-09 19:17:48.32100524 +0000 UTC m=+18.465780595" Feb 9 19:17:50.213860 kubelet[2844]: I0209 19:17:50.213782 2844 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-55585899bf-mvtbz" podStartSLOduration=3.7315300430000002 podCreationTimestamp="2024-02-09 19:17:44 +0000 UTC" firstStartedPulling="2024-02-09 19:17:45.12025018 +0000 UTC m=+15.265025535" lastFinishedPulling="2024-02-09 19:17:47.602424173 +0000 UTC m=+17.747199540" observedRunningTime="2024-02-09 19:17:48.321477133 +0000 UTC m=+18.466252524" watchObservedRunningTime="2024-02-09 19:17:50.213704048 +0000 UTC m=+20.358479439" Feb 9 19:17:51.396000 audit[3208]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3208 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:51.396000 audit[3208]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffe7b8ac80 a2=0 a3=ffff898b86c0 items=0 ppid=2987 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:51.396000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:51.397000 audit[3208]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3208 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:51.397000 audit[3208]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffe7b8ac80 a2=0 a3=ffff898b86c0 items=0 ppid=2987 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:51.397000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:51.411000 audit[3210]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3210 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:51.411000 audit[3210]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=fffff32c77a0 a2=0 a3=ffffb791c6c0 items=0 ppid=2987 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:51.411000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:51.413000 audit[3210]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3210 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:51.413000 audit[3210]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=fffff32c77a0 a2=0 a3=ffffb791c6c0 items=0 ppid=2987 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:51.413000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:51.561012 kubelet[2844]: I0209 19:17:51.560969 2844 topology_manager.go:215] "Topology Admit Handler" podUID="e687fc06-e6a3-4ef4-aa26-ffed08184b3c" podNamespace="calico-system" podName="calico-typha-6cfb96d88c-qrwsz" Feb 9 19:17:51.572190 systemd[1]: Created slice kubepods-besteffort-pode687fc06_e6a3_4ef4_aa26_ffed08184b3c.slice. Feb 9 19:17:51.702938 kubelet[2844]: I0209 19:17:51.702776 2844 topology_manager.go:215] "Topology Admit Handler" podUID="3b6827ec-88f9-43de-ab87-98463c3dfc51" podNamespace="calico-system" podName="calico-node-swt6g" Feb 9 19:17:51.703532 kubelet[2844]: I0209 19:17:51.703496 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5nm24\" (UniqueName: \"kubernetes.io/projected/e687fc06-e6a3-4ef4-aa26-ffed08184b3c-kube-api-access-5nm24\") pod \"calico-typha-6cfb96d88c-qrwsz\" (UID: \"e687fc06-e6a3-4ef4-aa26-ffed08184b3c\") " pod="calico-system/calico-typha-6cfb96d88c-qrwsz" Feb 9 19:17:51.703825 kubelet[2844]: I0209 19:17:51.703764 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e687fc06-e6a3-4ef4-aa26-ffed08184b3c-tigera-ca-bundle\") pod \"calico-typha-6cfb96d88c-qrwsz\" (UID: \"e687fc06-e6a3-4ef4-aa26-ffed08184b3c\") " pod="calico-system/calico-typha-6cfb96d88c-qrwsz" Feb 9 19:17:51.703945 kubelet[2844]: I0209 19:17:51.703867 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/e687fc06-e6a3-4ef4-aa26-ffed08184b3c-typha-certs\") pod \"calico-typha-6cfb96d88c-qrwsz\" (UID: \"e687fc06-e6a3-4ef4-aa26-ffed08184b3c\") " pod="calico-system/calico-typha-6cfb96d88c-qrwsz" Feb 9 19:17:51.716306 systemd[1]: Created slice kubepods-besteffort-pod3b6827ec_88f9_43de_ab87_98463c3dfc51.slice. Feb 9 19:17:51.804775 kubelet[2844]: I0209 19:17:51.804725 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3b6827ec-88f9-43de-ab87-98463c3dfc51-xtables-lock\") pod \"calico-node-swt6g\" (UID: \"3b6827ec-88f9-43de-ab87-98463c3dfc51\") " pod="calico-system/calico-node-swt6g" Feb 9 19:17:51.805100 kubelet[2844]: I0209 19:17:51.805055 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/3b6827ec-88f9-43de-ab87-98463c3dfc51-cni-bin-dir\") pod \"calico-node-swt6g\" (UID: \"3b6827ec-88f9-43de-ab87-98463c3dfc51\") " pod="calico-system/calico-node-swt6g" Feb 9 19:17:51.805313 kubelet[2844]: I0209 19:17:51.805278 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/3b6827ec-88f9-43de-ab87-98463c3dfc51-cni-log-dir\") pod \"calico-node-swt6g\" (UID: \"3b6827ec-88f9-43de-ab87-98463c3dfc51\") " pod="calico-system/calico-node-swt6g" Feb 9 19:17:51.805556 kubelet[2844]: I0209 19:17:51.805530 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3b6827ec-88f9-43de-ab87-98463c3dfc51-var-lib-calico\") pod \"calico-node-swt6g\" (UID: \"3b6827ec-88f9-43de-ab87-98463c3dfc51\") " pod="calico-system/calico-node-swt6g" Feb 9 19:17:51.805757 kubelet[2844]: I0209 19:17:51.805721 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/3b6827ec-88f9-43de-ab87-98463c3dfc51-flexvol-driver-host\") pod \"calico-node-swt6g\" (UID: \"3b6827ec-88f9-43de-ab87-98463c3dfc51\") " pod="calico-system/calico-node-swt6g" Feb 9 19:17:51.805994 kubelet[2844]: I0209 19:17:51.805959 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2k8kr\" (UniqueName: \"kubernetes.io/projected/3b6827ec-88f9-43de-ab87-98463c3dfc51-kube-api-access-2k8kr\") pod \"calico-node-swt6g\" (UID: \"3b6827ec-88f9-43de-ab87-98463c3dfc51\") " pod="calico-system/calico-node-swt6g" Feb 9 19:17:51.806181 kubelet[2844]: I0209 19:17:51.806145 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3b6827ec-88f9-43de-ab87-98463c3dfc51-tigera-ca-bundle\") pod \"calico-node-swt6g\" (UID: \"3b6827ec-88f9-43de-ab87-98463c3dfc51\") " pod="calico-system/calico-node-swt6g" Feb 9 19:17:51.806397 kubelet[2844]: I0209 19:17:51.806346 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/3b6827ec-88f9-43de-ab87-98463c3dfc51-node-certs\") pod \"calico-node-swt6g\" (UID: \"3b6827ec-88f9-43de-ab87-98463c3dfc51\") " pod="calico-system/calico-node-swt6g" Feb 9 19:17:51.806580 kubelet[2844]: I0209 19:17:51.806538 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/3b6827ec-88f9-43de-ab87-98463c3dfc51-cni-net-dir\") pod \"calico-node-swt6g\" (UID: \"3b6827ec-88f9-43de-ab87-98463c3dfc51\") " pod="calico-system/calico-node-swt6g" Feb 9 19:17:51.806786 kubelet[2844]: I0209 19:17:51.806742 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/3b6827ec-88f9-43de-ab87-98463c3dfc51-var-run-calico\") pod \"calico-node-swt6g\" (UID: \"3b6827ec-88f9-43de-ab87-98463c3dfc51\") " pod="calico-system/calico-node-swt6g" Feb 9 19:17:51.807091 kubelet[2844]: I0209 19:17:51.807051 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/3b6827ec-88f9-43de-ab87-98463c3dfc51-policysync\") pod \"calico-node-swt6g\" (UID: \"3b6827ec-88f9-43de-ab87-98463c3dfc51\") " pod="calico-system/calico-node-swt6g" Feb 9 19:17:51.807201 kubelet[2844]: I0209 19:17:51.807151 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3b6827ec-88f9-43de-ab87-98463c3dfc51-lib-modules\") pod \"calico-node-swt6g\" (UID: \"3b6827ec-88f9-43de-ab87-98463c3dfc51\") " pod="calico-system/calico-node-swt6g" Feb 9 19:17:51.835271 kubelet[2844]: I0209 19:17:51.835229 2844 topology_manager.go:215] "Topology Admit Handler" podUID="0cf9d635-829d-4747-a129-fb192fc90fe3" podNamespace="calico-system" podName="csi-node-driver-7xmtp" Feb 9 19:17:51.835955 kubelet[2844]: E0209 19:17:51.835909 2844 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7xmtp" podUID="0cf9d635-829d-4747-a129-fb192fc90fe3" Feb 9 19:17:51.910511 kubelet[2844]: E0209 19:17:51.910473 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.910718 kubelet[2844]: W0209 19:17:51.910687 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.910898 kubelet[2844]: E0209 19:17:51.910875 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.911346 kubelet[2844]: E0209 19:17:51.911303 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.911346 kubelet[2844]: W0209 19:17:51.911337 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.911511 kubelet[2844]: E0209 19:17:51.911369 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.911850 kubelet[2844]: E0209 19:17:51.911643 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.911850 kubelet[2844]: W0209 19:17:51.911673 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.911850 kubelet[2844]: E0209 19:17:51.911715 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.914660 kubelet[2844]: E0209 19:17:51.914598 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.914660 kubelet[2844]: W0209 19:17:51.914634 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.914987 kubelet[2844]: E0209 19:17:51.914687 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.915199 kubelet[2844]: E0209 19:17:51.915164 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.915199 kubelet[2844]: W0209 19:17:51.915192 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.915459 kubelet[2844]: E0209 19:17:51.915433 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.917129 kubelet[2844]: E0209 19:17:51.917068 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.917129 kubelet[2844]: W0209 19:17:51.917104 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.917449 kubelet[2844]: E0209 19:17:51.917422 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.917616 kubelet[2844]: E0209 19:17:51.917481 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.917747 kubelet[2844]: W0209 19:17:51.917723 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.918002 kubelet[2844]: E0209 19:17:51.917967 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.918408 kubelet[2844]: E0209 19:17:51.918386 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.918564 kubelet[2844]: W0209 19:17:51.918540 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.918753 kubelet[2844]: E0209 19:17:51.918715 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.919190 kubelet[2844]: E0209 19:17:51.919168 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.919346 kubelet[2844]: W0209 19:17:51.919324 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.919525 kubelet[2844]: E0209 19:17:51.919493 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.920337 kubelet[2844]: E0209 19:17:51.920306 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.920553 kubelet[2844]: W0209 19:17:51.920523 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.920752 kubelet[2844]: E0209 19:17:51.920716 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.921278 kubelet[2844]: E0209 19:17:51.921236 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.921506 kubelet[2844]: W0209 19:17:51.921460 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.921708 kubelet[2844]: E0209 19:17:51.921670 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.922206 kubelet[2844]: E0209 19:17:51.922179 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.922398 kubelet[2844]: W0209 19:17:51.922370 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.922593 kubelet[2844]: E0209 19:17:51.922557 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.924340 kubelet[2844]: E0209 19:17:51.924303 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.924595 kubelet[2844]: W0209 19:17:51.924565 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.924783 kubelet[2844]: E0209 19:17:51.924746 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.925326 kubelet[2844]: E0209 19:17:51.925302 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.925480 kubelet[2844]: W0209 19:17:51.925454 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.925674 kubelet[2844]: E0209 19:17:51.925639 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.926196 kubelet[2844]: E0209 19:17:51.926171 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.926381 kubelet[2844]: W0209 19:17:51.926355 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.926558 kubelet[2844]: E0209 19:17:51.926523 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.927094 kubelet[2844]: E0209 19:17:51.927068 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.927260 kubelet[2844]: W0209 19:17:51.927234 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.927430 kubelet[2844]: E0209 19:17:51.927396 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.927893 kubelet[2844]: E0209 19:17:51.927866 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.928066 kubelet[2844]: W0209 19:17:51.928039 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.928243 kubelet[2844]: E0209 19:17:51.928207 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.928907 kubelet[2844]: E0209 19:17:51.928859 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.929278 kubelet[2844]: W0209 19:17:51.929251 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.931231 kubelet[2844]: E0209 19:17:51.931200 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.931425 kubelet[2844]: W0209 19:17:51.931397 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.931673 kubelet[2844]: E0209 19:17:51.931633 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.931766 kubelet[2844]: E0209 19:17:51.931681 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.934182 kubelet[2844]: E0209 19:17:51.934148 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.934397 kubelet[2844]: W0209 19:17:51.934367 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.934707 kubelet[2844]: E0209 19:17:51.934682 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.936268 kubelet[2844]: E0209 19:17:51.936235 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.936492 kubelet[2844]: W0209 19:17:51.936463 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.936921 kubelet[2844]: E0209 19:17:51.936895 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.941013 kubelet[2844]: E0209 19:17:51.940979 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.941256 kubelet[2844]: W0209 19:17:51.941225 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.941596 kubelet[2844]: E0209 19:17:51.941570 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.941908 kubelet[2844]: E0209 19:17:51.941885 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.942089 kubelet[2844]: W0209 19:17:51.942061 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.942387 kubelet[2844]: E0209 19:17:51.942363 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.942859 kubelet[2844]: E0209 19:17:51.942797 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.943030 kubelet[2844]: W0209 19:17:51.943003 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.943316 kubelet[2844]: E0209 19:17:51.943293 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.943712 kubelet[2844]: E0209 19:17:51.943690 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.943924 kubelet[2844]: W0209 19:17:51.943898 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.944218 kubelet[2844]: E0209 19:17:51.944195 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.944630 kubelet[2844]: E0209 19:17:51.944604 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.944868 kubelet[2844]: W0209 19:17:51.944780 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.945152 kubelet[2844]: E0209 19:17:51.945129 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.945442 kubelet[2844]: E0209 19:17:51.945420 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.945634 kubelet[2844]: W0209 19:17:51.945605 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.946402 kubelet[2844]: E0209 19:17:51.946365 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.949025 kubelet[2844]: E0209 19:17:51.948990 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.949301 kubelet[2844]: W0209 19:17:51.949273 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.949583 kubelet[2844]: E0209 19:17:51.949558 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.961947 kubelet[2844]: E0209 19:17:51.961838 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.962150 kubelet[2844]: W0209 19:17:51.962122 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.962503 kubelet[2844]: E0209 19:17:51.962481 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.966778 kubelet[2844]: E0209 19:17:51.966744 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.967020 kubelet[2844]: W0209 19:17:51.966990 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.967393 kubelet[2844]: E0209 19:17:51.967366 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.969209 kubelet[2844]: E0209 19:17:51.969173 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.969445 kubelet[2844]: W0209 19:17:51.969418 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.969935 kubelet[2844]: E0209 19:17:51.969907 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.971021 kubelet[2844]: E0209 19:17:51.970976 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.971236 kubelet[2844]: W0209 19:17:51.971207 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.971526 kubelet[2844]: E0209 19:17:51.971503 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.973123 kubelet[2844]: E0209 19:17:51.973087 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.973351 kubelet[2844]: W0209 19:17:51.973322 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.973785 kubelet[2844]: E0209 19:17:51.973756 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.975546 kubelet[2844]: E0209 19:17:51.975516 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.975706 kubelet[2844]: W0209 19:17:51.975678 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.976119 kubelet[2844]: E0209 19:17:51.976092 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.977281 kubelet[2844]: E0209 19:17:51.977249 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.977478 kubelet[2844]: W0209 19:17:51.977449 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.978238 kubelet[2844]: E0209 19:17:51.978207 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.982309 kubelet[2844]: E0209 19:17:51.982254 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.982678 kubelet[2844]: W0209 19:17:51.982624 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.983032 kubelet[2844]: E0209 19:17:51.983005 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.989160 kubelet[2844]: E0209 19:17:51.989128 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.989368 kubelet[2844]: W0209 19:17:51.989340 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.989701 kubelet[2844]: E0209 19:17:51.989676 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.992003 kubelet[2844]: E0209 19:17:51.991969 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.992207 kubelet[2844]: W0209 19:17:51.992177 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.992384 kubelet[2844]: E0209 19:17:51.992360 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.992999 kubelet[2844]: E0209 19:17:51.992968 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.993209 kubelet[2844]: W0209 19:17:51.993180 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.993453 kubelet[2844]: E0209 19:17:51.993429 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.994151 kubelet[2844]: E0209 19:17:51.994118 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.994339 kubelet[2844]: W0209 19:17:51.994310 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.994507 kubelet[2844]: E0209 19:17:51.994484 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.995161 kubelet[2844]: E0209 19:17:51.995129 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.995372 kubelet[2844]: W0209 19:17:51.995341 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.995545 kubelet[2844]: E0209 19:17:51.995521 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.996161 kubelet[2844]: E0209 19:17:51.996130 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.996342 kubelet[2844]: W0209 19:17:51.996313 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.996470 kubelet[2844]: E0209 19:17:51.996447 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.997188 kubelet[2844]: E0209 19:17:51.997156 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.997369 kubelet[2844]: W0209 19:17:51.997340 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.997551 kubelet[2844]: E0209 19:17:51.997526 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.998257 kubelet[2844]: E0209 19:17:51.998228 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.998430 kubelet[2844]: W0209 19:17:51.998403 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.998555 kubelet[2844]: E0209 19:17:51.998533 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:51.999214 kubelet[2844]: E0209 19:17:51.999182 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:51.999398 kubelet[2844]: W0209 19:17:51.999370 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:51.999603 kubelet[2844]: E0209 19:17:51.999548 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.000228 kubelet[2844]: E0209 19:17:52.000197 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.000393 kubelet[2844]: W0209 19:17:52.000366 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.000538 kubelet[2844]: E0209 19:17:52.000516 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.001451 kubelet[2844]: E0209 19:17:52.001397 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.001679 kubelet[2844]: W0209 19:17:52.001652 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.001932 kubelet[2844]: E0209 19:17:52.001910 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.012006 kubelet[2844]: E0209 19:17:52.011968 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.012211 kubelet[2844]: W0209 19:17:52.012183 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.012368 kubelet[2844]: E0209 19:17:52.012347 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.015019 kubelet[2844]: E0209 19:17:52.014982 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.015276 kubelet[2844]: W0209 19:17:52.015244 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.015430 kubelet[2844]: E0209 19:17:52.015407 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.016035 kubelet[2844]: E0209 19:17:52.016005 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.016251 kubelet[2844]: W0209 19:17:52.016222 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.016409 kubelet[2844]: E0209 19:17:52.016387 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.016985 kubelet[2844]: E0209 19:17:52.016955 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.017198 kubelet[2844]: W0209 19:17:52.017169 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.017364 kubelet[2844]: E0209 19:17:52.017335 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.019049 kubelet[2844]: E0209 19:17:52.019014 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.019280 kubelet[2844]: W0209 19:17:52.019250 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.019418 kubelet[2844]: E0209 19:17:52.019396 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.019882 kubelet[2844]: I0209 19:17:52.019590 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/0cf9d635-829d-4747-a129-fb192fc90fe3-varrun\") pod \"csi-node-driver-7xmtp\" (UID: \"0cf9d635-829d-4747-a129-fb192fc90fe3\") " pod="calico-system/csi-node-driver-7xmtp" Feb 9 19:17:52.020242 kubelet[2844]: E0209 19:17:52.020132 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.020419 kubelet[2844]: W0209 19:17:52.020391 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.020570 kubelet[2844]: E0209 19:17:52.020547 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.022114 kubelet[2844]: E0209 19:17:52.022076 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.022344 kubelet[2844]: W0209 19:17:52.022312 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.022515 kubelet[2844]: E0209 19:17:52.022491 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.022871 kubelet[2844]: I0209 19:17:52.022825 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/0cf9d635-829d-4747-a129-fb192fc90fe3-kubelet-dir\") pod \"csi-node-driver-7xmtp\" (UID: \"0cf9d635-829d-4747-a129-fb192fc90fe3\") " pod="calico-system/csi-node-driver-7xmtp" Feb 9 19:17:52.025024 kubelet[2844]: E0209 19:17:52.024986 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.025258 kubelet[2844]: W0209 19:17:52.025225 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.025395 kubelet[2844]: E0209 19:17:52.025371 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.026645 env[1644]: time="2024-02-09T19:17:52.026548507Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-swt6g,Uid:3b6827ec-88f9-43de-ab87-98463c3dfc51,Namespace:calico-system,Attempt:0,}" Feb 9 19:17:52.027460 kubelet[2844]: E0209 19:17:52.027420 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.027460 kubelet[2844]: W0209 19:17:52.027453 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.027664 kubelet[2844]: E0209 19:17:52.027504 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.030365 kubelet[2844]: E0209 19:17:52.030314 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.030365 kubelet[2844]: W0209 19:17:52.030352 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.030730 kubelet[2844]: E0209 19:17:52.030663 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.032272 kubelet[2844]: E0209 19:17:52.032223 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.032272 kubelet[2844]: W0209 19:17:52.032257 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.032526 kubelet[2844]: E0209 19:17:52.032356 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.032526 kubelet[2844]: I0209 19:17:52.032460 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zs87x\" (UniqueName: \"kubernetes.io/projected/0cf9d635-829d-4747-a129-fb192fc90fe3-kube-api-access-zs87x\") pod \"csi-node-driver-7xmtp\" (UID: \"0cf9d635-829d-4747-a129-fb192fc90fe3\") " pod="calico-system/csi-node-driver-7xmtp" Feb 9 19:17:52.036510 kubelet[2844]: E0209 19:17:52.036458 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.036510 kubelet[2844]: W0209 19:17:52.036498 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.036780 kubelet[2844]: E0209 19:17:52.036552 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.036780 kubelet[2844]: I0209 19:17:52.036626 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/0cf9d635-829d-4747-a129-fb192fc90fe3-registration-dir\") pod \"csi-node-driver-7xmtp\" (UID: \"0cf9d635-829d-4747-a129-fb192fc90fe3\") " pod="calico-system/csi-node-driver-7xmtp" Feb 9 19:17:52.037263 kubelet[2844]: E0209 19:17:52.037223 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.037263 kubelet[2844]: W0209 19:17:52.037255 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.037554 kubelet[2844]: E0209 19:17:52.037528 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.037736 kubelet[2844]: I0209 19:17:52.037714 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/0cf9d635-829d-4747-a129-fb192fc90fe3-socket-dir\") pod \"csi-node-driver-7xmtp\" (UID: \"0cf9d635-829d-4747-a129-fb192fc90fe3\") " pod="calico-system/csi-node-driver-7xmtp" Feb 9 19:17:52.039902 kubelet[2844]: E0209 19:17:52.039852 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.039902 kubelet[2844]: W0209 19:17:52.039889 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.040231 kubelet[2844]: E0209 19:17:52.040203 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.040723 kubelet[2844]: E0209 19:17:52.040499 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.040723 kubelet[2844]: W0209 19:17:52.040554 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.044755 kubelet[2844]: E0209 19:17:52.040973 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.044755 kubelet[2844]: E0209 19:17:52.043083 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.044755 kubelet[2844]: W0209 19:17:52.043112 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.044755 kubelet[2844]: E0209 19:17:52.043212 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.044755 kubelet[2844]: E0209 19:17:52.043726 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.044755 kubelet[2844]: W0209 19:17:52.043750 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.044755 kubelet[2844]: E0209 19:17:52.043958 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.047062 kubelet[2844]: E0209 19:17:52.047012 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.047233 kubelet[2844]: W0209 19:17:52.047074 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.047233 kubelet[2844]: E0209 19:17:52.047114 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.048605 kubelet[2844]: E0209 19:17:52.048524 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.048605 kubelet[2844]: W0209 19:17:52.048602 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.048868 kubelet[2844]: E0209 19:17:52.048682 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.085425 env[1644]: time="2024-02-09T19:17:52.084487631Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:17:52.085425 env[1644]: time="2024-02-09T19:17:52.084568457Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:17:52.085425 env[1644]: time="2024-02-09T19:17:52.084598243Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:17:52.085744 env[1644]: time="2024-02-09T19:17:52.085665860Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3980a477232254b99bbf5bd2686da0b2d6e4250f5b561a65c2605972949b05e0 pid=3288 runtime=io.containerd.runc.v2 Feb 9 19:17:52.126489 systemd[1]: Started cri-containerd-3980a477232254b99bbf5bd2686da0b2d6e4250f5b561a65c2605972949b05e0.scope. Feb 9 19:17:52.138511 kubelet[2844]: E0209 19:17:52.138465 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.138511 kubelet[2844]: W0209 19:17:52.138500 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.138762 kubelet[2844]: E0209 19:17:52.138536 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.139182 kubelet[2844]: E0209 19:17:52.138972 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.139182 kubelet[2844]: W0209 19:17:52.139002 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.139182 kubelet[2844]: E0209 19:17:52.139030 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.140041 kubelet[2844]: E0209 19:17:52.139702 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.140041 kubelet[2844]: W0209 19:17:52.139733 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.140041 kubelet[2844]: E0209 19:17:52.139778 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.140666 kubelet[2844]: E0209 19:17:52.140401 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.140666 kubelet[2844]: W0209 19:17:52.140443 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.140666 kubelet[2844]: E0209 19:17:52.140479 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.141448 kubelet[2844]: E0209 19:17:52.141087 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.141448 kubelet[2844]: W0209 19:17:52.141113 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.141448 kubelet[2844]: E0209 19:17:52.141180 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.142238 kubelet[2844]: E0209 19:17:52.141869 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.142238 kubelet[2844]: W0209 19:17:52.141899 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.142238 kubelet[2844]: E0209 19:17:52.142115 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.142967 kubelet[2844]: E0209 19:17:52.142671 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.142967 kubelet[2844]: W0209 19:17:52.142700 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.142967 kubelet[2844]: E0209 19:17:52.142774 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.143596 kubelet[2844]: E0209 19:17:52.143380 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.143596 kubelet[2844]: W0209 19:17:52.143409 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.143596 kubelet[2844]: E0209 19:17:52.143478 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.147304 kubelet[2844]: E0209 19:17:52.147069 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.147304 kubelet[2844]: W0209 19:17:52.147097 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.147304 kubelet[2844]: E0209 19:17:52.147177 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.147945 kubelet[2844]: E0209 19:17:52.147666 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.147945 kubelet[2844]: W0209 19:17:52.147704 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.147945 kubelet[2844]: E0209 19:17:52.147765 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.148355 kubelet[2844]: E0209 19:17:52.148331 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.148486 kubelet[2844]: W0209 19:17:52.148460 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.148681 kubelet[2844]: E0209 19:17:52.148646 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.150621 kubelet[2844]: E0209 19:17:52.150584 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.150876 kubelet[2844]: W0209 19:17:52.150846 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.153861 kubelet[2844]: E0209 19:17:52.151051 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.155192 kubelet[2844]: E0209 19:17:52.155144 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.155395 kubelet[2844]: W0209 19:17:52.155367 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.155611 kubelet[2844]: E0209 19:17:52.155573 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.157033 kubelet[2844]: E0209 19:17:52.157000 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.157284 kubelet[2844]: W0209 19:17:52.157256 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.157495 kubelet[2844]: E0209 19:17:52.157458 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.159038 kubelet[2844]: E0209 19:17:52.159005 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.159270 kubelet[2844]: W0209 19:17:52.159240 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.159459 kubelet[2844]: E0209 19:17:52.159421 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.161036 kubelet[2844]: E0209 19:17:52.161004 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.161270 kubelet[2844]: W0209 19:17:52.161240 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.161473 kubelet[2844]: E0209 19:17:52.161425 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.163037 kubelet[2844]: E0209 19:17:52.162995 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.163220 kubelet[2844]: W0209 19:17:52.163191 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.163412 kubelet[2844]: E0209 19:17:52.163375 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.165003 kubelet[2844]: E0209 19:17:52.164971 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.165903 kubelet[2844]: W0209 19:17:52.165866 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.166349 kubelet[2844]: E0209 19:17:52.166308 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.166693 kubelet[2844]: E0209 19:17:52.166668 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.166895 kubelet[2844]: W0209 19:17:52.166866 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.167176 kubelet[2844]: E0209 19:17:52.167153 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.167563 kubelet[2844]: E0209 19:17:52.167539 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.167712 kubelet[2844]: W0209 19:17:52.167687 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.168017 kubelet[2844]: E0209 19:17:52.167994 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.166000 audit: BPF prog-id=130 op=LOAD Feb 9 19:17:52.167000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.167000 audit[3298]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3288 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:52.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339383061343737323332323534623939626266356264323638366461 Feb 9 19:17:52.168000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.168000 audit[3298]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3288 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:52.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339383061343737323332323534623939626266356264323638366461 Feb 9 19:17:52.168000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.168000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.168000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.168000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.168000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.168000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.168000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.168000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.168000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.168000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.168000 audit: BPF prog-id=131 op=LOAD Feb 9 19:17:52.168000 audit[3298]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3288 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:52.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339383061343737323332323534623939626266356264323638366461 Feb 9 19:17:52.170000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.173023 kubelet[2844]: E0209 19:17:52.172994 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.170000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.170000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.170000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.170000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.170000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.170000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.170000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.170000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.174737 kubelet[2844]: W0209 19:17:52.174465 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.170000 audit: BPF prog-id=132 op=LOAD Feb 9 19:17:52.170000 audit[3298]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3288 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:52.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339383061343737323332323534623939626266356264323638366461 Feb 9 19:17:52.175689 kubelet[2844]: E0209 19:17:52.175596 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.174000 audit: BPF prog-id=132 op=UNLOAD Feb 9 19:17:52.174000 audit: BPF prog-id=131 op=UNLOAD Feb 9 19:17:52.174000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.174000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.174000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.177258 kubelet[2844]: E0209 19:17:52.176923 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.177258 kubelet[2844]: W0209 19:17:52.176955 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.177462 kubelet[2844]: E0209 19:17:52.177310 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.174000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.174000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.177885 env[1644]: time="2024-02-09T19:17:52.177660349Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6cfb96d88c-qrwsz,Uid:e687fc06-e6a3-4ef4-aa26-ffed08184b3c,Namespace:calico-system,Attempt:0,}" Feb 9 19:17:52.174000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.174000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.174000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.174000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.174000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.174000 audit: BPF prog-id=133 op=LOAD Feb 9 19:17:52.174000 audit[3298]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3288 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:52.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339383061343737323332323534623939626266356264323638366461 Feb 9 19:17:52.179707 kubelet[2844]: E0209 19:17:52.179234 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.179707 kubelet[2844]: W0209 19:17:52.179265 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.180305 kubelet[2844]: E0209 19:17:52.180000 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.180922 kubelet[2844]: E0209 19:17:52.180556 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.180922 kubelet[2844]: W0209 19:17:52.180583 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.180922 kubelet[2844]: E0209 19:17:52.180632 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.184667 kubelet[2844]: E0209 19:17:52.184531 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.184667 kubelet[2844]: W0209 19:17:52.184562 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.184667 kubelet[2844]: E0209 19:17:52.184598 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.240878 kubelet[2844]: E0209 19:17:52.234121 2844 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:17:52.241130 kubelet[2844]: W0209 19:17:52.241078 2844 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:17:52.241310 kubelet[2844]: E0209 19:17:52.241286 2844 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:17:52.241589 env[1644]: time="2024-02-09T19:17:52.233549723Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:17:52.241589 env[1644]: time="2024-02-09T19:17:52.233629134Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:17:52.241589 env[1644]: time="2024-02-09T19:17:52.233656100Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:17:52.241589 env[1644]: time="2024-02-09T19:17:52.233943931Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ba762ccc2030a57097caf7bc2875d19b4b40e2deecb1fa58e529dad6239f9047 pid=3346 runtime=io.containerd.runc.v2 Feb 9 19:17:52.257105 env[1644]: time="2024-02-09T19:17:52.257042683Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-swt6g,Uid:3b6827ec-88f9-43de-ab87-98463c3dfc51,Namespace:calico-system,Attempt:0,} returns sandbox id \"3980a477232254b99bbf5bd2686da0b2d6e4250f5b561a65c2605972949b05e0\"" Feb 9 19:17:52.261709 env[1644]: time="2024-02-09T19:17:52.261603511Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 19:17:52.284087 systemd[1]: Started cri-containerd-ba762ccc2030a57097caf7bc2875d19b4b40e2deecb1fa58e529dad6239f9047.scope. Feb 9 19:17:52.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.341000 audit: BPF prog-id=134 op=LOAD Feb 9 19:17:52.342000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.342000 audit[3363]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3346 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:52.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261373632636363323033306135373039376361663762633238373564 Feb 9 19:17:52.342000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.342000 audit[3363]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3346 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:52.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261373632636363323033306135373039376361663762633238373564 Feb 9 19:17:52.342000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.342000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.342000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.342000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.342000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.342000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.342000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.342000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.342000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.342000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.342000 audit: BPF prog-id=135 op=LOAD Feb 9 19:17:52.342000 audit[3363]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3346 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:52.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261373632636363323033306135373039376361663762633238373564 Feb 9 19:17:52.342000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.342000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.342000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.342000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.342000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.342000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.342000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.342000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.342000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.342000 audit: BPF prog-id=136 op=LOAD Feb 9 19:17:52.342000 audit[3363]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3346 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:52.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261373632636363323033306135373039376361663762633238373564 Feb 9 19:17:52.342000 audit: BPF prog-id=136 op=UNLOAD Feb 9 19:17:52.342000 audit: BPF prog-id=135 op=UNLOAD Feb 9 19:17:52.343000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.343000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.343000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.343000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.343000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.343000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.343000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.343000 audit[3363]: AVC avc: denied { perfmon } for pid=3363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.343000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.343000 audit[3363]: AVC avc: denied { bpf } for pid=3363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:52.343000 audit: BPF prog-id=137 op=LOAD Feb 9 19:17:52.343000 audit[3363]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3346 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:52.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261373632636363323033306135373039376361663762633238373564 Feb 9 19:17:52.410984 env[1644]: time="2024-02-09T19:17:52.410876280Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6cfb96d88c-qrwsz,Uid:e687fc06-e6a3-4ef4-aa26-ffed08184b3c,Namespace:calico-system,Attempt:0,} returns sandbox id \"ba762ccc2030a57097caf7bc2875d19b4b40e2deecb1fa58e529dad6239f9047\"" Feb 9 19:17:52.429000 audit[3387]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=3387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:52.429000 audit[3387]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffdc9e03c0 a2=0 a3=ffff823626c0 items=0 ppid=2987 pid=3387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:52.429000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:52.430000 audit[3387]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:17:52.430000 audit[3387]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffdc9e03c0 a2=0 a3=ffff823626c0 items=0 ppid=2987 pid=3387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:52.430000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:17:53.193957 kubelet[2844]: E0209 19:17:53.193913 2844 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7xmtp" podUID="0cf9d635-829d-4747-a129-fb192fc90fe3" Feb 9 19:17:53.704521 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2639214138.mount: Deactivated successfully. Feb 9 19:17:53.854251 env[1644]: time="2024-02-09T19:17:53.854176009Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:53.857529 env[1644]: time="2024-02-09T19:17:53.857461971Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:53.860384 env[1644]: time="2024-02-09T19:17:53.860331117Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:53.862844 env[1644]: time="2024-02-09T19:17:53.862747815Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:53.864140 env[1644]: time="2024-02-09T19:17:53.864082631Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 9 19:17:53.867650 env[1644]: time="2024-02-09T19:17:53.866985715Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 9 19:17:53.868311 env[1644]: time="2024-02-09T19:17:53.868264534Z" level=info msg="CreateContainer within sandbox \"3980a477232254b99bbf5bd2686da0b2d6e4250f5b561a65c2605972949b05e0\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 19:17:53.906335 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2691966340.mount: Deactivated successfully. Feb 9 19:17:53.915321 env[1644]: time="2024-02-09T19:17:53.915241923Z" level=info msg="CreateContainer within sandbox \"3980a477232254b99bbf5bd2686da0b2d6e4250f5b561a65c2605972949b05e0\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"3550af59102cd4844ece817489af8c6f5e26200591afb09062ed0dbd1c79f6f7\"" Feb 9 19:17:53.916540 env[1644]: time="2024-02-09T19:17:53.916481439Z" level=info msg="StartContainer for \"3550af59102cd4844ece817489af8c6f5e26200591afb09062ed0dbd1c79f6f7\"" Feb 9 19:17:53.979617 systemd[1]: Started cri-containerd-3550af59102cd4844ece817489af8c6f5e26200591afb09062ed0dbd1c79f6f7.scope. Feb 9 19:17:54.044319 kernel: kauditd_printk_skb: 179 callbacks suppressed Feb 9 19:17:54.044493 kernel: audit: type=1400 audit(1707506274.033:1134): avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.033000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.033000 audit[3397]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3288 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:54.059694 kernel: audit: type=1300 audit(1707506274.033:1134): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3288 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:54.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335353061663539313032636434383434656365383137343839616638 Feb 9 19:17:54.073622 kernel: audit: type=1327 audit(1707506274.033:1134): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335353061663539313032636434383434656365383137343839616638 Feb 9 19:17:54.037000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.082533 kernel: audit: type=1400 audit(1707506274.037:1135): avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.037000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.091963 kernel: audit: type=1400 audit(1707506274.037:1135): avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.037000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.037000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.108434 env[1644]: time="2024-02-09T19:17:54.108376443Z" level=info msg="StartContainer for \"3550af59102cd4844ece817489af8c6f5e26200591afb09062ed0dbd1c79f6f7\" returns successfully" Feb 9 19:17:54.116383 kernel: audit: type=1400 audit(1707506274.037:1135): avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.116590 kernel: audit: type=1400 audit(1707506274.037:1135): avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.037000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.125713 kernel: audit: type=1400 audit(1707506274.037:1135): avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.037000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.137346 kernel: audit: type=1400 audit(1707506274.037:1135): avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.037000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.145907 kernel: audit: type=1400 audit(1707506274.037:1135): avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.037000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.037000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.037000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.037000 audit: BPF prog-id=138 op=LOAD Feb 9 19:17:54.037000 audit[3397]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3288 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:54.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335353061663539313032636434383434656365383137343839616638 Feb 9 19:17:54.043000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.043000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.043000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.043000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.043000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.043000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.043000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.043000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.043000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.043000 audit: BPF prog-id=139 op=LOAD Feb 9 19:17:54.043000 audit[3397]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3288 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:54.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335353061663539313032636434383434656365383137343839616638 Feb 9 19:17:54.043000 audit: BPF prog-id=139 op=UNLOAD Feb 9 19:17:54.043000 audit: BPF prog-id=138 op=UNLOAD Feb 9 19:17:54.043000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.043000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.043000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.043000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.043000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.043000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.043000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.043000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.043000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.043000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:54.043000 audit: BPF prog-id=140 op=LOAD Feb 9 19:17:54.043000 audit[3397]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3288 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:54.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335353061663539313032636434383434656365383137343839616638 Feb 9 19:17:54.160620 systemd[1]: cri-containerd-3550af59102cd4844ece817489af8c6f5e26200591afb09062ed0dbd1c79f6f7.scope: Deactivated successfully. Feb 9 19:17:54.164000 audit: BPF prog-id=140 op=UNLOAD Feb 9 19:17:54.226155 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3550af59102cd4844ece817489af8c6f5e26200591afb09062ed0dbd1c79f6f7-rootfs.mount: Deactivated successfully. Feb 9 19:17:54.505433 env[1644]: time="2024-02-09T19:17:54.505362158Z" level=info msg="shim disconnected" id=3550af59102cd4844ece817489af8c6f5e26200591afb09062ed0dbd1c79f6f7 Feb 9 19:17:54.505727 env[1644]: time="2024-02-09T19:17:54.505454097Z" level=warning msg="cleaning up after shim disconnected" id=3550af59102cd4844ece817489af8c6f5e26200591afb09062ed0dbd1c79f6f7 namespace=k8s.io Feb 9 19:17:54.505727 env[1644]: time="2024-02-09T19:17:54.505477174Z" level=info msg="cleaning up dead shim" Feb 9 19:17:54.523230 env[1644]: time="2024-02-09T19:17:54.523159468Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:17:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3442 runtime=io.containerd.runc.v2\n" Feb 9 19:17:55.194698 kubelet[2844]: E0209 19:17:55.194209 2844 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7xmtp" podUID="0cf9d635-829d-4747-a129-fb192fc90fe3" Feb 9 19:17:55.211753 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1197838813.mount: Deactivated successfully. Feb 9 19:17:56.371657 env[1644]: time="2024-02-09T19:17:56.371595157Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:56.375947 env[1644]: time="2024-02-09T19:17:56.375880824Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:56.379739 env[1644]: time="2024-02-09T19:17:56.379676725Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:56.383755 env[1644]: time="2024-02-09T19:17:56.383692265Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:17:56.386401 env[1644]: time="2024-02-09T19:17:56.385179029Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969\"" Feb 9 19:17:56.388894 env[1644]: time="2024-02-09T19:17:56.388765910Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 19:17:56.428875 env[1644]: time="2024-02-09T19:17:56.427971165Z" level=info msg="CreateContainer within sandbox \"ba762ccc2030a57097caf7bc2875d19b4b40e2deecb1fa58e529dad6239f9047\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 19:17:56.459850 env[1644]: time="2024-02-09T19:17:56.459753221Z" level=info msg="CreateContainer within sandbox \"ba762ccc2030a57097caf7bc2875d19b4b40e2deecb1fa58e529dad6239f9047\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"f2b7d93aff62919ffc395f22c672d0f993c94ece93294f0eaa7030436c829280\"" Feb 9 19:17:56.461238 env[1644]: time="2024-02-09T19:17:56.461159532Z" level=info msg="StartContainer for \"f2b7d93aff62919ffc395f22c672d0f993c94ece93294f0eaa7030436c829280\"" Feb 9 19:17:56.503075 systemd[1]: Started cri-containerd-f2b7d93aff62919ffc395f22c672d0f993c94ece93294f0eaa7030436c829280.scope. Feb 9 19:17:56.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.574000 audit: BPF prog-id=141 op=LOAD Feb 9 19:17:56.575000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.575000 audit[3463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3346 pid=3463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:56.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632623764393361666636323931396666633339356632326336373264 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit[3463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3346 pid=3463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:56.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632623764393361666636323931396666633339356632326336373264 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit: BPF prog-id=142 op=LOAD Feb 9 19:17:56.576000 audit[3463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3346 pid=3463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:56.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632623764393361666636323931396666633339356632326336373264 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit: BPF prog-id=143 op=LOAD Feb 9 19:17:56.576000 audit[3463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3346 pid=3463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:56.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632623764393361666636323931396666633339356632326336373264 Feb 9 19:17:56.576000 audit: BPF prog-id=143 op=UNLOAD Feb 9 19:17:56.576000 audit: BPF prog-id=142 op=UNLOAD Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:17:56.576000 audit: BPF prog-id=144 op=LOAD Feb 9 19:17:56.576000 audit[3463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3346 pid=3463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:17:56.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632623764393361666636323931396666633339356632326336373264 Feb 9 19:17:56.640160 env[1644]: time="2024-02-09T19:17:56.640027574Z" level=info msg="StartContainer for \"f2b7d93aff62919ffc395f22c672d0f993c94ece93294f0eaa7030436c829280\" returns successfully" Feb 9 19:17:57.193740 kubelet[2844]: E0209 19:17:57.193686 2844 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7xmtp" podUID="0cf9d635-829d-4747-a129-fb192fc90fe3" Feb 9 19:17:57.749215 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3490260797.mount: Deactivated successfully. Feb 9 19:17:58.346632 kubelet[2844]: I0209 19:17:58.346578 2844 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Feb 9 19:17:59.194216 kubelet[2844]: E0209 19:17:59.193539 2844 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7xmtp" podUID="0cf9d635-829d-4747-a129-fb192fc90fe3" Feb 9 19:18:01.193527 kubelet[2844]: E0209 19:18:01.193480 2844 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7xmtp" podUID="0cf9d635-829d-4747-a129-fb192fc90fe3" Feb 9 19:18:01.623021 env[1644]: time="2024-02-09T19:18:01.622927244Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:01.627180 env[1644]: time="2024-02-09T19:18:01.627122413Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:01.631387 env[1644]: time="2024-02-09T19:18:01.631321458Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:01.635355 env[1644]: time="2024-02-09T19:18:01.635284855Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:01.636579 env[1644]: time="2024-02-09T19:18:01.636513965Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 9 19:18:01.640982 env[1644]: time="2024-02-09T19:18:01.640554912Z" level=info msg="CreateContainer within sandbox \"3980a477232254b99bbf5bd2686da0b2d6e4250f5b561a65c2605972949b05e0\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 19:18:01.662494 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount766735717.mount: Deactivated successfully. Feb 9 19:18:01.677472 env[1644]: time="2024-02-09T19:18:01.677402837Z" level=info msg="CreateContainer within sandbox \"3980a477232254b99bbf5bd2686da0b2d6e4250f5b561a65c2605972949b05e0\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"a2461f377084f336aaf058a1924637af8bec504f37bbd9a87f40e43ad93403a0\"" Feb 9 19:18:01.680337 env[1644]: time="2024-02-09T19:18:01.679384529Z" level=info msg="StartContainer for \"a2461f377084f336aaf058a1924637af8bec504f37bbd9a87f40e43ad93403a0\"" Feb 9 19:18:01.718982 systemd[1]: Started cri-containerd-a2461f377084f336aaf058a1924637af8bec504f37bbd9a87f40e43ad93403a0.scope. Feb 9 19:18:01.732621 systemd[1]: run-containerd-runc-k8s.io-a2461f377084f336aaf058a1924637af8bec504f37bbd9a87f40e43ad93403a0-runc.5GVAdf.mount: Deactivated successfully. Feb 9 19:18:01.776000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.779966 kernel: kauditd_printk_skb: 91 callbacks suppressed Feb 9 19:18:01.780082 kernel: audit: type=1400 audit(1707506281.776:1159): avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.776000 audit[3499]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3288 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:01.798947 kernel: audit: type=1300 audit(1707506281.776:1159): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3288 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:01.799041 kernel: audit: type=1327 audit(1707506281.776:1159): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132343631663337373038346633333661616630353861313932343633 Feb 9 19:18:01.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132343631663337373038346633333661616630353861313932343633 Feb 9 19:18:01.779000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.821994 kernel: audit: type=1400 audit(1707506281.779:1160): avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.822143 kernel: audit: type=1400 audit(1707506281.779:1160): avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.779000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.779000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.832183 kernel: audit: type=1400 audit(1707506281.779:1160): avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.779000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.840841 kernel: audit: type=1400 audit(1707506281.779:1160): avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.779000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.849335 kernel: audit: type=1400 audit(1707506281.779:1160): avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.853860 kernel: audit: type=1400 audit(1707506281.779:1160): avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.779000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.779000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.871201 kernel: audit: type=1400 audit(1707506281.779:1160): avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.779000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.779000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.779000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.779000 audit: BPF prog-id=145 op=LOAD Feb 9 19:18:01.779000 audit[3499]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3288 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:01.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132343631663337373038346633333661616630353861313932343633 Feb 9 19:18:01.786000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.786000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.786000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.786000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.786000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.786000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.786000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.786000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.786000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.786000 audit: BPF prog-id=146 op=LOAD Feb 9 19:18:01.786000 audit[3499]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3288 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:01.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132343631663337373038346633333661616630353861313932343633 Feb 9 19:18:01.798000 audit: BPF prog-id=146 op=UNLOAD Feb 9 19:18:01.798000 audit: BPF prog-id=145 op=UNLOAD Feb 9 19:18:01.798000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.798000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.798000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.798000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.798000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.798000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.798000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.798000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.798000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.798000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:01.798000 audit: BPF prog-id=147 op=LOAD Feb 9 19:18:01.798000 audit[3499]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3288 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:01.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132343631663337373038346633333661616630353861313932343633 Feb 9 19:18:01.890992 env[1644]: time="2024-02-09T19:18:01.890909648Z" level=info msg="StartContainer for \"a2461f377084f336aaf058a1924637af8bec504f37bbd9a87f40e43ad93403a0\" returns successfully" Feb 9 19:18:02.388428 kubelet[2844]: I0209 19:18:02.388381 2844 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-6cfb96d88c-qrwsz" podStartSLOduration=7.414419693 podCreationTimestamp="2024-02-09 19:17:51 +0000 UTC" firstStartedPulling="2024-02-09 19:17:52.412946948 +0000 UTC m=+22.557722303" lastFinishedPulling="2024-02-09 19:17:56.386852887 +0000 UTC m=+26.531628266" observedRunningTime="2024-02-09 19:17:57.360366487 +0000 UTC m=+27.505141878" watchObservedRunningTime="2024-02-09 19:18:02.388325656 +0000 UTC m=+32.533100999" Feb 9 19:18:02.654958 env[1644]: time="2024-02-09T19:18:02.654760840Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:18:02.660428 systemd[1]: cri-containerd-a2461f377084f336aaf058a1924637af8bec504f37bbd9a87f40e43ad93403a0.scope: Deactivated successfully. Feb 9 19:18:02.664000 audit: BPF prog-id=147 op=UNLOAD Feb 9 19:18:02.685203 kubelet[2844]: I0209 19:18:02.683887 2844 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 19:18:02.715549 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a2461f377084f336aaf058a1924637af8bec504f37bbd9a87f40e43ad93403a0-rootfs.mount: Deactivated successfully. Feb 9 19:18:02.728562 kubelet[2844]: I0209 19:18:02.727869 2844 topology_manager.go:215] "Topology Admit Handler" podUID="c92e9f65-3ffb-41a3-8b6b-9e43b91e0f7b" podNamespace="kube-system" podName="coredns-5dd5756b68-wm5lb" Feb 9 19:18:02.731453 kubelet[2844]: I0209 19:18:02.731418 2844 topology_manager.go:215] "Topology Admit Handler" podUID="1e9a6206-262a-4f64-bb4b-7c720f31b166" podNamespace="calico-system" podName="calico-kube-controllers-6bb5cf9998-vtf26" Feb 9 19:18:02.742790 systemd[1]: Created slice kubepods-burstable-podc92e9f65_3ffb_41a3_8b6b_9e43b91e0f7b.slice. Feb 9 19:18:02.752385 kubelet[2844]: I0209 19:18:02.751471 2844 topology_manager.go:215] "Topology Admit Handler" podUID="cb65ce5a-64ff-4274-87c2-ba066e48e105" podNamespace="kube-system" podName="coredns-5dd5756b68-xxj25" Feb 9 19:18:02.761917 systemd[1]: Created slice kubepods-besteffort-pod1e9a6206_262a_4f64_bb4b_7c720f31b166.slice. Feb 9 19:18:02.779803 systemd[1]: Created slice kubepods-burstable-podcb65ce5a_64ff_4274_87c2_ba066e48e105.slice. Feb 9 19:18:02.844283 kubelet[2844]: I0209 19:18:02.844139 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5nb2j\" (UniqueName: \"kubernetes.io/projected/cb65ce5a-64ff-4274-87c2-ba066e48e105-kube-api-access-5nb2j\") pod \"coredns-5dd5756b68-xxj25\" (UID: \"cb65ce5a-64ff-4274-87c2-ba066e48e105\") " pod="kube-system/coredns-5dd5756b68-xxj25" Feb 9 19:18:02.844692 kubelet[2844]: I0209 19:18:02.844656 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/c92e9f65-3ffb-41a3-8b6b-9e43b91e0f7b-config-volume\") pod \"coredns-5dd5756b68-wm5lb\" (UID: \"c92e9f65-3ffb-41a3-8b6b-9e43b91e0f7b\") " pod="kube-system/coredns-5dd5756b68-wm5lb" Feb 9 19:18:02.845167 kubelet[2844]: I0209 19:18:02.845128 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ltbqb\" (UniqueName: \"kubernetes.io/projected/1e9a6206-262a-4f64-bb4b-7c720f31b166-kube-api-access-ltbqb\") pod \"calico-kube-controllers-6bb5cf9998-vtf26\" (UID: \"1e9a6206-262a-4f64-bb4b-7c720f31b166\") " pod="calico-system/calico-kube-controllers-6bb5cf9998-vtf26" Feb 9 19:18:02.845482 kubelet[2844]: I0209 19:18:02.845437 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/cb65ce5a-64ff-4274-87c2-ba066e48e105-config-volume\") pod \"coredns-5dd5756b68-xxj25\" (UID: \"cb65ce5a-64ff-4274-87c2-ba066e48e105\") " pod="kube-system/coredns-5dd5756b68-xxj25" Feb 9 19:18:02.845867 kubelet[2844]: I0209 19:18:02.845792 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-56zmt\" (UniqueName: \"kubernetes.io/projected/c92e9f65-3ffb-41a3-8b6b-9e43b91e0f7b-kube-api-access-56zmt\") pod \"coredns-5dd5756b68-wm5lb\" (UID: \"c92e9f65-3ffb-41a3-8b6b-9e43b91e0f7b\") " pod="kube-system/coredns-5dd5756b68-wm5lb" Feb 9 19:18:02.846051 kubelet[2844]: I0209 19:18:02.846031 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1e9a6206-262a-4f64-bb4b-7c720f31b166-tigera-ca-bundle\") pod \"calico-kube-controllers-6bb5cf9998-vtf26\" (UID: \"1e9a6206-262a-4f64-bb4b-7c720f31b166\") " pod="calico-system/calico-kube-controllers-6bb5cf9998-vtf26" Feb 9 19:18:03.057335 env[1644]: time="2024-02-09T19:18:03.056790527Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-wm5lb,Uid:c92e9f65-3ffb-41a3-8b6b-9e43b91e0f7b,Namespace:kube-system,Attempt:0,}" Feb 9 19:18:03.071476 env[1644]: time="2024-02-09T19:18:03.071405390Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6bb5cf9998-vtf26,Uid:1e9a6206-262a-4f64-bb4b-7c720f31b166,Namespace:calico-system,Attempt:0,}" Feb 9 19:18:03.090191 env[1644]: time="2024-02-09T19:18:03.090116815Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-xxj25,Uid:cb65ce5a-64ff-4274-87c2-ba066e48e105,Namespace:kube-system,Attempt:0,}" Feb 9 19:18:03.202349 systemd[1]: Created slice kubepods-besteffort-pod0cf9d635_829d_4747_a129_fb192fc90fe3.slice. Feb 9 19:18:03.213013 env[1644]: time="2024-02-09T19:18:03.212595353Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7xmtp,Uid:0cf9d635-829d-4747-a129-fb192fc90fe3,Namespace:calico-system,Attempt:0,}" Feb 9 19:18:04.451748 env[1644]: time="2024-02-09T19:18:04.451640112Z" level=info msg="shim disconnected" id=a2461f377084f336aaf058a1924637af8bec504f37bbd9a87f40e43ad93403a0 Feb 9 19:18:04.451748 env[1644]: time="2024-02-09T19:18:04.451739731Z" level=warning msg="cleaning up after shim disconnected" id=a2461f377084f336aaf058a1924637af8bec504f37bbd9a87f40e43ad93403a0 namespace=k8s.io Feb 9 19:18:04.452455 env[1644]: time="2024-02-09T19:18:04.451763648Z" level=info msg="cleaning up dead shim" Feb 9 19:18:04.504916 env[1644]: time="2024-02-09T19:18:04.504853689Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:18:04Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3548 runtime=io.containerd.runc.v2\n" Feb 9 19:18:04.688372 env[1644]: time="2024-02-09T19:18:04.688273524Z" level=error msg="Failed to destroy network for sandbox \"6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:18:04.689411 env[1644]: time="2024-02-09T19:18:04.689335364Z" level=error msg="encountered an error cleaning up failed sandbox \"6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:18:04.689719 env[1644]: time="2024-02-09T19:18:04.689651944Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-xxj25,Uid:cb65ce5a-64ff-4274-87c2-ba066e48e105,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:18:04.690208 env[1644]: time="2024-02-09T19:18:04.690017007Z" level=error msg="Failed to destroy network for sandbox \"79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:18:04.690880 kubelet[2844]: E0209 19:18:04.690593 2844 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:18:04.690880 kubelet[2844]: E0209 19:18:04.690673 2844 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-xxj25" Feb 9 19:18:04.690880 kubelet[2844]: E0209 19:18:04.690712 2844 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-xxj25" Feb 9 19:18:04.691638 kubelet[2844]: E0209 19:18:04.690794 2844 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-xxj25_kube-system(cb65ce5a-64ff-4274-87c2-ba066e48e105)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-xxj25_kube-system(cb65ce5a-64ff-4274-87c2-ba066e48e105)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-xxj25" podUID="cb65ce5a-64ff-4274-87c2-ba066e48e105" Feb 9 19:18:04.692927 env[1644]: time="2024-02-09T19:18:04.692800046Z" level=error msg="encountered an error cleaning up failed sandbox \"79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:18:04.693194 env[1644]: time="2024-02-09T19:18:04.693143652Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-wm5lb,Uid:c92e9f65-3ffb-41a3-8b6b-9e43b91e0f7b,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:18:04.695977 kubelet[2844]: E0209 19:18:04.695715 2844 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:18:04.695977 kubelet[2844]: E0209 19:18:04.695795 2844 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-wm5lb" Feb 9 19:18:04.695977 kubelet[2844]: E0209 19:18:04.695854 2844 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-wm5lb" Feb 9 19:18:04.696299 kubelet[2844]: E0209 19:18:04.695935 2844 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-wm5lb_kube-system(c92e9f65-3ffb-41a3-8b6b-9e43b91e0f7b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-wm5lb_kube-system(c92e9f65-3ffb-41a3-8b6b-9e43b91e0f7b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-wm5lb" podUID="c92e9f65-3ffb-41a3-8b6b-9e43b91e0f7b" Feb 9 19:18:04.725496 kubelet[2844]: I0209 19:18:04.724268 2844 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Feb 9 19:18:04.773574 env[1644]: time="2024-02-09T19:18:04.773491726Z" level=error msg="Failed to destroy network for sandbox \"12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:18:04.775432 env[1644]: time="2024-02-09T19:18:04.775353706Z" level=error msg="encountered an error cleaning up failed sandbox \"12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:18:04.775714 env[1644]: time="2024-02-09T19:18:04.775659917Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7xmtp,Uid:0cf9d635-829d-4747-a129-fb192fc90fe3,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:18:04.776237 kubelet[2844]: E0209 19:18:04.776168 2844 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:18:04.776394 kubelet[2844]: E0209 19:18:04.776302 2844 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7xmtp" Feb 9 19:18:04.776394 kubelet[2844]: E0209 19:18:04.776343 2844 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7xmtp" Feb 9 19:18:04.776549 kubelet[2844]: E0209 19:18:04.776476 2844 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-7xmtp_calico-system(0cf9d635-829d-4747-a129-fb192fc90fe3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-7xmtp_calico-system(0cf9d635-829d-4747-a129-fb192fc90fe3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7xmtp" podUID="0cf9d635-829d-4747-a129-fb192fc90fe3" Feb 9 19:18:04.781835 env[1644]: time="2024-02-09T19:18:04.779453649Z" level=error msg="Failed to destroy network for sandbox \"e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:18:04.783106 env[1644]: time="2024-02-09T19:18:04.783027046Z" level=error msg="encountered an error cleaning up failed sandbox \"e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:18:04.783594 env[1644]: time="2024-02-09T19:18:04.783509345Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6bb5cf9998-vtf26,Uid:1e9a6206-262a-4f64-bb4b-7c720f31b166,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:18:04.785591 kubelet[2844]: E0209 19:18:04.784300 2844 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:18:04.785591 kubelet[2844]: E0209 19:18:04.784443 2844 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6bb5cf9998-vtf26" Feb 9 19:18:04.785591 kubelet[2844]: E0209 19:18:04.784486 2844 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6bb5cf9998-vtf26" Feb 9 19:18:04.785972 kubelet[2844]: E0209 19:18:04.784587 2844 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6bb5cf9998-vtf26_calico-system(1e9a6206-262a-4f64-bb4b-7c720f31b166)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6bb5cf9998-vtf26_calico-system(1e9a6206-262a-4f64-bb4b-7c720f31b166)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6bb5cf9998-vtf26" podUID="1e9a6206-262a-4f64-bb4b-7c720f31b166" Feb 9 19:18:04.797000 audit[3689]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=3689 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:18:04.797000 audit[3689]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffc137c190 a2=0 a3=ffffbcb016c0 items=0 ppid=2987 pid=3689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:04.797000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:18:04.801000 audit[3689]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3689 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:18:04.801000 audit[3689]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6068 a0=3 a1=ffffc137c190 a2=0 a3=ffffbcb016c0 items=0 ppid=2987 pid=3689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:04.801000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:18:05.243024 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38-shm.mount: Deactivated successfully. Feb 9 19:18:05.243648 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd-shm.mount: Deactivated successfully. Feb 9 19:18:05.243957 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f-shm.mount: Deactivated successfully. Feb 9 19:18:05.244245 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b-shm.mount: Deactivated successfully. Feb 9 19:18:05.368941 kubelet[2844]: I0209 19:18:05.368908 2844 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" Feb 9 19:18:05.370380 env[1644]: time="2024-02-09T19:18:05.370324213Z" level=info msg="StopPodSandbox for \"79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b\"" Feb 9 19:18:05.382577 env[1644]: time="2024-02-09T19:18:05.382502622Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 19:18:05.383291 kubelet[2844]: I0209 19:18:05.383220 2844 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" Feb 9 19:18:05.384756 env[1644]: time="2024-02-09T19:18:05.384692676Z" level=info msg="StopPodSandbox for \"12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f\"" Feb 9 19:18:05.396773 kubelet[2844]: I0209 19:18:05.396707 2844 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" Feb 9 19:18:05.398253 env[1644]: time="2024-02-09T19:18:05.398185420Z" level=info msg="StopPodSandbox for \"6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38\"" Feb 9 19:18:05.406737 kubelet[2844]: I0209 19:18:05.406668 2844 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" Feb 9 19:18:05.408603 env[1644]: time="2024-02-09T19:18:05.408532848Z" level=info msg="StopPodSandbox for \"e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd\"" Feb 9 19:18:05.512345 env[1644]: time="2024-02-09T19:18:05.511545316Z" level=error msg="StopPodSandbox for \"12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f\" failed" error="failed to destroy network for sandbox \"12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:18:05.512991 kubelet[2844]: E0209 19:18:05.511982 2844 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" Feb 9 19:18:05.512991 kubelet[2844]: E0209 19:18:05.512462 2844 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f"} Feb 9 19:18:05.512991 kubelet[2844]: E0209 19:18:05.512533 2844 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0cf9d635-829d-4747-a129-fb192fc90fe3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:18:05.512991 kubelet[2844]: E0209 19:18:05.512586 2844 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0cf9d635-829d-4747-a129-fb192fc90fe3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7xmtp" podUID="0cf9d635-829d-4747-a129-fb192fc90fe3" Feb 9 19:18:05.513460 kubelet[2844]: E0209 19:18:05.513403 2844 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" Feb 9 19:18:05.513539 env[1644]: time="2024-02-09T19:18:05.513101094Z" level=error msg="StopPodSandbox for \"e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd\" failed" error="failed to destroy network for sandbox \"e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:18:05.513622 kubelet[2844]: E0209 19:18:05.513474 2844 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd"} Feb 9 19:18:05.513622 kubelet[2844]: E0209 19:18:05.513534 2844 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1e9a6206-262a-4f64-bb4b-7c720f31b166\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:18:05.513622 kubelet[2844]: E0209 19:18:05.513589 2844 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1e9a6206-262a-4f64-bb4b-7c720f31b166\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6bb5cf9998-vtf26" podUID="1e9a6206-262a-4f64-bb4b-7c720f31b166" Feb 9 19:18:05.526252 env[1644]: time="2024-02-09T19:18:05.526151718Z" level=error msg="StopPodSandbox for \"79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b\" failed" error="failed to destroy network for sandbox \"79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:18:05.526567 kubelet[2844]: E0209 19:18:05.526518 2844 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" Feb 9 19:18:05.526678 kubelet[2844]: E0209 19:18:05.526583 2844 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b"} Feb 9 19:18:05.526678 kubelet[2844]: E0209 19:18:05.526651 2844 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c92e9f65-3ffb-41a3-8b6b-9e43b91e0f7b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:18:05.526998 kubelet[2844]: E0209 19:18:05.526702 2844 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c92e9f65-3ffb-41a3-8b6b-9e43b91e0f7b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-wm5lb" podUID="c92e9f65-3ffb-41a3-8b6b-9e43b91e0f7b" Feb 9 19:18:05.540950 env[1644]: time="2024-02-09T19:18:05.540869427Z" level=error msg="StopPodSandbox for \"6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38\" failed" error="failed to destroy network for sandbox \"6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:18:05.541244 kubelet[2844]: E0209 19:18:05.541207 2844 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" Feb 9 19:18:05.541426 kubelet[2844]: E0209 19:18:05.541272 2844 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38"} Feb 9 19:18:05.541426 kubelet[2844]: E0209 19:18:05.541333 2844 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cb65ce5a-64ff-4274-87c2-ba066e48e105\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:18:05.541426 kubelet[2844]: E0209 19:18:05.541384 2844 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cb65ce5a-64ff-4274-87c2-ba066e48e105\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-xxj25" podUID="cb65ce5a-64ff-4274-87c2-ba066e48e105" Feb 9 19:18:13.725722 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2703169837.mount: Deactivated successfully. Feb 9 19:18:13.841046 env[1644]: time="2024-02-09T19:18:13.840984206Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:13.844117 env[1644]: time="2024-02-09T19:18:13.844068135Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:13.846973 env[1644]: time="2024-02-09T19:18:13.846911521Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:13.849967 env[1644]: time="2024-02-09T19:18:13.849919270Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:13.851136 env[1644]: time="2024-02-09T19:18:13.851086638Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 9 19:18:13.890037 env[1644]: time="2024-02-09T19:18:13.889950209Z" level=info msg="CreateContainer within sandbox \"3980a477232254b99bbf5bd2686da0b2d6e4250f5b561a65c2605972949b05e0\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 19:18:13.916553 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2084409486.mount: Deactivated successfully. Feb 9 19:18:13.934673 env[1644]: time="2024-02-09T19:18:13.934586034Z" level=info msg="CreateContainer within sandbox \"3980a477232254b99bbf5bd2686da0b2d6e4250f5b561a65c2605972949b05e0\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"7924bca9f0b88a9decfb444b2a8f61610d25ea051241e9c6fa270fc336b6ee9b\"" Feb 9 19:18:13.936286 env[1644]: time="2024-02-09T19:18:13.936231522Z" level=info msg="StartContainer for \"7924bca9f0b88a9decfb444b2a8f61610d25ea051241e9c6fa270fc336b6ee9b\"" Feb 9 19:18:13.968585 systemd[1]: Started cri-containerd-7924bca9f0b88a9decfb444b2a8f61610d25ea051241e9c6fa270fc336b6ee9b.scope. Feb 9 19:18:14.027000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.031620 kernel: kauditd_printk_skb: 40 callbacks suppressed Feb 9 19:18:14.031756 kernel: audit: type=1400 audit(1707506294.027:1168): avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.027000 audit[3777]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3288 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:14.050525 kernel: audit: type=1300 audit(1707506294.027:1168): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3288 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:14.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739323462636139663062383861396465636662343434623261386636 Feb 9 19:18:14.062506 kernel: audit: type=1327 audit(1707506294.027:1168): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739323462636139663062383861396465636662343434623261386636 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.070238 kernel: audit: type=1400 audit(1707506294.028:1169): avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.078547 kernel: audit: type=1400 audit(1707506294.028:1169): avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.089543 kernel: audit: type=1400 audit(1707506294.028:1169): avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.099958 kernel: audit: type=1400 audit(1707506294.028:1169): avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.109891 kernel: audit: type=1400 audit(1707506294.028:1169): avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.119372 kernel: audit: type=1400 audit(1707506294.028:1169): avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.127244 kernel: audit: type=1400 audit(1707506294.028:1169): avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit: BPF prog-id=148 op=LOAD Feb 9 19:18:14.028000 audit[3777]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3288 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:14.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739323462636139663062383861396465636662343434623261386636 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit: BPF prog-id=149 op=LOAD Feb 9 19:18:14.028000 audit[3777]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3288 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:14.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739323462636139663062383861396465636662343434623261386636 Feb 9 19:18:14.028000 audit: BPF prog-id=149 op=UNLOAD Feb 9 19:18:14.028000 audit: BPF prog-id=148 op=UNLOAD Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:14.028000 audit: BPF prog-id=150 op=LOAD Feb 9 19:18:14.028000 audit[3777]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3288 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:14.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739323462636139663062383861396465636662343434623261386636 Feb 9 19:18:14.134314 env[1644]: time="2024-02-09T19:18:14.134254866Z" level=info msg="StartContainer for \"7924bca9f0b88a9decfb444b2a8f61610d25ea051241e9c6fa270fc336b6ee9b\" returns successfully" Feb 9 19:18:14.234776 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 19:18:14.234930 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 19:18:14.476749 kubelet[2844]: I0209 19:18:14.476632 2844 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-swt6g" podStartSLOduration=1.886082462 podCreationTimestamp="2024-02-09 19:17:51 +0000 UTC" firstStartedPulling="2024-02-09 19:17:52.261012284 +0000 UTC m=+22.405787639" lastFinishedPulling="2024-02-09 19:18:13.851469437 +0000 UTC m=+43.996244792" observedRunningTime="2024-02-09 19:18:14.476155117 +0000 UTC m=+44.620930496" watchObservedRunningTime="2024-02-09 19:18:14.476539615 +0000 UTC m=+44.621314982" Feb 9 19:18:15.482622 systemd[1]: run-containerd-runc-k8s.io-7924bca9f0b88a9decfb444b2a8f61610d25ea051241e9c6fa270fc336b6ee9b-runc.nxWF83.mount: Deactivated successfully. Feb 9 19:18:16.024000 audit[3923]: AVC avc: denied { write } for pid=3923 comm="tee" name="fd" dev="proc" ino=20938 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:18:16.024000 audit[3923]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcaae2987 a2=241 a3=1b6 items=1 ppid=3886 pid=3923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:16.043000 audit[3933]: AVC avc: denied { write } for pid=3933 comm="tee" name="fd" dev="proc" ino=20952 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:18:16.043000 audit[3933]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff42cf988 a2=241 a3=1b6 items=1 ppid=3890 pid=3933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:16.043000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 19:18:16.043000 audit: PATH item=0 name="/dev/fd/63" inode=20940 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:18:16.043000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:18:16.024000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 19:18:16.024000 audit: PATH item=0 name="/dev/fd/63" inode=20921 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:18:16.024000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:18:16.085000 audit[3945]: AVC avc: denied { write } for pid=3945 comm="tee" name="fd" dev="proc" ino=20968 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:18:16.085000 audit[3945]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffeca0b978 a2=241 a3=1b6 items=1 ppid=3885 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:16.085000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 19:18:16.085000 audit: PATH item=0 name="/dev/fd/63" inode=20959 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:18:16.085000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:18:16.079000 audit[3938]: AVC avc: denied { write } for pid=3938 comm="tee" name="fd" dev="proc" ino=20965 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:18:16.079000 audit[3938]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc66bc989 a2=241 a3=1b6 items=1 ppid=3893 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:16.079000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 19:18:16.079000 audit: PATH item=0 name="/dev/fd/63" inode=20941 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:18:16.079000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:18:16.108000 audit[3947]: AVC avc: denied { write } for pid=3947 comm="tee" name="fd" dev="proc" ino=20282 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:18:16.108000 audit[3947]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffefd8e977 a2=241 a3=1b6 items=1 ppid=3897 pid=3947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:16.108000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 19:18:16.108000 audit: PATH item=0 name="/dev/fd/63" inode=20964 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:18:16.108000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:18:16.127000 audit[3950]: AVC avc: denied { write } for pid=3950 comm="tee" name="fd" dev="proc" ino=20980 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:18:16.127000 audit[3950]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdafd7987 a2=241 a3=1b6 items=1 ppid=3910 pid=3950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:16.127000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 19:18:16.135000 audit[3953]: AVC avc: denied { write } for pid=3953 comm="tee" name="fd" dev="proc" ino=20982 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:18:16.135000 audit[3953]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe9fd1987 a2=241 a3=1b6 items=1 ppid=3894 pid=3953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:16.135000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 19:18:16.135000 audit: PATH item=0 name="/dev/fd/63" inode=20974 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:18:16.135000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:18:16.127000 audit: PATH item=0 name="/dev/fd/63" inode=20973 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:18:16.127000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:18:16.197718 env[1644]: time="2024-02-09T19:18:16.197152481Z" level=info msg="StopPodSandbox for \"e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd\"" Feb 9 19:18:16.459192 env[1644]: 2024-02-09 19:18:16.355 [INFO][3973] k8s.go 578: Cleaning up netns ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" Feb 9 19:18:16.459192 env[1644]: 2024-02-09 19:18:16.355 [INFO][3973] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" iface="eth0" netns="/var/run/netns/cni-2212d609-cbd8-7852-98f7-301b37d55f1d" Feb 9 19:18:16.459192 env[1644]: 2024-02-09 19:18:16.357 [INFO][3973] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" iface="eth0" netns="/var/run/netns/cni-2212d609-cbd8-7852-98f7-301b37d55f1d" Feb 9 19:18:16.459192 env[1644]: 2024-02-09 19:18:16.358 [INFO][3973] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" iface="eth0" netns="/var/run/netns/cni-2212d609-cbd8-7852-98f7-301b37d55f1d" Feb 9 19:18:16.459192 env[1644]: 2024-02-09 19:18:16.358 [INFO][3973] k8s.go 585: Releasing IP address(es) ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" Feb 9 19:18:16.459192 env[1644]: 2024-02-09 19:18:16.358 [INFO][3973] utils.go 188: Calico CNI releasing IP address ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" Feb 9 19:18:16.459192 env[1644]: 2024-02-09 19:18:16.430 [INFO][3982] ipam_plugin.go 415: Releasing address using handleID ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" HandleID="k8s-pod-network.e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" Workload="ip--172--31--31--30-k8s-calico--kube--controllers--6bb5cf9998--vtf26-eth0" Feb 9 19:18:16.459192 env[1644]: 2024-02-09 19:18:16.431 [INFO][3982] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:16.459192 env[1644]: 2024-02-09 19:18:16.431 [INFO][3982] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:16.459192 env[1644]: 2024-02-09 19:18:16.451 [WARNING][3982] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" HandleID="k8s-pod-network.e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" Workload="ip--172--31--31--30-k8s-calico--kube--controllers--6bb5cf9998--vtf26-eth0" Feb 9 19:18:16.459192 env[1644]: 2024-02-09 19:18:16.451 [INFO][3982] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" HandleID="k8s-pod-network.e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" Workload="ip--172--31--31--30-k8s-calico--kube--controllers--6bb5cf9998--vtf26-eth0" Feb 9 19:18:16.459192 env[1644]: 2024-02-09 19:18:16.454 [INFO][3982] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:16.459192 env[1644]: 2024-02-09 19:18:16.456 [INFO][3973] k8s.go 591: Teardown processing complete. ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" Feb 9 19:18:16.463003 systemd[1]: run-netns-cni\x2d2212d609\x2dcbd8\x2d7852\x2d98f7\x2d301b37d55f1d.mount: Deactivated successfully. Feb 9 19:18:16.465176 env[1644]: time="2024-02-09T19:18:16.465120325Z" level=info msg="TearDown network for sandbox \"e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd\" successfully" Feb 9 19:18:16.465325 env[1644]: time="2024-02-09T19:18:16.465289216Z" level=info msg="StopPodSandbox for \"e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd\" returns successfully" Feb 9 19:18:16.466632 env[1644]: time="2024-02-09T19:18:16.466565661Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6bb5cf9998-vtf26,Uid:1e9a6206-262a-4f64-bb4b-7c720f31b166,Namespace:calico-system,Attempt:1,}" Feb 9 19:18:16.786597 (udev-worker)[4037]: Network interface NamePolicy= disabled on kernel command line. Feb 9 19:18:16.793781 systemd-networkd[1448]: calidee8127dd93: Link UP Feb 9 19:18:16.805856 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:18:16.806033 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidee8127dd93: link becomes ready Feb 9 19:18:16.808949 systemd-networkd[1448]: calidee8127dd93: Gained carrier Feb 9 19:18:16.839006 env[1644]: 2024-02-09 19:18:16.572 [INFO][3996] utils.go 100: File /var/lib/calico/mtu does not exist Feb 9 19:18:16.839006 env[1644]: 2024-02-09 19:18:16.599 [INFO][3996] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--31--30-k8s-calico--kube--controllers--6bb5cf9998--vtf26-eth0 calico-kube-controllers-6bb5cf9998- calico-system 1e9a6206-262a-4f64-bb4b-7c720f31b166 677 0 2024-02-09 19:17:51 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6bb5cf9998 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-31-30 calico-kube-controllers-6bb5cf9998-vtf26 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calidee8127dd93 [] []}} ContainerID="d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3" Namespace="calico-system" Pod="calico-kube-controllers-6bb5cf9998-vtf26" WorkloadEndpoint="ip--172--31--31--30-k8s-calico--kube--controllers--6bb5cf9998--vtf26-" Feb 9 19:18:16.839006 env[1644]: 2024-02-09 19:18:16.599 [INFO][3996] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3" Namespace="calico-system" Pod="calico-kube-controllers-6bb5cf9998-vtf26" WorkloadEndpoint="ip--172--31--31--30-k8s-calico--kube--controllers--6bb5cf9998--vtf26-eth0" Feb 9 19:18:16.839006 env[1644]: 2024-02-09 19:18:16.676 [INFO][4018] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3" HandleID="k8s-pod-network.d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3" Workload="ip--172--31--31--30-k8s-calico--kube--controllers--6bb5cf9998--vtf26-eth0" Feb 9 19:18:16.839006 env[1644]: 2024-02-09 19:18:16.706 [INFO][4018] ipam_plugin.go 268: Auto assigning IP ContainerID="d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3" HandleID="k8s-pod-network.d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3" Workload="ip--172--31--31--30-k8s-calico--kube--controllers--6bb5cf9998--vtf26-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400025e750), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-31-30", "pod":"calico-kube-controllers-6bb5cf9998-vtf26", "timestamp":"2024-02-09 19:18:16.676572577 +0000 UTC"}, Hostname:"ip-172-31-31-30", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:18:16.839006 env[1644]: 2024-02-09 19:18:16.706 [INFO][4018] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:16.839006 env[1644]: 2024-02-09 19:18:16.706 [INFO][4018] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:16.839006 env[1644]: 2024-02-09 19:18:16.707 [INFO][4018] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-31-30' Feb 9 19:18:16.839006 env[1644]: 2024-02-09 19:18:16.710 [INFO][4018] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3" host="ip-172-31-31-30" Feb 9 19:18:16.839006 env[1644]: 2024-02-09 19:18:16.718 [INFO][4018] ipam.go 372: Looking up existing affinities for host host="ip-172-31-31-30" Feb 9 19:18:16.839006 env[1644]: 2024-02-09 19:18:16.730 [INFO][4018] ipam.go 489: Trying affinity for 192.168.10.64/26 host="ip-172-31-31-30" Feb 9 19:18:16.839006 env[1644]: 2024-02-09 19:18:16.737 [INFO][4018] ipam.go 155: Attempting to load block cidr=192.168.10.64/26 host="ip-172-31-31-30" Feb 9 19:18:16.839006 env[1644]: 2024-02-09 19:18:16.742 [INFO][4018] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.10.64/26 host="ip-172-31-31-30" Feb 9 19:18:16.839006 env[1644]: 2024-02-09 19:18:16.742 [INFO][4018] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.10.64/26 handle="k8s-pod-network.d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3" host="ip-172-31-31-30" Feb 9 19:18:16.839006 env[1644]: 2024-02-09 19:18:16.744 [INFO][4018] ipam.go 1682: Creating new handle: k8s-pod-network.d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3 Feb 9 19:18:16.839006 env[1644]: 2024-02-09 19:18:16.751 [INFO][4018] ipam.go 1203: Writing block in order to claim IPs block=192.168.10.64/26 handle="k8s-pod-network.d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3" host="ip-172-31-31-30" Feb 9 19:18:16.839006 env[1644]: 2024-02-09 19:18:16.761 [INFO][4018] ipam.go 1216: Successfully claimed IPs: [192.168.10.65/26] block=192.168.10.64/26 handle="k8s-pod-network.d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3" host="ip-172-31-31-30" Feb 9 19:18:16.839006 env[1644]: 2024-02-09 19:18:16.761 [INFO][4018] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.10.65/26] handle="k8s-pod-network.d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3" host="ip-172-31-31-30" Feb 9 19:18:16.839006 env[1644]: 2024-02-09 19:18:16.762 [INFO][4018] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:16.839006 env[1644]: 2024-02-09 19:18:16.762 [INFO][4018] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.10.65/26] IPv6=[] ContainerID="d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3" HandleID="k8s-pod-network.d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3" Workload="ip--172--31--31--30-k8s-calico--kube--controllers--6bb5cf9998--vtf26-eth0" Feb 9 19:18:16.842634 env[1644]: 2024-02-09 19:18:16.768 [INFO][3996] k8s.go 385: Populated endpoint ContainerID="d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3" Namespace="calico-system" Pod="calico-kube-controllers-6bb5cf9998-vtf26" WorkloadEndpoint="ip--172--31--31--30-k8s-calico--kube--controllers--6bb5cf9998--vtf26-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--30-k8s-calico--kube--controllers--6bb5cf9998--vtf26-eth0", GenerateName:"calico-kube-controllers-6bb5cf9998-", Namespace:"calico-system", SelfLink:"", UID:"1e9a6206-262a-4f64-bb4b-7c720f31b166", ResourceVersion:"677", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6bb5cf9998", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-30", ContainerID:"", Pod:"calico-kube-controllers-6bb5cf9998-vtf26", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.10.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calidee8127dd93", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:16.842634 env[1644]: 2024-02-09 19:18:16.768 [INFO][3996] k8s.go 386: Calico CNI using IPs: [192.168.10.65/32] ContainerID="d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3" Namespace="calico-system" Pod="calico-kube-controllers-6bb5cf9998-vtf26" WorkloadEndpoint="ip--172--31--31--30-k8s-calico--kube--controllers--6bb5cf9998--vtf26-eth0" Feb 9 19:18:16.842634 env[1644]: 2024-02-09 19:18:16.768 [INFO][3996] dataplane_linux.go 68: Setting the host side veth name to calidee8127dd93 ContainerID="d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3" Namespace="calico-system" Pod="calico-kube-controllers-6bb5cf9998-vtf26" WorkloadEndpoint="ip--172--31--31--30-k8s-calico--kube--controllers--6bb5cf9998--vtf26-eth0" Feb 9 19:18:16.842634 env[1644]: 2024-02-09 19:18:16.810 [INFO][3996] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3" Namespace="calico-system" Pod="calico-kube-controllers-6bb5cf9998-vtf26" WorkloadEndpoint="ip--172--31--31--30-k8s-calico--kube--controllers--6bb5cf9998--vtf26-eth0" Feb 9 19:18:16.842634 env[1644]: 2024-02-09 19:18:16.811 [INFO][3996] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3" Namespace="calico-system" Pod="calico-kube-controllers-6bb5cf9998-vtf26" WorkloadEndpoint="ip--172--31--31--30-k8s-calico--kube--controllers--6bb5cf9998--vtf26-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--30-k8s-calico--kube--controllers--6bb5cf9998--vtf26-eth0", GenerateName:"calico-kube-controllers-6bb5cf9998-", Namespace:"calico-system", SelfLink:"", UID:"1e9a6206-262a-4f64-bb4b-7c720f31b166", ResourceVersion:"677", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6bb5cf9998", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-30", ContainerID:"d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3", Pod:"calico-kube-controllers-6bb5cf9998-vtf26", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.10.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calidee8127dd93", MAC:"26:ee:a9:d5:f6:88", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:16.842634 env[1644]: 2024-02-09 19:18:16.834 [INFO][3996] k8s.go 491: Wrote updated endpoint to datastore ContainerID="d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3" Namespace="calico-system" Pod="calico-kube-controllers-6bb5cf9998-vtf26" WorkloadEndpoint="ip--172--31--31--30-k8s-calico--kube--controllers--6bb5cf9998--vtf26-eth0" Feb 9 19:18:16.871952 env[1644]: time="2024-02-09T19:18:16.871763497Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:18:16.872285 env[1644]: time="2024-02-09T19:18:16.872213162Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:18:16.872483 env[1644]: time="2024-02-09T19:18:16.872423139Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:18:16.873162 env[1644]: time="2024-02-09T19:18:16.873046926Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3 pid=4062 runtime=io.containerd.runc.v2 Feb 9 19:18:16.912448 systemd[1]: Started cri-containerd-d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3.scope. Feb 9 19:18:16.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.971000 audit: BPF prog-id=151 op=LOAD Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=4062 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:16.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433626137643539346136626566316632353632613031383565386138 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=4062 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:16.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433626137643539346136626566316632353632613031383565386138 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit: BPF prog-id=152 op=LOAD Feb 9 19:18:16.972000 audit[4074]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=4062 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:16.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433626137643539346136626566316632353632613031383565386138 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit: BPF prog-id=153 op=LOAD Feb 9 19:18:16.972000 audit[4074]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=4062 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:16.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433626137643539346136626566316632353632613031383565386138 Feb 9 19:18:16.972000 audit: BPF prog-id=153 op=UNLOAD Feb 9 19:18:16.972000 audit: BPF prog-id=152 op=UNLOAD Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { perfmon } for pid=4074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit[4074]: AVC avc: denied { bpf } for pid=4074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:16.972000 audit: BPF prog-id=154 op=LOAD Feb 9 19:18:16.972000 audit[4074]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=4062 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:16.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433626137643539346136626566316632353632613031383565386138 Feb 9 19:18:17.149040 env[1644]: time="2024-02-09T19:18:17.148967612Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6bb5cf9998-vtf26,Uid:1e9a6206-262a-4f64-bb4b-7c720f31b166,Namespace:calico-system,Attempt:1,} returns sandbox id \"d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3\"" Feb 9 19:18:17.151546 env[1644]: time="2024-02-09T19:18:17.151480528Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 19:18:17.194589 env[1644]: time="2024-02-09T19:18:17.194515920Z" level=info msg="StopPodSandbox for \"79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b\"" Feb 9 19:18:17.384470 env[1644]: 2024-02-09 19:18:17.284 [INFO][4124] k8s.go 578: Cleaning up netns ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" Feb 9 19:18:17.384470 env[1644]: 2024-02-09 19:18:17.284 [INFO][4124] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" iface="eth0" netns="/var/run/netns/cni-a5722b35-fded-4c99-34fe-5505775aab4a" Feb 9 19:18:17.384470 env[1644]: 2024-02-09 19:18:17.284 [INFO][4124] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" iface="eth0" netns="/var/run/netns/cni-a5722b35-fded-4c99-34fe-5505775aab4a" Feb 9 19:18:17.384470 env[1644]: 2024-02-09 19:18:17.285 [INFO][4124] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" iface="eth0" netns="/var/run/netns/cni-a5722b35-fded-4c99-34fe-5505775aab4a" Feb 9 19:18:17.384470 env[1644]: 2024-02-09 19:18:17.285 [INFO][4124] k8s.go 585: Releasing IP address(es) ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" Feb 9 19:18:17.384470 env[1644]: 2024-02-09 19:18:17.285 [INFO][4124] utils.go 188: Calico CNI releasing IP address ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" Feb 9 19:18:17.384470 env[1644]: 2024-02-09 19:18:17.355 [INFO][4132] ipam_plugin.go 415: Releasing address using handleID ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" HandleID="k8s-pod-network.79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" Workload="ip--172--31--31--30-k8s-coredns--5dd5756b68--wm5lb-eth0" Feb 9 19:18:17.384470 env[1644]: 2024-02-09 19:18:17.355 [INFO][4132] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:17.384470 env[1644]: 2024-02-09 19:18:17.356 [INFO][4132] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:17.384470 env[1644]: 2024-02-09 19:18:17.376 [WARNING][4132] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" HandleID="k8s-pod-network.79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" Workload="ip--172--31--31--30-k8s-coredns--5dd5756b68--wm5lb-eth0" Feb 9 19:18:17.384470 env[1644]: 2024-02-09 19:18:17.376 [INFO][4132] ipam_plugin.go 443: Releasing address using workloadID ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" HandleID="k8s-pod-network.79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" Workload="ip--172--31--31--30-k8s-coredns--5dd5756b68--wm5lb-eth0" Feb 9 19:18:17.384470 env[1644]: 2024-02-09 19:18:17.379 [INFO][4132] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:17.384470 env[1644]: 2024-02-09 19:18:17.382 [INFO][4124] k8s.go 591: Teardown processing complete. ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" Feb 9 19:18:17.388580 systemd[1]: run-netns-cni\x2da5722b35\x2dfded\x2d4c99\x2d34fe\x2d5505775aab4a.mount: Deactivated successfully. Feb 9 19:18:17.389419 env[1644]: time="2024-02-09T19:18:17.389337675Z" level=info msg="TearDown network for sandbox \"79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b\" successfully" Feb 9 19:18:17.389419 env[1644]: time="2024-02-09T19:18:17.389399592Z" level=info msg="StopPodSandbox for \"79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b\" returns successfully" Feb 9 19:18:17.391134 env[1644]: time="2024-02-09T19:18:17.391053494Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-wm5lb,Uid:c92e9f65-3ffb-41a3-8b6b-9e43b91e0f7b,Namespace:kube-system,Attempt:1,}" Feb 9 19:18:17.442062 (udev-worker)[3809]: Network interface NamePolicy= disabled on kernel command line. Feb 9 19:18:17.449000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.449000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.449000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.449000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.449000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.449000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.449000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.449000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.449000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.449000 audit: BPF prog-id=155 op=LOAD Feb 9 19:18:17.449000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdf3927e8 a2=70 a3=0 items=0 ppid=3895 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:17.449000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:18:17.449000 audit: BPF prog-id=155 op=UNLOAD Feb 9 19:18:17.449000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.449000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.449000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.449000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.449000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.449000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.449000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.449000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.449000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.449000 audit: BPF prog-id=156 op=LOAD Feb 9 19:18:17.449000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdf3927e8 a2=70 a3=4a174c items=0 ppid=3895 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:17.449000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:18:17.449000 audit: BPF prog-id=156 op=UNLOAD Feb 9 19:18:17.449000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.449000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffdf392818 a2=70 a3=1183773f items=0 ppid=3895 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:17.449000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:18:17.450000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.450000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.450000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.450000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.450000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.450000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.450000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.450000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.450000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.450000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.450000 audit: BPF prog-id=157 op=LOAD Feb 9 19:18:17.450000 audit[4159]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffdf392768 a2=70 a3=11837759 items=0 ppid=3895 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:17.450000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:18:17.469000 audit[4161]: AVC avc: denied { bpf } for pid=4161 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.469000 audit[4161]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe3538cc8 a2=70 a3=0 items=0 ppid=3895 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:17.469000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:18:17.469000 audit[4161]: AVC avc: denied { bpf } for pid=4161 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.469000 audit[4161]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe3538ba8 a2=70 a3=2 items=0 ppid=3895 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:17.469000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:18:17.481000 audit: BPF prog-id=157 op=UNLOAD Feb 9 19:18:17.648000 audit[4194]: NETFILTER_CFG table=mangle:97 family=2 entries=19 op=nft_register_chain pid=4194 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:18:17.648000 audit[4194]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffdc570fc0 a2=0 a3=ffff827f1fa8 items=0 ppid=3895 pid=4194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:17.648000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:18:17.662000 audit[4193]: NETFILTER_CFG table=raw:98 family=2 entries=19 op=nft_register_chain pid=4193 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:18:17.662000 audit[4193]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffe2c61e30 a2=0 a3=ffffae844fa8 items=0 ppid=3895 pid=4193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:17.662000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:18:17.692000 audit[4195]: NETFILTER_CFG table=nat:99 family=2 entries=16 op=nft_register_chain pid=4195 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:18:17.692000 audit[4195]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffff133440 a2=0 a3=ffffb02b3fa8 items=0 ppid=3895 pid=4195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:17.692000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:18:17.702303 (udev-worker)[4166]: Network interface NamePolicy= disabled on kernel command line. Feb 9 19:18:17.706525 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1ef544c51e3: link becomes ready Feb 9 19:18:17.707000 audit[4196]: NETFILTER_CFG table=filter:100 family=2 entries=71 op=nft_register_chain pid=4196 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:18:17.707000 audit[4196]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=36636 a0=3 a1=ffffd10a6800 a2=0 a3=ffff9cd95fa8 items=0 ppid=3895 pid=4196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:17.707000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:18:17.709968 systemd-networkd[1448]: cali1ef544c51e3: Link UP Feb 9 19:18:17.710341 systemd-networkd[1448]: cali1ef544c51e3: Gained carrier Feb 9 19:18:17.745410 env[1644]: 2024-02-09 19:18:17.543 [INFO][4144] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--31--30-k8s-coredns--5dd5756b68--wm5lb-eth0 coredns-5dd5756b68- kube-system c92e9f65-3ffb-41a3-8b6b-9e43b91e0f7b 683 0 2024-02-09 19:17:44 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-31-30 coredns-5dd5756b68-wm5lb eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali1ef544c51e3 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818" Namespace="kube-system" Pod="coredns-5dd5756b68-wm5lb" WorkloadEndpoint="ip--172--31--31--30-k8s-coredns--5dd5756b68--wm5lb-" Feb 9 19:18:17.745410 env[1644]: 2024-02-09 19:18:17.543 [INFO][4144] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818" Namespace="kube-system" Pod="coredns-5dd5756b68-wm5lb" WorkloadEndpoint="ip--172--31--31--30-k8s-coredns--5dd5756b68--wm5lb-eth0" Feb 9 19:18:17.745410 env[1644]: 2024-02-09 19:18:17.612 [INFO][4177] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818" HandleID="k8s-pod-network.61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818" Workload="ip--172--31--31--30-k8s-coredns--5dd5756b68--wm5lb-eth0" Feb 9 19:18:17.745410 env[1644]: 2024-02-09 19:18:17.637 [INFO][4177] ipam_plugin.go 268: Auto assigning IP ContainerID="61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818" HandleID="k8s-pod-network.61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818" Workload="ip--172--31--31--30-k8s-coredns--5dd5756b68--wm5lb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400023b8d0), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-31-30", "pod":"coredns-5dd5756b68-wm5lb", "timestamp":"2024-02-09 19:18:17.612942443 +0000 UTC"}, Hostname:"ip-172-31-31-30", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:18:17.745410 env[1644]: 2024-02-09 19:18:17.637 [INFO][4177] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:17.745410 env[1644]: 2024-02-09 19:18:17.638 [INFO][4177] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:17.745410 env[1644]: 2024-02-09 19:18:17.638 [INFO][4177] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-31-30' Feb 9 19:18:17.745410 env[1644]: 2024-02-09 19:18:17.643 [INFO][4177] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818" host="ip-172-31-31-30" Feb 9 19:18:17.745410 env[1644]: 2024-02-09 19:18:17.651 [INFO][4177] ipam.go 372: Looking up existing affinities for host host="ip-172-31-31-30" Feb 9 19:18:17.745410 env[1644]: 2024-02-09 19:18:17.661 [INFO][4177] ipam.go 489: Trying affinity for 192.168.10.64/26 host="ip-172-31-31-30" Feb 9 19:18:17.745410 env[1644]: 2024-02-09 19:18:17.665 [INFO][4177] ipam.go 155: Attempting to load block cidr=192.168.10.64/26 host="ip-172-31-31-30" Feb 9 19:18:17.745410 env[1644]: 2024-02-09 19:18:17.670 [INFO][4177] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.10.64/26 host="ip-172-31-31-30" Feb 9 19:18:17.745410 env[1644]: 2024-02-09 19:18:17.670 [INFO][4177] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.10.64/26 handle="k8s-pod-network.61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818" host="ip-172-31-31-30" Feb 9 19:18:17.745410 env[1644]: 2024-02-09 19:18:17.673 [INFO][4177] ipam.go 1682: Creating new handle: k8s-pod-network.61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818 Feb 9 19:18:17.745410 env[1644]: 2024-02-09 19:18:17.680 [INFO][4177] ipam.go 1203: Writing block in order to claim IPs block=192.168.10.64/26 handle="k8s-pod-network.61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818" host="ip-172-31-31-30" Feb 9 19:18:17.745410 env[1644]: 2024-02-09 19:18:17.696 [INFO][4177] ipam.go 1216: Successfully claimed IPs: [192.168.10.66/26] block=192.168.10.64/26 handle="k8s-pod-network.61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818" host="ip-172-31-31-30" Feb 9 19:18:17.745410 env[1644]: 2024-02-09 19:18:17.696 [INFO][4177] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.10.66/26] handle="k8s-pod-network.61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818" host="ip-172-31-31-30" Feb 9 19:18:17.745410 env[1644]: 2024-02-09 19:18:17.696 [INFO][4177] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:17.745410 env[1644]: 2024-02-09 19:18:17.696 [INFO][4177] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.10.66/26] IPv6=[] ContainerID="61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818" HandleID="k8s-pod-network.61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818" Workload="ip--172--31--31--30-k8s-coredns--5dd5756b68--wm5lb-eth0" Feb 9 19:18:17.746664 env[1644]: 2024-02-09 19:18:17.699 [INFO][4144] k8s.go 385: Populated endpoint ContainerID="61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818" Namespace="kube-system" Pod="coredns-5dd5756b68-wm5lb" WorkloadEndpoint="ip--172--31--31--30-k8s-coredns--5dd5756b68--wm5lb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--30-k8s-coredns--5dd5756b68--wm5lb-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"c92e9f65-3ffb-41a3-8b6b-9e43b91e0f7b", ResourceVersion:"683", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-30", ContainerID:"", Pod:"coredns-5dd5756b68-wm5lb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.10.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1ef544c51e3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:17.746664 env[1644]: 2024-02-09 19:18:17.699 [INFO][4144] k8s.go 386: Calico CNI using IPs: [192.168.10.66/32] ContainerID="61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818" Namespace="kube-system" Pod="coredns-5dd5756b68-wm5lb" WorkloadEndpoint="ip--172--31--31--30-k8s-coredns--5dd5756b68--wm5lb-eth0" Feb 9 19:18:17.746664 env[1644]: 2024-02-09 19:18:17.699 [INFO][4144] dataplane_linux.go 68: Setting the host side veth name to cali1ef544c51e3 ContainerID="61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818" Namespace="kube-system" Pod="coredns-5dd5756b68-wm5lb" WorkloadEndpoint="ip--172--31--31--30-k8s-coredns--5dd5756b68--wm5lb-eth0" Feb 9 19:18:17.746664 env[1644]: 2024-02-09 19:18:17.707 [INFO][4144] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818" Namespace="kube-system" Pod="coredns-5dd5756b68-wm5lb" WorkloadEndpoint="ip--172--31--31--30-k8s-coredns--5dd5756b68--wm5lb-eth0" Feb 9 19:18:17.746664 env[1644]: 2024-02-09 19:18:17.713 [INFO][4144] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818" Namespace="kube-system" Pod="coredns-5dd5756b68-wm5lb" WorkloadEndpoint="ip--172--31--31--30-k8s-coredns--5dd5756b68--wm5lb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--30-k8s-coredns--5dd5756b68--wm5lb-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"c92e9f65-3ffb-41a3-8b6b-9e43b91e0f7b", ResourceVersion:"683", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-30", ContainerID:"61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818", Pod:"coredns-5dd5756b68-wm5lb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.10.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1ef544c51e3", MAC:"aa:cd:14:6c:51:e0", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:17.746664 env[1644]: 2024-02-09 19:18:17.741 [INFO][4144] k8s.go 491: Wrote updated endpoint to datastore ContainerID="61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818" Namespace="kube-system" Pod="coredns-5dd5756b68-wm5lb" WorkloadEndpoint="ip--172--31--31--30-k8s-coredns--5dd5756b68--wm5lb-eth0" Feb 9 19:18:17.776622 env[1644]: time="2024-02-09T19:18:17.776441811Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:18:17.776852 env[1644]: time="2024-02-09T19:18:17.776703938Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:18:17.776852 env[1644]: time="2024-02-09T19:18:17.776788821Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:18:17.779509 env[1644]: time="2024-02-09T19:18:17.777402975Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818 pid=4225 runtime=io.containerd.runc.v2 Feb 9 19:18:17.851618 systemd[1]: Started cri-containerd-61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818.scope. Feb 9 19:18:17.862396 systemd-networkd[1448]: vxlan.calico: Link UP Feb 9 19:18:17.862412 systemd-networkd[1448]: vxlan.calico: Gained carrier Feb 9 19:18:17.886000 audit[4245]: NETFILTER_CFG table=filter:101 family=2 entries=40 op=nft_register_chain pid=4245 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:18:17.886000 audit[4245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21096 a0=3 a1=ffffe0eaaa90 a2=0 a3=ffff9660dfa8 items=0 ppid=3895 pid=4245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:17.886000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:18:17.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.899000 audit: BPF prog-id=158 op=LOAD Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4225 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:17.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631636531343439343332643634626561383766656336663437353838 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4225 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:17.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631636531343439343332643634626561383766656336663437353838 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit: BPF prog-id=159 op=LOAD Feb 9 19:18:17.900000 audit[4235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4225 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:17.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631636531343439343332643634626561383766656336663437353838 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit: BPF prog-id=160 op=LOAD Feb 9 19:18:17.900000 audit[4235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4225 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:17.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631636531343439343332643634626561383766656336663437353838 Feb 9 19:18:17.900000 audit: BPF prog-id=160 op=UNLOAD Feb 9 19:18:17.900000 audit: BPF prog-id=159 op=UNLOAD Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:17.900000 audit: BPF prog-id=161 op=LOAD Feb 9 19:18:17.900000 audit[4235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4225 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:17.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631636531343439343332643634626561383766656336663437353838 Feb 9 19:18:17.969084 env[1644]: time="2024-02-09T19:18:17.965614977Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-wm5lb,Uid:c92e9f65-3ffb-41a3-8b6b-9e43b91e0f7b,Namespace:kube-system,Attempt:1,} returns sandbox id \"61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818\"" Feb 9 19:18:17.975390 env[1644]: time="2024-02-09T19:18:17.975326985Z" level=info msg="CreateContainer within sandbox \"61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 19:18:18.005557 env[1644]: time="2024-02-09T19:18:18.005457952Z" level=info msg="CreateContainer within sandbox \"61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"b93a1b8906169531821637c0a6515831bd0605689bebc6598c9d469dffe5efc9\"" Feb 9 19:18:18.006981 env[1644]: time="2024-02-09T19:18:18.006927307Z" level=info msg="StartContainer for \"b93a1b8906169531821637c0a6515831bd0605689bebc6598c9d469dffe5efc9\"" Feb 9 19:18:18.051303 systemd[1]: Started cri-containerd-b93a1b8906169531821637c0a6515831bd0605689bebc6598c9d469dffe5efc9.scope. Feb 9 19:18:18.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.087000 audit: BPF prog-id=162 op=LOAD Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4225 pid=4270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:18.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239336131623839303631363935333138323136333763306136353135 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4225 pid=4270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:18.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239336131623839303631363935333138323136333763306136353135 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit: BPF prog-id=163 op=LOAD Feb 9 19:18:18.088000 audit[4270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4225 pid=4270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:18.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239336131623839303631363935333138323136333763306136353135 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit: BPF prog-id=164 op=LOAD Feb 9 19:18:18.088000 audit[4270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4225 pid=4270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:18.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239336131623839303631363935333138323136333763306136353135 Feb 9 19:18:18.088000 audit: BPF prog-id=164 op=UNLOAD Feb 9 19:18:18.088000 audit: BPF prog-id=163 op=UNLOAD Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:18.088000 audit: BPF prog-id=165 op=LOAD Feb 9 19:18:18.088000 audit[4270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4225 pid=4270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:18.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239336131623839303631363935333138323136333763306136353135 Feb 9 19:18:18.125928 env[1644]: time="2024-02-09T19:18:18.125863598Z" level=info msg="StartContainer for \"b93a1b8906169531821637c0a6515831bd0605689bebc6598c9d469dffe5efc9\" returns successfully" Feb 9 19:18:18.536397 kubelet[2844]: I0209 19:18:18.536332 2844 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-wm5lb" podStartSLOduration=34.536243838 podCreationTimestamp="2024-02-09 19:17:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:18:18.506704888 +0000 UTC m=+48.651480807" watchObservedRunningTime="2024-02-09 19:18:18.536243838 +0000 UTC m=+48.681019205" Feb 9 19:18:18.574000 audit[4304]: NETFILTER_CFG table=filter:102 family=2 entries=14 op=nft_register_rule pid=4304 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:18:18.574000 audit[4304]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffe57ac040 a2=0 a3=ffff8ad1c6c0 items=0 ppid=2987 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:18.574000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:18:18.578000 audit[4304]: NETFILTER_CFG table=nat:103 family=2 entries=14 op=nft_register_rule pid=4304 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:18:18.578000 audit[4304]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3300 a0=3 a1=ffffe57ac040 a2=0 a3=ffff8ad1c6c0 items=0 ppid=2987 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:18.578000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:18:18.591000 audit[4306]: NETFILTER_CFG table=filter:104 family=2 entries=11 op=nft_register_rule pid=4306 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:18:18.591000 audit[4306]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=fffffab36320 a2=0 a3=ffff87f7e6c0 items=0 ppid=2987 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:18.591000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:18:18.595000 audit[4306]: NETFILTER_CFG table=nat:105 family=2 entries=35 op=nft_register_chain pid=4306 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:18:18.595000 audit[4306]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13788 a0=3 a1=fffffab36320 a2=0 a3=ffff87f7e6c0 items=0 ppid=2987 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:18.595000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:18:18.648024 systemd-networkd[1448]: calidee8127dd93: Gained IPv6LL Feb 9 19:18:18.904181 systemd-networkd[1448]: cali1ef544c51e3: Gained IPv6LL Feb 9 19:18:19.671978 systemd-networkd[1448]: vxlan.calico: Gained IPv6LL Feb 9 19:18:20.200156 env[1644]: time="2024-02-09T19:18:20.200085378Z" level=info msg="StopPodSandbox for \"6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38\"" Feb 9 19:18:20.213866 env[1644]: time="2024-02-09T19:18:20.213538994Z" level=info msg="StopPodSandbox for \"12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f\"" Feb 9 19:18:20.504568 env[1644]: 2024-02-09 19:18:20.394 [INFO][4338] k8s.go 578: Cleaning up netns ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" Feb 9 19:18:20.504568 env[1644]: 2024-02-09 19:18:20.394 [INFO][4338] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" iface="eth0" netns="/var/run/netns/cni-020cdae6-357d-4dc5-abec-452929ea4eb5" Feb 9 19:18:20.504568 env[1644]: 2024-02-09 19:18:20.404 [INFO][4338] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" iface="eth0" netns="/var/run/netns/cni-020cdae6-357d-4dc5-abec-452929ea4eb5" Feb 9 19:18:20.504568 env[1644]: 2024-02-09 19:18:20.404 [INFO][4338] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" iface="eth0" netns="/var/run/netns/cni-020cdae6-357d-4dc5-abec-452929ea4eb5" Feb 9 19:18:20.504568 env[1644]: 2024-02-09 19:18:20.404 [INFO][4338] k8s.go 585: Releasing IP address(es) ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" Feb 9 19:18:20.504568 env[1644]: 2024-02-09 19:18:20.404 [INFO][4338] utils.go 188: Calico CNI releasing IP address ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" Feb 9 19:18:20.504568 env[1644]: 2024-02-09 19:18:20.473 [INFO][4354] ipam_plugin.go 415: Releasing address using handleID ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" HandleID="k8s-pod-network.12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" Workload="ip--172--31--31--30-k8s-csi--node--driver--7xmtp-eth0" Feb 9 19:18:20.504568 env[1644]: 2024-02-09 19:18:20.473 [INFO][4354] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:20.504568 env[1644]: 2024-02-09 19:18:20.473 [INFO][4354] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:20.504568 env[1644]: 2024-02-09 19:18:20.487 [WARNING][4354] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" HandleID="k8s-pod-network.12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" Workload="ip--172--31--31--30-k8s-csi--node--driver--7xmtp-eth0" Feb 9 19:18:20.504568 env[1644]: 2024-02-09 19:18:20.487 [INFO][4354] ipam_plugin.go 443: Releasing address using workloadID ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" HandleID="k8s-pod-network.12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" Workload="ip--172--31--31--30-k8s-csi--node--driver--7xmtp-eth0" Feb 9 19:18:20.504568 env[1644]: 2024-02-09 19:18:20.491 [INFO][4354] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:20.504568 env[1644]: 2024-02-09 19:18:20.494 [INFO][4338] k8s.go 591: Teardown processing complete. ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" Feb 9 19:18:20.510825 systemd[1]: run-netns-cni\x2d020cdae6\x2d357d\x2d4dc5\x2dabec\x2d452929ea4eb5.mount: Deactivated successfully. Feb 9 19:18:20.511953 env[1644]: time="2024-02-09T19:18:20.511893218Z" level=info msg="TearDown network for sandbox \"12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f\" successfully" Feb 9 19:18:20.514332 env[1644]: time="2024-02-09T19:18:20.514246573Z" level=info msg="StopPodSandbox for \"12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f\" returns successfully" Feb 9 19:18:20.516151 env[1644]: time="2024-02-09T19:18:20.516098336Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7xmtp,Uid:0cf9d635-829d-4747-a129-fb192fc90fe3,Namespace:calico-system,Attempt:1,}" Feb 9 19:18:20.545056 env[1644]: 2024-02-09 19:18:20.375 [INFO][4334] k8s.go 578: Cleaning up netns ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" Feb 9 19:18:20.545056 env[1644]: 2024-02-09 19:18:20.375 [INFO][4334] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" iface="eth0" netns="/var/run/netns/cni-de33a59f-9503-460d-8c35-b86b482a6a83" Feb 9 19:18:20.545056 env[1644]: 2024-02-09 19:18:20.376 [INFO][4334] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" iface="eth0" netns="/var/run/netns/cni-de33a59f-9503-460d-8c35-b86b482a6a83" Feb 9 19:18:20.545056 env[1644]: 2024-02-09 19:18:20.376 [INFO][4334] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" iface="eth0" netns="/var/run/netns/cni-de33a59f-9503-460d-8c35-b86b482a6a83" Feb 9 19:18:20.545056 env[1644]: 2024-02-09 19:18:20.376 [INFO][4334] k8s.go 585: Releasing IP address(es) ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" Feb 9 19:18:20.545056 env[1644]: 2024-02-09 19:18:20.376 [INFO][4334] utils.go 188: Calico CNI releasing IP address ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" Feb 9 19:18:20.545056 env[1644]: 2024-02-09 19:18:20.470 [INFO][4349] ipam_plugin.go 415: Releasing address using handleID ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" HandleID="k8s-pod-network.6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" Workload="ip--172--31--31--30-k8s-coredns--5dd5756b68--xxj25-eth0" Feb 9 19:18:20.545056 env[1644]: 2024-02-09 19:18:20.474 [INFO][4349] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:20.545056 env[1644]: 2024-02-09 19:18:20.492 [INFO][4349] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:20.545056 env[1644]: 2024-02-09 19:18:20.530 [WARNING][4349] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" HandleID="k8s-pod-network.6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" Workload="ip--172--31--31--30-k8s-coredns--5dd5756b68--xxj25-eth0" Feb 9 19:18:20.545056 env[1644]: 2024-02-09 19:18:20.531 [INFO][4349] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" HandleID="k8s-pod-network.6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" Workload="ip--172--31--31--30-k8s-coredns--5dd5756b68--xxj25-eth0" Feb 9 19:18:20.545056 env[1644]: 2024-02-09 19:18:20.534 [INFO][4349] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:20.545056 env[1644]: 2024-02-09 19:18:20.537 [INFO][4334] k8s.go 591: Teardown processing complete. ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" Feb 9 19:18:20.552144 env[1644]: time="2024-02-09T19:18:20.552081512Z" level=info msg="TearDown network for sandbox \"6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38\" successfully" Feb 9 19:18:20.552358 env[1644]: time="2024-02-09T19:18:20.552322834Z" level=info msg="StopPodSandbox for \"6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38\" returns successfully" Feb 9 19:18:20.555960 systemd[1]: run-netns-cni\x2dde33a59f\x2d9503\x2d460d\x2d8c35\x2db86b482a6a83.mount: Deactivated successfully. Feb 9 19:18:20.573227 env[1644]: time="2024-02-09T19:18:20.573160393Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-xxj25,Uid:cb65ce5a-64ff-4274-87c2-ba066e48e105,Namespace:kube-system,Attempt:1,}" Feb 9 19:18:20.930412 systemd-networkd[1448]: calibceb5d0df40: Link UP Feb 9 19:18:20.936224 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:18:20.936380 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibceb5d0df40: link becomes ready Feb 9 19:18:20.936639 systemd-networkd[1448]: calibceb5d0df40: Gained carrier Feb 9 19:18:20.953123 (udev-worker)[4398]: Network interface NamePolicy= disabled on kernel command line. Feb 9 19:18:20.972848 env[1644]: 2024-02-09 19:18:20.740 [INFO][4371] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--31--30-k8s-coredns--5dd5756b68--xxj25-eth0 coredns-5dd5756b68- kube-system cb65ce5a-64ff-4274-87c2-ba066e48e105 711 0 2024-02-09 19:17:44 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-31-30 coredns-5dd5756b68-xxj25 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calibceb5d0df40 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9" Namespace="kube-system" Pod="coredns-5dd5756b68-xxj25" WorkloadEndpoint="ip--172--31--31--30-k8s-coredns--5dd5756b68--xxj25-" Feb 9 19:18:20.972848 env[1644]: 2024-02-09 19:18:20.740 [INFO][4371] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9" Namespace="kube-system" Pod="coredns-5dd5756b68-xxj25" WorkloadEndpoint="ip--172--31--31--30-k8s-coredns--5dd5756b68--xxj25-eth0" Feb 9 19:18:20.972848 env[1644]: 2024-02-09 19:18:20.805 [INFO][4386] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9" HandleID="k8s-pod-network.1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9" Workload="ip--172--31--31--30-k8s-coredns--5dd5756b68--xxj25-eth0" Feb 9 19:18:20.972848 env[1644]: 2024-02-09 19:18:20.833 [INFO][4386] ipam_plugin.go 268: Auto assigning IP ContainerID="1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9" HandleID="k8s-pod-network.1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9" Workload="ip--172--31--31--30-k8s-coredns--5dd5756b68--xxj25-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000118400), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-31-30", "pod":"coredns-5dd5756b68-xxj25", "timestamp":"2024-02-09 19:18:20.805567636 +0000 UTC"}, Hostname:"ip-172-31-31-30", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:18:20.972848 env[1644]: 2024-02-09 19:18:20.833 [INFO][4386] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:20.972848 env[1644]: 2024-02-09 19:18:20.833 [INFO][4386] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:20.972848 env[1644]: 2024-02-09 19:18:20.834 [INFO][4386] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-31-30' Feb 9 19:18:20.972848 env[1644]: 2024-02-09 19:18:20.839 [INFO][4386] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9" host="ip-172-31-31-30" Feb 9 19:18:20.972848 env[1644]: 2024-02-09 19:18:20.850 [INFO][4386] ipam.go 372: Looking up existing affinities for host host="ip-172-31-31-30" Feb 9 19:18:20.972848 env[1644]: 2024-02-09 19:18:20.857 [INFO][4386] ipam.go 489: Trying affinity for 192.168.10.64/26 host="ip-172-31-31-30" Feb 9 19:18:20.972848 env[1644]: 2024-02-09 19:18:20.860 [INFO][4386] ipam.go 155: Attempting to load block cidr=192.168.10.64/26 host="ip-172-31-31-30" Feb 9 19:18:20.972848 env[1644]: 2024-02-09 19:18:20.864 [INFO][4386] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.10.64/26 host="ip-172-31-31-30" Feb 9 19:18:20.972848 env[1644]: 2024-02-09 19:18:20.865 [INFO][4386] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.10.64/26 handle="k8s-pod-network.1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9" host="ip-172-31-31-30" Feb 9 19:18:20.972848 env[1644]: 2024-02-09 19:18:20.896 [INFO][4386] ipam.go 1682: Creating new handle: k8s-pod-network.1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9 Feb 9 19:18:20.972848 env[1644]: 2024-02-09 19:18:20.905 [INFO][4386] ipam.go 1203: Writing block in order to claim IPs block=192.168.10.64/26 handle="k8s-pod-network.1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9" host="ip-172-31-31-30" Feb 9 19:18:20.972848 env[1644]: 2024-02-09 19:18:20.918 [INFO][4386] ipam.go 1216: Successfully claimed IPs: [192.168.10.67/26] block=192.168.10.64/26 handle="k8s-pod-network.1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9" host="ip-172-31-31-30" Feb 9 19:18:20.972848 env[1644]: 2024-02-09 19:18:20.918 [INFO][4386] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.10.67/26] handle="k8s-pod-network.1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9" host="ip-172-31-31-30" Feb 9 19:18:20.972848 env[1644]: 2024-02-09 19:18:20.918 [INFO][4386] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:20.972848 env[1644]: 2024-02-09 19:18:20.918 [INFO][4386] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.10.67/26] IPv6=[] ContainerID="1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9" HandleID="k8s-pod-network.1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9" Workload="ip--172--31--31--30-k8s-coredns--5dd5756b68--xxj25-eth0" Feb 9 19:18:20.974203 env[1644]: 2024-02-09 19:18:20.923 [INFO][4371] k8s.go 385: Populated endpoint ContainerID="1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9" Namespace="kube-system" Pod="coredns-5dd5756b68-xxj25" WorkloadEndpoint="ip--172--31--31--30-k8s-coredns--5dd5756b68--xxj25-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--30-k8s-coredns--5dd5756b68--xxj25-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"cb65ce5a-64ff-4274-87c2-ba066e48e105", ResourceVersion:"711", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-30", ContainerID:"", Pod:"coredns-5dd5756b68-xxj25", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.10.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibceb5d0df40", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:20.974203 env[1644]: 2024-02-09 19:18:20.923 [INFO][4371] k8s.go 386: Calico CNI using IPs: [192.168.10.67/32] ContainerID="1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9" Namespace="kube-system" Pod="coredns-5dd5756b68-xxj25" WorkloadEndpoint="ip--172--31--31--30-k8s-coredns--5dd5756b68--xxj25-eth0" Feb 9 19:18:20.974203 env[1644]: 2024-02-09 19:18:20.923 [INFO][4371] dataplane_linux.go 68: Setting the host side veth name to calibceb5d0df40 ContainerID="1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9" Namespace="kube-system" Pod="coredns-5dd5756b68-xxj25" WorkloadEndpoint="ip--172--31--31--30-k8s-coredns--5dd5756b68--xxj25-eth0" Feb 9 19:18:20.974203 env[1644]: 2024-02-09 19:18:20.934 [INFO][4371] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9" Namespace="kube-system" Pod="coredns-5dd5756b68-xxj25" WorkloadEndpoint="ip--172--31--31--30-k8s-coredns--5dd5756b68--xxj25-eth0" Feb 9 19:18:20.974203 env[1644]: 2024-02-09 19:18:20.934 [INFO][4371] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9" Namespace="kube-system" Pod="coredns-5dd5756b68-xxj25" WorkloadEndpoint="ip--172--31--31--30-k8s-coredns--5dd5756b68--xxj25-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--30-k8s-coredns--5dd5756b68--xxj25-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"cb65ce5a-64ff-4274-87c2-ba066e48e105", ResourceVersion:"711", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-30", ContainerID:"1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9", Pod:"coredns-5dd5756b68-xxj25", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.10.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibceb5d0df40", MAC:"de:65:4a:2c:08:bd", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:20.974203 env[1644]: 2024-02-09 19:18:20.960 [INFO][4371] k8s.go 491: Wrote updated endpoint to datastore ContainerID="1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9" Namespace="kube-system" Pod="coredns-5dd5756b68-xxj25" WorkloadEndpoint="ip--172--31--31--30-k8s-coredns--5dd5756b68--xxj25-eth0" Feb 9 19:18:21.059716 (udev-worker)[4405]: Network interface NamePolicy= disabled on kernel command line. Feb 9 19:18:21.084126 systemd-networkd[1448]: cali1e04caf5ae5: Link UP Feb 9 19:18:21.093021 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1e04caf5ae5: link becomes ready Feb 9 19:18:21.091792 systemd-networkd[1448]: cali1e04caf5ae5: Gained carrier Feb 9 19:18:21.113879 env[1644]: time="2024-02-09T19:18:21.110407687Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:18:21.113879 env[1644]: time="2024-02-09T19:18:21.110545777Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:18:21.113879 env[1644]: time="2024-02-09T19:18:21.110660469Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:18:21.113879 env[1644]: time="2024-02-09T19:18:21.110992784Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9 pid=4420 runtime=io.containerd.runc.v2 Feb 9 19:18:21.154896 env[1644]: 2024-02-09 19:18:20.725 [INFO][4361] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--31--30-k8s-csi--node--driver--7xmtp-eth0 csi-node-driver- calico-system 0cf9d635-829d-4747-a129-fb192fc90fe3 712 0 2024-02-09 19:17:51 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ip-172-31-31-30 csi-node-driver-7xmtp eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali1e04caf5ae5 [] []}} ContainerID="154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a" Namespace="calico-system" Pod="csi-node-driver-7xmtp" WorkloadEndpoint="ip--172--31--31--30-k8s-csi--node--driver--7xmtp-" Feb 9 19:18:21.154896 env[1644]: 2024-02-09 19:18:20.725 [INFO][4361] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a" Namespace="calico-system" Pod="csi-node-driver-7xmtp" WorkloadEndpoint="ip--172--31--31--30-k8s-csi--node--driver--7xmtp-eth0" Feb 9 19:18:21.154896 env[1644]: 2024-02-09 19:18:20.863 [INFO][4385] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a" HandleID="k8s-pod-network.154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a" Workload="ip--172--31--31--30-k8s-csi--node--driver--7xmtp-eth0" Feb 9 19:18:21.154896 env[1644]: 2024-02-09 19:18:20.922 [INFO][4385] ipam_plugin.go 268: Auto assigning IP ContainerID="154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a" HandleID="k8s-pod-network.154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a" Workload="ip--172--31--31--30-k8s-csi--node--driver--7xmtp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002bd000), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-31-30", "pod":"csi-node-driver-7xmtp", "timestamp":"2024-02-09 19:18:20.863191785 +0000 UTC"}, Hostname:"ip-172-31-31-30", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:18:21.154896 env[1644]: 2024-02-09 19:18:20.922 [INFO][4385] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:21.154896 env[1644]: 2024-02-09 19:18:20.923 [INFO][4385] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:21.154896 env[1644]: 2024-02-09 19:18:20.923 [INFO][4385] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-31-30' Feb 9 19:18:21.154896 env[1644]: 2024-02-09 19:18:20.945 [INFO][4385] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a" host="ip-172-31-31-30" Feb 9 19:18:21.154896 env[1644]: 2024-02-09 19:18:20.977 [INFO][4385] ipam.go 372: Looking up existing affinities for host host="ip-172-31-31-30" Feb 9 19:18:21.154896 env[1644]: 2024-02-09 19:18:20.996 [INFO][4385] ipam.go 489: Trying affinity for 192.168.10.64/26 host="ip-172-31-31-30" Feb 9 19:18:21.154896 env[1644]: 2024-02-09 19:18:21.003 [INFO][4385] ipam.go 155: Attempting to load block cidr=192.168.10.64/26 host="ip-172-31-31-30" Feb 9 19:18:21.154896 env[1644]: 2024-02-09 19:18:21.009 [INFO][4385] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.10.64/26 host="ip-172-31-31-30" Feb 9 19:18:21.154896 env[1644]: 2024-02-09 19:18:21.009 [INFO][4385] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.10.64/26 handle="k8s-pod-network.154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a" host="ip-172-31-31-30" Feb 9 19:18:21.154896 env[1644]: 2024-02-09 19:18:21.016 [INFO][4385] ipam.go 1682: Creating new handle: k8s-pod-network.154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a Feb 9 19:18:21.154896 env[1644]: 2024-02-09 19:18:21.026 [INFO][4385] ipam.go 1203: Writing block in order to claim IPs block=192.168.10.64/26 handle="k8s-pod-network.154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a" host="ip-172-31-31-30" Feb 9 19:18:21.154896 env[1644]: 2024-02-09 19:18:21.051 [INFO][4385] ipam.go 1216: Successfully claimed IPs: [192.168.10.68/26] block=192.168.10.64/26 handle="k8s-pod-network.154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a" host="ip-172-31-31-30" Feb 9 19:18:21.154896 env[1644]: 2024-02-09 19:18:21.051 [INFO][4385] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.10.68/26] handle="k8s-pod-network.154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a" host="ip-172-31-31-30" Feb 9 19:18:21.154896 env[1644]: 2024-02-09 19:18:21.051 [INFO][4385] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:21.154896 env[1644]: 2024-02-09 19:18:21.051 [INFO][4385] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.10.68/26] IPv6=[] ContainerID="154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a" HandleID="k8s-pod-network.154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a" Workload="ip--172--31--31--30-k8s-csi--node--driver--7xmtp-eth0" Feb 9 19:18:21.156219 env[1644]: 2024-02-09 19:18:21.056 [INFO][4361] k8s.go 385: Populated endpoint ContainerID="154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a" Namespace="calico-system" Pod="csi-node-driver-7xmtp" WorkloadEndpoint="ip--172--31--31--30-k8s-csi--node--driver--7xmtp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--30-k8s-csi--node--driver--7xmtp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0cf9d635-829d-4747-a129-fb192fc90fe3", ResourceVersion:"712", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-30", ContainerID:"", Pod:"csi-node-driver-7xmtp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.10.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali1e04caf5ae5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:21.156219 env[1644]: 2024-02-09 19:18:21.056 [INFO][4361] k8s.go 386: Calico CNI using IPs: [192.168.10.68/32] ContainerID="154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a" Namespace="calico-system" Pod="csi-node-driver-7xmtp" WorkloadEndpoint="ip--172--31--31--30-k8s-csi--node--driver--7xmtp-eth0" Feb 9 19:18:21.156219 env[1644]: 2024-02-09 19:18:21.056 [INFO][4361] dataplane_linux.go 68: Setting the host side veth name to cali1e04caf5ae5 ContainerID="154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a" Namespace="calico-system" Pod="csi-node-driver-7xmtp" WorkloadEndpoint="ip--172--31--31--30-k8s-csi--node--driver--7xmtp-eth0" Feb 9 19:18:21.156219 env[1644]: 2024-02-09 19:18:21.096 [INFO][4361] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a" Namespace="calico-system" Pod="csi-node-driver-7xmtp" WorkloadEndpoint="ip--172--31--31--30-k8s-csi--node--driver--7xmtp-eth0" Feb 9 19:18:21.156219 env[1644]: 2024-02-09 19:18:21.096 [INFO][4361] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a" Namespace="calico-system" Pod="csi-node-driver-7xmtp" WorkloadEndpoint="ip--172--31--31--30-k8s-csi--node--driver--7xmtp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--30-k8s-csi--node--driver--7xmtp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0cf9d635-829d-4747-a129-fb192fc90fe3", ResourceVersion:"712", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-30", ContainerID:"154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a", Pod:"csi-node-driver-7xmtp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.10.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali1e04caf5ae5", MAC:"76:9a:8f:3e:c9:08", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:21.156219 env[1644]: 2024-02-09 19:18:21.149 [INFO][4361] k8s.go 491: Wrote updated endpoint to datastore ContainerID="154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a" Namespace="calico-system" Pod="csi-node-driver-7xmtp" WorkloadEndpoint="ip--172--31--31--30-k8s-csi--node--driver--7xmtp-eth0" Feb 9 19:18:21.168736 systemd[1]: Started cri-containerd-1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9.scope. Feb 9 19:18:21.249170 kernel: kauditd_printk_skb: 315 callbacks suppressed Feb 9 19:18:21.249334 kernel: audit: type=1130 audit(1707506301.236:1253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.31.30:22-147.75.109.163:58650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:21.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.31.30:22-147.75.109.163:58650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:21.237877 systemd[1]: Started sshd@7-172.31.31.30:22-147.75.109.163:58650.service. Feb 9 19:18:21.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.308766 kernel: audit: type=1400 audit(1707506301.290:1254): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.308915 kernel: audit: type=1400 audit(1707506301.290:1255): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.326858 kernel: audit: type=1400 audit(1707506301.290:1256): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.326989 kernel: audit: type=1400 audit(1707506301.290:1257): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.337319 kernel: audit: type=1400 audit(1707506301.290:1258): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.362130 env[1644]: time="2024-02-09T19:18:21.362005713Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:18:21.373546 kernel: audit: type=1400 audit(1707506301.290:1259): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.373705 kernel: audit: type=1400 audit(1707506301.290:1260): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.373881 env[1644]: time="2024-02-09T19:18:21.362088798Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:18:21.373881 env[1644]: time="2024-02-09T19:18:21.362116937Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:18:21.374314 env[1644]: time="2024-02-09T19:18:21.374204956Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a pid=4463 runtime=io.containerd.runc.v2 Feb 9 19:18:21.388831 kernel: audit: type=1400 audit(1707506301.290:1261): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.398139 kernel: audit: type=1400 audit(1707506301.290:1262): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.298000 audit: BPF prog-id=166 op=LOAD Feb 9 19:18:21.307000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.307000 audit[4430]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4420 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:21.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166333338643832343837643133353030323539626530336165373835 Feb 9 19:18:21.307000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.307000 audit[4430]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4420 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:21.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166333338643832343837643133353030323539626530336165373835 Feb 9 19:18:21.307000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.307000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.307000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.307000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.307000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.307000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.307000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.307000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.307000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.307000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.307000 audit: BPF prog-id=167 op=LOAD Feb 9 19:18:21.307000 audit[4430]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4420 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:21.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166333338643832343837643133353030323539626530336165373835 Feb 9 19:18:21.308000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.308000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.308000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.308000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.308000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.308000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.308000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.308000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.308000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.308000 audit: BPF prog-id=168 op=LOAD Feb 9 19:18:21.308000 audit[4430]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4420 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:21.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166333338643832343837643133353030323539626530336165373835 Feb 9 19:18:21.327000 audit: BPF prog-id=168 op=UNLOAD Feb 9 19:18:21.327000 audit: BPF prog-id=167 op=UNLOAD Feb 9 19:18:21.327000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.327000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.327000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.327000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.327000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.327000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.327000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.327000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.327000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.337000 audit[4465]: NETFILTER_CFG table=filter:106 family=2 entries=34 op=nft_register_chain pid=4465 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:18:21.337000 audit[4465]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=17900 a0=3 a1=fffff082cb00 a2=0 a3=ffffad96dfa8 items=0 ppid=3895 pid=4465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:21.337000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:18:21.327000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.327000 audit: BPF prog-id=169 op=LOAD Feb 9 19:18:21.327000 audit[4430]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4420 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:21.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166333338643832343837643133353030323539626530336165373835 Feb 9 19:18:21.472580 env[1644]: time="2024-02-09T19:18:21.472328423Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-xxj25,Uid:cb65ce5a-64ff-4274-87c2-ba066e48e105,Namespace:kube-system,Attempt:1,} returns sandbox id \"1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9\"" Feb 9 19:18:21.474000 audit[4491]: NETFILTER_CFG table=filter:107 family=2 entries=48 op=nft_register_chain pid=4491 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:18:21.474000 audit[4491]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23548 a0=3 a1=ffffe515e7d0 a2=0 a3=ffffbc696fa8 items=0 ppid=3895 pid=4491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:21.474000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:18:21.483393 env[1644]: time="2024-02-09T19:18:21.483119808Z" level=info msg="CreateContainer within sandbox \"1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 19:18:21.491734 systemd[1]: Started cri-containerd-154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a.scope. Feb 9 19:18:21.524000 audit[4448]: USER_ACCT pid=4448 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:21.531503 sshd[4448]: Accepted publickey for core from 147.75.109.163 port 58650 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:18:21.533000 audit[4448]: CRED_ACQ pid=4448 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:21.533000 audit[4448]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc180a60 a2=3 a3=1 items=0 ppid=1 pid=4448 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:21.533000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:21.536492 sshd[4448]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:18:21.557287 systemd[1]: run-containerd-runc-k8s.io-154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a-runc.vBdv9r.mount: Deactivated successfully. Feb 9 19:18:21.557475 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3584506993.mount: Deactivated successfully. Feb 9 19:18:21.580115 systemd[1]: Started session-8.scope. Feb 9 19:18:21.580873 systemd-logind[1636]: New session 8 of user core. Feb 9 19:18:21.595627 env[1644]: time="2024-02-09T19:18:21.595548796Z" level=info msg="CreateContainer within sandbox \"1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"e820628d476d48b2785d49d17d9939c176fbb92245e2e133b3b345ceb5acb00e\"" Feb 9 19:18:21.604234 env[1644]: time="2024-02-09T19:18:21.604172646Z" level=info msg="StartContainer for \"e820628d476d48b2785d49d17d9939c176fbb92245e2e133b3b345ceb5acb00e\"" Feb 9 19:18:21.622000 audit[4448]: USER_START pid=4448 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:21.624000 audit[4505]: CRED_ACQ pid=4505 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:21.710139 systemd[1]: Started cri-containerd-e820628d476d48b2785d49d17d9939c176fbb92245e2e133b3b345ceb5acb00e.scope. Feb 9 19:18:21.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.751000 audit: BPF prog-id=170 op=LOAD Feb 9 19:18:21.753000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.753000 audit[4479]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4463 pid=4479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:21.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135346266633238323162633032643032376364336361656464623235 Feb 9 19:18:21.753000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.753000 audit[4479]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4463 pid=4479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:21.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135346266633238323162633032643032376364336361656464623235 Feb 9 19:18:21.754000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.754000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.754000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.754000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.754000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.754000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.754000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.754000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.754000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.754000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.754000 audit: BPF prog-id=171 op=LOAD Feb 9 19:18:21.754000 audit[4479]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4463 pid=4479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:21.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135346266633238323162633032643032376364336361656464623235 Feb 9 19:18:21.756000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.756000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.756000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.756000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.756000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.756000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.756000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.756000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.756000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.756000 audit: BPF prog-id=172 op=LOAD Feb 9 19:18:21.756000 audit[4479]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4463 pid=4479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:21.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135346266633238323162633032643032376364336361656464623235 Feb 9 19:18:21.760000 audit: BPF prog-id=172 op=UNLOAD Feb 9 19:18:21.761000 audit: BPF prog-id=171 op=UNLOAD Feb 9 19:18:21.761000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.761000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.761000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.761000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.761000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.761000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.761000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.761000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.761000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.761000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.761000 audit: BPF prog-id=173 op=LOAD Feb 9 19:18:21.761000 audit[4479]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4463 pid=4479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:21.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135346266633238323162633032643032376364336361656464623235 Feb 9 19:18:21.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.774000 audit: BPF prog-id=174 op=LOAD Feb 9 19:18:21.785000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.785000 audit[4507]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4420 pid=4507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:21.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538323036323864343736643438623237383564343964313764393933 Feb 9 19:18:21.786000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.786000 audit[4507]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4420 pid=4507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:21.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538323036323864343736643438623237383564343964313764393933 Feb 9 19:18:21.786000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.786000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.786000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.786000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.786000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.786000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.786000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.786000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.786000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.786000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.786000 audit: BPF prog-id=175 op=LOAD Feb 9 19:18:21.786000 audit[4507]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4420 pid=4507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:21.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538323036323864343736643438623237383564343964313764393933 Feb 9 19:18:21.788000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.788000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.788000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.788000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.788000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.788000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.788000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.788000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.788000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.788000 audit: BPF prog-id=176 op=LOAD Feb 9 19:18:21.788000 audit[4507]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=19 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4420 pid=4507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:21.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538323036323864343736643438623237383564343964313764393933 Feb 9 19:18:21.791000 audit: BPF prog-id=176 op=UNLOAD Feb 9 19:18:21.791000 audit: BPF prog-id=175 op=UNLOAD Feb 9 19:18:21.791000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.791000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.791000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.791000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.791000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.791000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.791000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.791000 audit[4507]: AVC avc: denied { perfmon } for pid=4507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.791000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.791000 audit[4507]: AVC avc: denied { bpf } for pid=4507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:21.791000 audit: BPF prog-id=177 op=LOAD Feb 9 19:18:21.791000 audit[4507]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4420 pid=4507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:21.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538323036323864343736643438623237383564343964313764393933 Feb 9 19:18:21.872190 env[1644]: time="2024-02-09T19:18:21.872134653Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7xmtp,Uid:0cf9d635-829d-4747-a129-fb192fc90fe3,Namespace:calico-system,Attempt:1,} returns sandbox id \"154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a\"" Feb 9 19:18:21.912115 env[1644]: time="2024-02-09T19:18:21.912048212Z" level=info msg="StartContainer for \"e820628d476d48b2785d49d17d9939c176fbb92245e2e133b3b345ceb5acb00e\" returns successfully" Feb 9 19:18:22.035420 sshd[4448]: pam_unix(sshd:session): session closed for user core Feb 9 19:18:22.035000 audit[4448]: USER_END pid=4448 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:22.035000 audit[4448]: CRED_DISP pid=4448 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:22.040895 systemd-logind[1636]: Session 8 logged out. Waiting for processes to exit. Feb 9 19:18:22.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.31.30:22-147.75.109.163:58650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:22.042765 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 19:18:22.044066 systemd[1]: sshd@7-172.31.31.30:22-147.75.109.163:58650.service: Deactivated successfully. Feb 9 19:18:22.048041 systemd-logind[1636]: Removed session 8. Feb 9 19:18:22.424144 systemd-networkd[1448]: cali1e04caf5ae5: Gained IPv6LL Feb 9 19:18:22.447458 env[1644]: time="2024-02-09T19:18:22.447404446Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:22.454561 env[1644]: time="2024-02-09T19:18:22.454501108Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:22.457653 env[1644]: time="2024-02-09T19:18:22.457597763Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:22.463589 env[1644]: time="2024-02-09T19:18:22.463536443Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:22.465855 env[1644]: time="2024-02-09T19:18:22.464306263Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8\"" Feb 9 19:18:22.467646 env[1644]: time="2024-02-09T19:18:22.467593640Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 19:18:22.485050 env[1644]: time="2024-02-09T19:18:22.484793646Z" level=info msg="CreateContainer within sandbox \"d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 19:18:22.514682 systemd[1]: run-containerd-runc-k8s.io-e820628d476d48b2785d49d17d9939c176fbb92245e2e133b3b345ceb5acb00e-runc.vtYqpk.mount: Deactivated successfully. Feb 9 19:18:22.517409 env[1644]: time="2024-02-09T19:18:22.517317072Z" level=info msg="CreateContainer within sandbox \"d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"8de69f2b97691ecf3a413b1067fd5efe3e850bc9bc3ea7932bc54e0fc73817d6\"" Feb 9 19:18:22.519823 env[1644]: time="2024-02-09T19:18:22.518421236Z" level=info msg="StartContainer for \"8de69f2b97691ecf3a413b1067fd5efe3e850bc9bc3ea7932bc54e0fc73817d6\"" Feb 9 19:18:22.599473 systemd[1]: run-containerd-runc-k8s.io-8de69f2b97691ecf3a413b1067fd5efe3e850bc9bc3ea7932bc54e0fc73817d6-runc.OwiZXa.mount: Deactivated successfully. Feb 9 19:18:22.607648 systemd[1]: Started cri-containerd-8de69f2b97691ecf3a413b1067fd5efe3e850bc9bc3ea7932bc54e0fc73817d6.scope. Feb 9 19:18:22.654022 kubelet[2844]: I0209 19:18:22.653787 2844 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-xxj25" podStartSLOduration=38.653709609 podCreationTimestamp="2024-02-09 19:17:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:18:22.653651435 +0000 UTC m=+52.798426814" watchObservedRunningTime="2024-02-09 19:18:22.653709609 +0000 UTC m=+52.798485000" Feb 9 19:18:22.680239 systemd-networkd[1448]: calibceb5d0df40: Gained IPv6LL Feb 9 19:18:22.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.738000 audit: BPF prog-id=178 op=LOAD Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000245b38 a2=10 a3=0 items=0 ppid=4062 pid=4579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:22.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864653639663262393736393165636633613431336231303637666435 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40002455a0 a2=3c a3=0 items=0 ppid=4062 pid=4579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:22.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864653639663262393736393165636633613431336231303637666435 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit: BPF prog-id=179 op=LOAD Feb 9 19:18:22.740000 audit[4579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40002458e0 a2=78 a3=0 items=0 ppid=4062 pid=4579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:22.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864653639663262393736393165636633613431336231303637666435 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit: BPF prog-id=180 op=LOAD Feb 9 19:18:22.740000 audit[4579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000245670 a2=78 a3=0 items=0 ppid=4062 pid=4579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:22.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864653639663262393736393165636633613431336231303637666435 Feb 9 19:18:22.740000 audit: BPF prog-id=180 op=UNLOAD Feb 9 19:18:22.740000 audit: BPF prog-id=179 op=UNLOAD Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:22.740000 audit: BPF prog-id=181 op=LOAD Feb 9 19:18:22.740000 audit[4579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000245b40 a2=78 a3=0 items=0 ppid=4062 pid=4579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:22.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864653639663262393736393165636633613431336231303637666435 Feb 9 19:18:22.753000 audit[4599]: NETFILTER_CFG table=filter:108 family=2 entries=8 op=nft_register_rule pid=4599 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:18:22.753000 audit[4599]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=fffff4bc0e80 a2=0 a3=ffff8fa786c0 items=0 ppid=2987 pid=4599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:22.753000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:18:22.775000 audit[4599]: NETFILTER_CFG table=nat:109 family=2 entries=44 op=nft_register_rule pid=4599 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:18:22.775000 audit[4599]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13788 a0=3 a1=fffff4bc0e80 a2=0 a3=ffff8fa786c0 items=0 ppid=2987 pid=4599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:22.775000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:18:22.841000 audit[4604]: NETFILTER_CFG table=filter:110 family=2 entries=8 op=nft_register_rule pid=4604 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:18:22.841000 audit[4604]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffcea256a0 a2=0 a3=ffffb5ffb6c0 items=0 ppid=2987 pid=4604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:22.841000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:18:22.863000 audit[4604]: NETFILTER_CFG table=nat:111 family=2 entries=56 op=nft_register_chain pid=4604 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:18:22.863000 audit[4604]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19452 a0=3 a1=ffffcea256a0 a2=0 a3=ffffb5ffb6c0 items=0 ppid=2987 pid=4604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:22.863000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:18:22.872559 env[1644]: time="2024-02-09T19:18:22.872490406Z" level=info msg="StartContainer for \"8de69f2b97691ecf3a413b1067fd5efe3e850bc9bc3ea7932bc54e0fc73817d6\" returns successfully" Feb 9 19:18:24.053236 env[1644]: time="2024-02-09T19:18:24.053163729Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:24.056476 env[1644]: time="2024-02-09T19:18:24.056404082Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:24.060730 env[1644]: time="2024-02-09T19:18:24.060676427Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:24.063675 env[1644]: time="2024-02-09T19:18:24.063607622Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:24.064961 env[1644]: time="2024-02-09T19:18:24.064904529Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 9 19:18:24.069977 env[1644]: time="2024-02-09T19:18:24.069860384Z" level=info msg="CreateContainer within sandbox \"154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 19:18:24.100798 env[1644]: time="2024-02-09T19:18:24.100710818Z" level=info msg="CreateContainer within sandbox \"154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"655bbaf765ac38cf2ffa9cc3198896c1216ef19b0f2f7a1cc375cba71b5471ca\"" Feb 9 19:18:24.102594 env[1644]: time="2024-02-09T19:18:24.102540568Z" level=info msg="StartContainer for \"655bbaf765ac38cf2ffa9cc3198896c1216ef19b0f2f7a1cc375cba71b5471ca\"" Feb 9 19:18:24.159912 systemd[1]: Started cri-containerd-655bbaf765ac38cf2ffa9cc3198896c1216ef19b0f2f7a1cc375cba71b5471ca.scope. Feb 9 19:18:24.220000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.220000 audit[4626]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4463 pid=4626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:24.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635356262616637363561633338636632666661396363333139383839 Feb 9 19:18:24.221000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.221000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.221000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.221000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.221000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.221000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.221000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.221000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.221000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.221000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.221000 audit: BPF prog-id=182 op=LOAD Feb 9 19:18:24.221000 audit[4626]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4463 pid=4626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:24.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635356262616637363561633338636632666661396363333139383839 Feb 9 19:18:24.223000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.223000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.223000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.223000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.223000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.223000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.223000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.223000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.223000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.223000 audit: BPF prog-id=183 op=LOAD Feb 9 19:18:24.223000 audit[4626]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4463 pid=4626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:24.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635356262616637363561633338636632666661396363333139383839 Feb 9 19:18:24.224000 audit: BPF prog-id=183 op=UNLOAD Feb 9 19:18:24.224000 audit: BPF prog-id=182 op=UNLOAD Feb 9 19:18:24.224000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.224000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.224000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.224000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.224000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.224000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.224000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.224000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.224000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.224000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:24.224000 audit: BPF prog-id=184 op=LOAD Feb 9 19:18:24.224000 audit[4626]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4463 pid=4626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:24.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635356262616637363561633338636632666661396363333139383839 Feb 9 19:18:24.265341 env[1644]: time="2024-02-09T19:18:24.265276497Z" level=info msg="StartContainer for \"655bbaf765ac38cf2ffa9cc3198896c1216ef19b0f2f7a1cc375cba71b5471ca\" returns successfully" Feb 9 19:18:24.267584 env[1644]: time="2024-02-09T19:18:24.267508342Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 19:18:24.716641 systemd[1]: run-containerd-runc-k8s.io-8de69f2b97691ecf3a413b1067fd5efe3e850bc9bc3ea7932bc54e0fc73817d6-runc.z9PLYx.mount: Deactivated successfully. Feb 9 19:18:24.808256 kubelet[2844]: I0209 19:18:24.808203 2844 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6bb5cf9998-vtf26" podStartSLOduration=28.492719768 podCreationTimestamp="2024-02-09 19:17:51 +0000 UTC" firstStartedPulling="2024-02-09 19:18:17.150953406 +0000 UTC m=+47.295728761" lastFinishedPulling="2024-02-09 19:18:22.466382152 +0000 UTC m=+52.611157507" observedRunningTime="2024-02-09 19:18:23.669594174 +0000 UTC m=+53.814369541" watchObservedRunningTime="2024-02-09 19:18:24.808148514 +0000 UTC m=+54.952923869" Feb 9 19:18:25.871734 env[1644]: time="2024-02-09T19:18:25.871664942Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:25.875277 env[1644]: time="2024-02-09T19:18:25.875221878Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:25.877866 env[1644]: time="2024-02-09T19:18:25.877778018Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:25.883119 env[1644]: time="2024-02-09T19:18:25.883062135Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:18:25.884154 env[1644]: time="2024-02-09T19:18:25.884094536Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 9 19:18:25.889065 env[1644]: time="2024-02-09T19:18:25.888914782Z" level=info msg="CreateContainer within sandbox \"154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 19:18:25.918739 env[1644]: time="2024-02-09T19:18:25.918672814Z" level=info msg="CreateContainer within sandbox \"154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"a48c18858db6135d5a3edd8b15ea30840dae843998461634b36acdd488fd4090\"" Feb 9 19:18:25.920238 env[1644]: time="2024-02-09T19:18:25.920166074Z" level=info msg="StartContainer for \"a48c18858db6135d5a3edd8b15ea30840dae843998461634b36acdd488fd4090\"" Feb 9 19:18:25.974000 audit[2537]: AVC avc: denied { watch } for pid=2537 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:25.974000 audit[2537]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4004f6bb90 a2=fc6 a3=0 items=0 ppid=2380 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 key=(null) Feb 9 19:18:25.974000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:18:25.975000 audit[2537]: AVC avc: denied { watch } for pid=2537 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:25.975000 audit[2537]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=40063339e0 a2=fc6 a3=0 items=0 ppid=2380 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 key=(null) Feb 9 19:18:25.975000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:18:25.981000 audit[2537]: AVC avc: denied { watch } for pid=2537 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520990 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:25.981000 audit[2537]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=400bb71ce0 a2=fc6 a3=0 items=0 ppid=2380 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 key=(null) Feb 9 19:18:25.981000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:18:25.986077 systemd[1]: Started cri-containerd-a48c18858db6135d5a3edd8b15ea30840dae843998461634b36acdd488fd4090.scope. Feb 9 19:18:26.023000 audit[2537]: AVC avc: denied { watch } for pid=2537 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:26.023000 audit[2537]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=400bb86240 a2=fc6 a3=0 items=0 ppid=2380 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 key=(null) Feb 9 19:18:26.023000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:18:26.029000 audit[2537]: AVC avc: denied { watch } for pid=2537 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:26.029000 audit[2537]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=40063d0fc0 a2=fc6 a3=0 items=0 ppid=2380 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 key=(null) Feb 9 19:18:26.029000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:18:26.055000 audit[2537]: AVC avc: denied { watch } for pid=2537 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:26.055000 audit[2537]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=400bb866c0 a2=fc6 a3=0 items=0 ppid=2380 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 key=(null) Feb 9 19:18:26.055000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:18:26.062000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.062000 audit[4678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4463 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:26.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134386331383835386462363133356435613365646438623135656133 Feb 9 19:18:26.062000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.062000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.062000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.062000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.062000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.062000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.062000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.062000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.062000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.062000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.062000 audit: BPF prog-id=185 op=LOAD Feb 9 19:18:26.062000 audit[4678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4463 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:26.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134386331383835386462363133356435613365646438623135656133 Feb 9 19:18:26.062000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.062000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.062000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.062000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.062000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.062000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.062000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.062000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.062000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.062000 audit: BPF prog-id=186 op=LOAD Feb 9 19:18:26.062000 audit[4678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4463 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:26.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134386331383835386462363133356435613365646438623135656133 Feb 9 19:18:26.063000 audit: BPF prog-id=186 op=UNLOAD Feb 9 19:18:26.063000 audit: BPF prog-id=185 op=UNLOAD Feb 9 19:18:26.063000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.063000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.063000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.063000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.063000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.063000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.063000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.063000 audit[4678]: AVC avc: denied { perfmon } for pid=4678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.063000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.063000 audit[4678]: AVC avc: denied { bpf } for pid=4678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:18:26.063000 audit: BPF prog-id=187 op=LOAD Feb 9 19:18:26.063000 audit[4678]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4463 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:26.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134386331383835386462363133356435613365646438623135656133 Feb 9 19:18:26.096138 systemd[1]: run-containerd-runc-k8s.io-a48c18858db6135d5a3edd8b15ea30840dae843998461634b36acdd488fd4090-runc.PKuQMz.mount: Deactivated successfully. Feb 9 19:18:26.108721 env[1644]: time="2024-02-09T19:18:26.108659528Z" level=info msg="StartContainer for \"a48c18858db6135d5a3edd8b15ea30840dae843998461634b36acdd488fd4090\" returns successfully" Feb 9 19:18:26.422740 kubelet[2844]: I0209 19:18:26.422705 2844 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 19:18:26.423582 kubelet[2844]: I0209 19:18:26.423497 2844 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 19:18:26.706719 kubelet[2844]: I0209 19:18:26.706577 2844 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-7xmtp" podStartSLOduration=31.699129452 podCreationTimestamp="2024-02-09 19:17:51 +0000 UTC" firstStartedPulling="2024-02-09 19:18:21.877410404 +0000 UTC m=+52.022185759" lastFinishedPulling="2024-02-09 19:18:25.88477716 +0000 UTC m=+56.029552515" observedRunningTime="2024-02-09 19:18:26.703151984 +0000 UTC m=+56.847927363" watchObservedRunningTime="2024-02-09 19:18:26.706496208 +0000 UTC m=+56.851271599" Feb 9 19:18:27.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.31.30:22-147.75.109.163:34296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:27.061710 systemd[1]: Started sshd@8-172.31.31.30:22-147.75.109.163:34296.service. Feb 9 19:18:27.064222 kernel: kauditd_printk_skb: 351 callbacks suppressed Feb 9 19:18:27.064328 kernel: audit: type=1130 audit(1707506307.061:1358): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.31.30:22-147.75.109.163:34296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:27.245000 audit[4711]: USER_ACCT pid=4711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:27.246479 sshd[4711]: Accepted publickey for core from 147.75.109.163 port 34296 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:18:27.249909 sshd[4711]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:18:27.248000 audit[4711]: CRED_ACQ pid=4711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:27.263383 systemd[1]: Started session-9.scope. Feb 9 19:18:27.267469 kernel: audit: type=1101 audit(1707506307.245:1359): pid=4711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:27.267630 kernel: audit: type=1103 audit(1707506307.248:1360): pid=4711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:27.267764 systemd-logind[1636]: New session 9 of user core. Feb 9 19:18:27.279835 kernel: audit: type=1006 audit(1707506307.248:1361): pid=4711 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Feb 9 19:18:27.248000 audit[4711]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd3e77cf0 a2=3 a3=1 items=0 ppid=1 pid=4711 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:27.290774 kernel: audit: type=1300 audit(1707506307.248:1361): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd3e77cf0 a2=3 a3=1 items=0 ppid=1 pid=4711 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:27.248000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:27.296622 kernel: audit: type=1327 audit(1707506307.248:1361): proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:27.259000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:27.307159 kernel: audit: type=1400 audit(1707506307.259:1362): avc: denied { watch } for pid=2502 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:27.259000 audit[2502]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40021891d0 a2=fc6 a3=0 items=0 ppid=2360 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 key=(null) Feb 9 19:18:27.320634 kernel: audit: type=1300 audit(1707506307.259:1362): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40021891d0 a2=fc6 a3=0 items=0 ppid=2360 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 key=(null) Feb 9 19:18:27.259000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:18:27.335851 kernel: audit: type=1327 audit(1707506307.259:1362): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:18:27.259000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:27.259000 audit[2502]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002746ae0 a2=fc6 a3=0 items=0 ppid=2360 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 key=(null) Feb 9 19:18:27.259000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:18:27.297000 audit[4711]: USER_START pid=4711 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:27.300000 audit[4714]: CRED_ACQ pid=4714 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:27.348989 kernel: audit: type=1400 audit(1707506307.259:1363): avc: denied { watch } for pid=2502 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:27.592132 sshd[4711]: pam_unix(sshd:session): session closed for user core Feb 9 19:18:27.592000 audit[4711]: USER_END pid=4711 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:27.593000 audit[4711]: CRED_DISP pid=4711 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:27.597435 systemd-logind[1636]: Session 9 logged out. Waiting for processes to exit. Feb 9 19:18:27.598956 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 19:18:27.600052 systemd[1]: sshd@8-172.31.31.30:22-147.75.109.163:34296.service: Deactivated successfully. Feb 9 19:18:27.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.31.30:22-147.75.109.163:34296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:27.602867 systemd-logind[1636]: Removed session 9. Feb 9 19:18:30.183144 env[1644]: time="2024-02-09T19:18:30.183086896Z" level=info msg="StopPodSandbox for \"12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f\"" Feb 9 19:18:30.318977 env[1644]: 2024-02-09 19:18:30.252 [WARNING][4742] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--30-k8s-csi--node--driver--7xmtp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0cf9d635-829d-4747-a129-fb192fc90fe3", ResourceVersion:"810", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-30", ContainerID:"154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a", Pod:"csi-node-driver-7xmtp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.10.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali1e04caf5ae5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:30.318977 env[1644]: 2024-02-09 19:18:30.252 [INFO][4742] k8s.go 578: Cleaning up netns ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" Feb 9 19:18:30.318977 env[1644]: 2024-02-09 19:18:30.252 [INFO][4742] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" iface="eth0" netns="" Feb 9 19:18:30.318977 env[1644]: 2024-02-09 19:18:30.252 [INFO][4742] k8s.go 585: Releasing IP address(es) ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" Feb 9 19:18:30.318977 env[1644]: 2024-02-09 19:18:30.252 [INFO][4742] utils.go 188: Calico CNI releasing IP address ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" Feb 9 19:18:30.318977 env[1644]: 2024-02-09 19:18:30.289 [INFO][4750] ipam_plugin.go 415: Releasing address using handleID ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" HandleID="k8s-pod-network.12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" Workload="ip--172--31--31--30-k8s-csi--node--driver--7xmtp-eth0" Feb 9 19:18:30.318977 env[1644]: 2024-02-09 19:18:30.289 [INFO][4750] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:30.318977 env[1644]: 2024-02-09 19:18:30.290 [INFO][4750] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:30.318977 env[1644]: 2024-02-09 19:18:30.310 [WARNING][4750] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" HandleID="k8s-pod-network.12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" Workload="ip--172--31--31--30-k8s-csi--node--driver--7xmtp-eth0" Feb 9 19:18:30.318977 env[1644]: 2024-02-09 19:18:30.311 [INFO][4750] ipam_plugin.go 443: Releasing address using workloadID ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" HandleID="k8s-pod-network.12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" Workload="ip--172--31--31--30-k8s-csi--node--driver--7xmtp-eth0" Feb 9 19:18:30.318977 env[1644]: 2024-02-09 19:18:30.313 [INFO][4750] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:30.318977 env[1644]: 2024-02-09 19:18:30.316 [INFO][4742] k8s.go 591: Teardown processing complete. ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" Feb 9 19:18:30.320043 env[1644]: time="2024-02-09T19:18:30.319976653Z" level=info msg="TearDown network for sandbox \"12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f\" successfully" Feb 9 19:18:30.320130 env[1644]: time="2024-02-09T19:18:30.320034036Z" level=info msg="StopPodSandbox for \"12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f\" returns successfully" Feb 9 19:18:30.320848 env[1644]: time="2024-02-09T19:18:30.320759890Z" level=info msg="RemovePodSandbox for \"12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f\"" Feb 9 19:18:30.321159 env[1644]: time="2024-02-09T19:18:30.321088612Z" level=info msg="Forcibly stopping sandbox \"12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f\"" Feb 9 19:18:30.469110 env[1644]: 2024-02-09 19:18:30.399 [WARNING][4768] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--30-k8s-csi--node--driver--7xmtp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0cf9d635-829d-4747-a129-fb192fc90fe3", ResourceVersion:"810", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-30", ContainerID:"154bfc2821bc02d027cd3caeddb25233927f47543cc3261221fb1a1ad1e1da4a", Pod:"csi-node-driver-7xmtp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.10.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali1e04caf5ae5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:30.469110 env[1644]: 2024-02-09 19:18:30.400 [INFO][4768] k8s.go 578: Cleaning up netns ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" Feb 9 19:18:30.469110 env[1644]: 2024-02-09 19:18:30.400 [INFO][4768] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" iface="eth0" netns="" Feb 9 19:18:30.469110 env[1644]: 2024-02-09 19:18:30.400 [INFO][4768] k8s.go 585: Releasing IP address(es) ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" Feb 9 19:18:30.469110 env[1644]: 2024-02-09 19:18:30.400 [INFO][4768] utils.go 188: Calico CNI releasing IP address ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" Feb 9 19:18:30.469110 env[1644]: 2024-02-09 19:18:30.448 [INFO][4774] ipam_plugin.go 415: Releasing address using handleID ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" HandleID="k8s-pod-network.12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" Workload="ip--172--31--31--30-k8s-csi--node--driver--7xmtp-eth0" Feb 9 19:18:30.469110 env[1644]: 2024-02-09 19:18:30.448 [INFO][4774] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:30.469110 env[1644]: 2024-02-09 19:18:30.448 [INFO][4774] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:30.469110 env[1644]: 2024-02-09 19:18:30.461 [WARNING][4774] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" HandleID="k8s-pod-network.12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" Workload="ip--172--31--31--30-k8s-csi--node--driver--7xmtp-eth0" Feb 9 19:18:30.469110 env[1644]: 2024-02-09 19:18:30.461 [INFO][4774] ipam_plugin.go 443: Releasing address using workloadID ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" HandleID="k8s-pod-network.12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" Workload="ip--172--31--31--30-k8s-csi--node--driver--7xmtp-eth0" Feb 9 19:18:30.469110 env[1644]: 2024-02-09 19:18:30.464 [INFO][4774] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:30.469110 env[1644]: 2024-02-09 19:18:30.466 [INFO][4768] k8s.go 591: Teardown processing complete. ContainerID="12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f" Feb 9 19:18:30.469110 env[1644]: time="2024-02-09T19:18:30.469068687Z" level=info msg="TearDown network for sandbox \"12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f\" successfully" Feb 9 19:18:30.475041 env[1644]: time="2024-02-09T19:18:30.474972657Z" level=info msg="RemovePodSandbox \"12d00d690119b90029954c03950df29e2615e1eb2ace02932997a5fcd9ba161f\" returns successfully" Feb 9 19:18:30.475790 env[1644]: time="2024-02-09T19:18:30.475747795Z" level=info msg="StopPodSandbox for \"79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b\"" Feb 9 19:18:30.605021 env[1644]: 2024-02-09 19:18:30.541 [WARNING][4793] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--30-k8s-coredns--5dd5756b68--wm5lb-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"c92e9f65-3ffb-41a3-8b6b-9e43b91e0f7b", ResourceVersion:"698", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-30", ContainerID:"61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818", Pod:"coredns-5dd5756b68-wm5lb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.10.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1ef544c51e3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:30.605021 env[1644]: 2024-02-09 19:18:30.542 [INFO][4793] k8s.go 578: Cleaning up netns ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" Feb 9 19:18:30.605021 env[1644]: 2024-02-09 19:18:30.542 [INFO][4793] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" iface="eth0" netns="" Feb 9 19:18:30.605021 env[1644]: 2024-02-09 19:18:30.542 [INFO][4793] k8s.go 585: Releasing IP address(es) ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" Feb 9 19:18:30.605021 env[1644]: 2024-02-09 19:18:30.542 [INFO][4793] utils.go 188: Calico CNI releasing IP address ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" Feb 9 19:18:30.605021 env[1644]: 2024-02-09 19:18:30.579 [INFO][4799] ipam_plugin.go 415: Releasing address using handleID ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" HandleID="k8s-pod-network.79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" Workload="ip--172--31--31--30-k8s-coredns--5dd5756b68--wm5lb-eth0" Feb 9 19:18:30.605021 env[1644]: 2024-02-09 19:18:30.579 [INFO][4799] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:30.605021 env[1644]: 2024-02-09 19:18:30.580 [INFO][4799] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:30.605021 env[1644]: 2024-02-09 19:18:30.594 [WARNING][4799] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" HandleID="k8s-pod-network.79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" Workload="ip--172--31--31--30-k8s-coredns--5dd5756b68--wm5lb-eth0" Feb 9 19:18:30.605021 env[1644]: 2024-02-09 19:18:30.595 [INFO][4799] ipam_plugin.go 443: Releasing address using workloadID ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" HandleID="k8s-pod-network.79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" Workload="ip--172--31--31--30-k8s-coredns--5dd5756b68--wm5lb-eth0" Feb 9 19:18:30.605021 env[1644]: 2024-02-09 19:18:30.598 [INFO][4799] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:30.605021 env[1644]: 2024-02-09 19:18:30.600 [INFO][4793] k8s.go 591: Teardown processing complete. ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" Feb 9 19:18:30.606266 env[1644]: time="2024-02-09T19:18:30.606200661Z" level=info msg="TearDown network for sandbox \"79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b\" successfully" Feb 9 19:18:30.606422 env[1644]: time="2024-02-09T19:18:30.606388925Z" level=info msg="StopPodSandbox for \"79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b\" returns successfully" Feb 9 19:18:30.607339 env[1644]: time="2024-02-09T19:18:30.607296167Z" level=info msg="RemovePodSandbox for \"79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b\"" Feb 9 19:18:30.607949 env[1644]: time="2024-02-09T19:18:30.607798190Z" level=info msg="Forcibly stopping sandbox \"79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b\"" Feb 9 19:18:30.807076 env[1644]: 2024-02-09 19:18:30.676 [WARNING][4818] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--30-k8s-coredns--5dd5756b68--wm5lb-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"c92e9f65-3ffb-41a3-8b6b-9e43b91e0f7b", ResourceVersion:"698", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-30", ContainerID:"61ce1449432d64bea87fec6f475880c7c37b7d15fce75b9b7d37499572670818", Pod:"coredns-5dd5756b68-wm5lb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.10.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1ef544c51e3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:30.807076 env[1644]: 2024-02-09 19:18:30.677 [INFO][4818] k8s.go 578: Cleaning up netns ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" Feb 9 19:18:30.807076 env[1644]: 2024-02-09 19:18:30.677 [INFO][4818] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" iface="eth0" netns="" Feb 9 19:18:30.807076 env[1644]: 2024-02-09 19:18:30.677 [INFO][4818] k8s.go 585: Releasing IP address(es) ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" Feb 9 19:18:30.807076 env[1644]: 2024-02-09 19:18:30.677 [INFO][4818] utils.go 188: Calico CNI releasing IP address ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" Feb 9 19:18:30.807076 env[1644]: 2024-02-09 19:18:30.781 [INFO][4825] ipam_plugin.go 415: Releasing address using handleID ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" HandleID="k8s-pod-network.79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" Workload="ip--172--31--31--30-k8s-coredns--5dd5756b68--wm5lb-eth0" Feb 9 19:18:30.807076 env[1644]: 2024-02-09 19:18:30.781 [INFO][4825] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:30.807076 env[1644]: 2024-02-09 19:18:30.781 [INFO][4825] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:30.807076 env[1644]: 2024-02-09 19:18:30.797 [WARNING][4825] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" HandleID="k8s-pod-network.79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" Workload="ip--172--31--31--30-k8s-coredns--5dd5756b68--wm5lb-eth0" Feb 9 19:18:30.807076 env[1644]: 2024-02-09 19:18:30.798 [INFO][4825] ipam_plugin.go 443: Releasing address using workloadID ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" HandleID="k8s-pod-network.79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" Workload="ip--172--31--31--30-k8s-coredns--5dd5756b68--wm5lb-eth0" Feb 9 19:18:30.807076 env[1644]: 2024-02-09 19:18:30.801 [INFO][4825] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:30.807076 env[1644]: 2024-02-09 19:18:30.803 [INFO][4818] k8s.go 591: Teardown processing complete. ContainerID="79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b" Feb 9 19:18:30.808133 env[1644]: time="2024-02-09T19:18:30.808081044Z" level=info msg="TearDown network for sandbox \"79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b\" successfully" Feb 9 19:18:30.813038 env[1644]: time="2024-02-09T19:18:30.812961806Z" level=info msg="RemovePodSandbox \"79597376c0a1b3f9653b44066c16c8f9bda4633c18028d899d28fc101a9eca3b\" returns successfully" Feb 9 19:18:30.814083 env[1644]: time="2024-02-09T19:18:30.814036169Z" level=info msg="StopPodSandbox for \"e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd\"" Feb 9 19:18:30.954592 env[1644]: 2024-02-09 19:18:30.888 [WARNING][4845] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--30-k8s-calico--kube--controllers--6bb5cf9998--vtf26-eth0", GenerateName:"calico-kube-controllers-6bb5cf9998-", Namespace:"calico-system", SelfLink:"", UID:"1e9a6206-262a-4f64-bb4b-7c720f31b166", ResourceVersion:"788", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6bb5cf9998", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-30", ContainerID:"d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3", Pod:"calico-kube-controllers-6bb5cf9998-vtf26", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.10.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calidee8127dd93", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:30.954592 env[1644]: 2024-02-09 19:18:30.888 [INFO][4845] k8s.go 578: Cleaning up netns ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" Feb 9 19:18:30.954592 env[1644]: 2024-02-09 19:18:30.888 [INFO][4845] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" iface="eth0" netns="" Feb 9 19:18:30.954592 env[1644]: 2024-02-09 19:18:30.889 [INFO][4845] k8s.go 585: Releasing IP address(es) ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" Feb 9 19:18:30.954592 env[1644]: 2024-02-09 19:18:30.889 [INFO][4845] utils.go 188: Calico CNI releasing IP address ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" Feb 9 19:18:30.954592 env[1644]: 2024-02-09 19:18:30.932 [INFO][4851] ipam_plugin.go 415: Releasing address using handleID ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" HandleID="k8s-pod-network.e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" Workload="ip--172--31--31--30-k8s-calico--kube--controllers--6bb5cf9998--vtf26-eth0" Feb 9 19:18:30.954592 env[1644]: 2024-02-09 19:18:30.933 [INFO][4851] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:30.954592 env[1644]: 2024-02-09 19:18:30.933 [INFO][4851] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:30.954592 env[1644]: 2024-02-09 19:18:30.946 [WARNING][4851] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" HandleID="k8s-pod-network.e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" Workload="ip--172--31--31--30-k8s-calico--kube--controllers--6bb5cf9998--vtf26-eth0" Feb 9 19:18:30.954592 env[1644]: 2024-02-09 19:18:30.946 [INFO][4851] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" HandleID="k8s-pod-network.e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" Workload="ip--172--31--31--30-k8s-calico--kube--controllers--6bb5cf9998--vtf26-eth0" Feb 9 19:18:30.954592 env[1644]: 2024-02-09 19:18:30.949 [INFO][4851] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:30.954592 env[1644]: 2024-02-09 19:18:30.952 [INFO][4845] k8s.go 591: Teardown processing complete. ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" Feb 9 19:18:30.955642 env[1644]: time="2024-02-09T19:18:30.955592960Z" level=info msg="TearDown network for sandbox \"e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd\" successfully" Feb 9 19:18:30.955780 env[1644]: time="2024-02-09T19:18:30.955746546Z" level=info msg="StopPodSandbox for \"e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd\" returns successfully" Feb 9 19:18:30.956616 env[1644]: time="2024-02-09T19:18:30.956552846Z" level=info msg="RemovePodSandbox for \"e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd\"" Feb 9 19:18:30.956740 env[1644]: time="2024-02-09T19:18:30.956612917Z" level=info msg="Forcibly stopping sandbox \"e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd\"" Feb 9 19:18:31.081421 env[1644]: 2024-02-09 19:18:31.019 [WARNING][4871] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--30-k8s-calico--kube--controllers--6bb5cf9998--vtf26-eth0", GenerateName:"calico-kube-controllers-6bb5cf9998-", Namespace:"calico-system", SelfLink:"", UID:"1e9a6206-262a-4f64-bb4b-7c720f31b166", ResourceVersion:"788", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6bb5cf9998", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-30", ContainerID:"d3ba7d594a6bef1f2562a0185e8a8eaa6cf9461eb131bd3b97381344970a73d3", Pod:"calico-kube-controllers-6bb5cf9998-vtf26", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.10.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calidee8127dd93", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:31.081421 env[1644]: 2024-02-09 19:18:31.019 [INFO][4871] k8s.go 578: Cleaning up netns ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" Feb 9 19:18:31.081421 env[1644]: 2024-02-09 19:18:31.019 [INFO][4871] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" iface="eth0" netns="" Feb 9 19:18:31.081421 env[1644]: 2024-02-09 19:18:31.019 [INFO][4871] k8s.go 585: Releasing IP address(es) ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" Feb 9 19:18:31.081421 env[1644]: 2024-02-09 19:18:31.019 [INFO][4871] utils.go 188: Calico CNI releasing IP address ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" Feb 9 19:18:31.081421 env[1644]: 2024-02-09 19:18:31.057 [INFO][4877] ipam_plugin.go 415: Releasing address using handleID ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" HandleID="k8s-pod-network.e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" Workload="ip--172--31--31--30-k8s-calico--kube--controllers--6bb5cf9998--vtf26-eth0" Feb 9 19:18:31.081421 env[1644]: 2024-02-09 19:18:31.057 [INFO][4877] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:31.081421 env[1644]: 2024-02-09 19:18:31.057 [INFO][4877] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:31.081421 env[1644]: 2024-02-09 19:18:31.071 [WARNING][4877] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" HandleID="k8s-pod-network.e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" Workload="ip--172--31--31--30-k8s-calico--kube--controllers--6bb5cf9998--vtf26-eth0" Feb 9 19:18:31.081421 env[1644]: 2024-02-09 19:18:31.071 [INFO][4877] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" HandleID="k8s-pod-network.e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" Workload="ip--172--31--31--30-k8s-calico--kube--controllers--6bb5cf9998--vtf26-eth0" Feb 9 19:18:31.081421 env[1644]: 2024-02-09 19:18:31.074 [INFO][4877] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:31.081421 env[1644]: 2024-02-09 19:18:31.077 [INFO][4871] k8s.go 591: Teardown processing complete. ContainerID="e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd" Feb 9 19:18:31.081421 env[1644]: time="2024-02-09T19:18:31.079935462Z" level=info msg="TearDown network for sandbox \"e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd\" successfully" Feb 9 19:18:31.093091 env[1644]: time="2024-02-09T19:18:31.093026082Z" level=info msg="RemovePodSandbox \"e2893cf9b6b8d142af79c72a6340b8f365b94fce8bc10bf6b32876c9302ca8cd\" returns successfully" Feb 9 19:18:31.094172 env[1644]: time="2024-02-09T19:18:31.094111127Z" level=info msg="StopPodSandbox for \"6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38\"" Feb 9 19:18:31.223325 env[1644]: 2024-02-09 19:18:31.158 [WARNING][4896] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--30-k8s-coredns--5dd5756b68--xxj25-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"cb65ce5a-64ff-4274-87c2-ba066e48e105", ResourceVersion:"761", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-30", ContainerID:"1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9", Pod:"coredns-5dd5756b68-xxj25", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.10.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibceb5d0df40", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:31.223325 env[1644]: 2024-02-09 19:18:31.160 [INFO][4896] k8s.go 578: Cleaning up netns ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" Feb 9 19:18:31.223325 env[1644]: 2024-02-09 19:18:31.160 [INFO][4896] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" iface="eth0" netns="" Feb 9 19:18:31.223325 env[1644]: 2024-02-09 19:18:31.160 [INFO][4896] k8s.go 585: Releasing IP address(es) ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" Feb 9 19:18:31.223325 env[1644]: 2024-02-09 19:18:31.160 [INFO][4896] utils.go 188: Calico CNI releasing IP address ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" Feb 9 19:18:31.223325 env[1644]: 2024-02-09 19:18:31.201 [INFO][4902] ipam_plugin.go 415: Releasing address using handleID ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" HandleID="k8s-pod-network.6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" Workload="ip--172--31--31--30-k8s-coredns--5dd5756b68--xxj25-eth0" Feb 9 19:18:31.223325 env[1644]: 2024-02-09 19:18:31.201 [INFO][4902] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:31.223325 env[1644]: 2024-02-09 19:18:31.201 [INFO][4902] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:31.223325 env[1644]: 2024-02-09 19:18:31.215 [WARNING][4902] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" HandleID="k8s-pod-network.6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" Workload="ip--172--31--31--30-k8s-coredns--5dd5756b68--xxj25-eth0" Feb 9 19:18:31.223325 env[1644]: 2024-02-09 19:18:31.215 [INFO][4902] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" HandleID="k8s-pod-network.6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" Workload="ip--172--31--31--30-k8s-coredns--5dd5756b68--xxj25-eth0" Feb 9 19:18:31.223325 env[1644]: 2024-02-09 19:18:31.217 [INFO][4902] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:31.223325 env[1644]: 2024-02-09 19:18:31.220 [INFO][4896] k8s.go 591: Teardown processing complete. ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" Feb 9 19:18:31.223325 env[1644]: time="2024-02-09T19:18:31.223262904Z" level=info msg="TearDown network for sandbox \"6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38\" successfully" Feb 9 19:18:31.224961 env[1644]: time="2024-02-09T19:18:31.223310219Z" level=info msg="StopPodSandbox for \"6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38\" returns successfully" Feb 9 19:18:31.225420 env[1644]: time="2024-02-09T19:18:31.225296760Z" level=info msg="RemovePodSandbox for \"6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38\"" Feb 9 19:18:31.225626 env[1644]: time="2024-02-09T19:18:31.225565988Z" level=info msg="Forcibly stopping sandbox \"6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38\"" Feb 9 19:18:31.374569 env[1644]: 2024-02-09 19:18:31.311 [WARNING][4921] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--30-k8s-coredns--5dd5756b68--xxj25-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"cb65ce5a-64ff-4274-87c2-ba066e48e105", ResourceVersion:"761", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 17, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-30", ContainerID:"1f338d82487d13500259be03ae7852f521d720eff8dbdf8cf4de573217578ad9", Pod:"coredns-5dd5756b68-xxj25", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.10.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibceb5d0df40", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:18:31.374569 env[1644]: 2024-02-09 19:18:31.311 [INFO][4921] k8s.go 578: Cleaning up netns ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" Feb 9 19:18:31.374569 env[1644]: 2024-02-09 19:18:31.311 [INFO][4921] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" iface="eth0" netns="" Feb 9 19:18:31.374569 env[1644]: 2024-02-09 19:18:31.312 [INFO][4921] k8s.go 585: Releasing IP address(es) ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" Feb 9 19:18:31.374569 env[1644]: 2024-02-09 19:18:31.312 [INFO][4921] utils.go 188: Calico CNI releasing IP address ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" Feb 9 19:18:31.374569 env[1644]: 2024-02-09 19:18:31.349 [INFO][4927] ipam_plugin.go 415: Releasing address using handleID ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" HandleID="k8s-pod-network.6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" Workload="ip--172--31--31--30-k8s-coredns--5dd5756b68--xxj25-eth0" Feb 9 19:18:31.374569 env[1644]: 2024-02-09 19:18:31.350 [INFO][4927] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:18:31.374569 env[1644]: 2024-02-09 19:18:31.350 [INFO][4927] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:18:31.374569 env[1644]: 2024-02-09 19:18:31.364 [WARNING][4927] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" HandleID="k8s-pod-network.6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" Workload="ip--172--31--31--30-k8s-coredns--5dd5756b68--xxj25-eth0" Feb 9 19:18:31.374569 env[1644]: 2024-02-09 19:18:31.364 [INFO][4927] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" HandleID="k8s-pod-network.6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" Workload="ip--172--31--31--30-k8s-coredns--5dd5756b68--xxj25-eth0" Feb 9 19:18:31.374569 env[1644]: 2024-02-09 19:18:31.366 [INFO][4927] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:18:31.374569 env[1644]: 2024-02-09 19:18:31.369 [INFO][4921] k8s.go 591: Teardown processing complete. ContainerID="6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38" Feb 9 19:18:31.375854 env[1644]: time="2024-02-09T19:18:31.375778693Z" level=info msg="TearDown network for sandbox \"6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38\" successfully" Feb 9 19:18:31.381032 env[1644]: time="2024-02-09T19:18:31.380905028Z" level=info msg="RemovePodSandbox \"6cabd5b47c436c029892d59dcf8bef90f336ea25c464c2b8d5ef1462ad64fa38\" returns successfully" Feb 9 19:18:32.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.31.30:22-147.75.109.163:34310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:32.624259 systemd[1]: Started sshd@9-172.31.31.30:22-147.75.109.163:34310.service. Feb 9 19:18:32.626790 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 19:18:32.626891 kernel: audit: type=1130 audit(1707506312.623:1369): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.31.30:22-147.75.109.163:34310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:32.800000 audit[4936]: USER_ACCT pid=4936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:32.802091 sshd[4936]: Accepted publickey for core from 147.75.109.163 port 34310 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:18:32.812945 kernel: audit: type=1101 audit(1707506312.800:1370): pid=4936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:32.813000 audit[4936]: CRED_ACQ pid=4936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:32.816163 sshd[4936]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:18:32.834004 kernel: audit: type=1103 audit(1707506312.813:1371): pid=4936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:32.834143 kernel: audit: type=1006 audit(1707506312.813:1372): pid=4936 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 9 19:18:32.834188 kernel: audit: type=1300 audit(1707506312.813:1372): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc2c18320 a2=3 a3=1 items=0 ppid=1 pid=4936 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:32.813000 audit[4936]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc2c18320 a2=3 a3=1 items=0 ppid=1 pid=4936 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:32.832490 systemd[1]: Started session-10.scope. Feb 9 19:18:32.839062 systemd-logind[1636]: New session 10 of user core. Feb 9 19:18:32.813000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:32.844770 kernel: audit: type=1327 audit(1707506312.813:1372): proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:32.855000 audit[4936]: USER_START pid=4936 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:32.867000 audit[4938]: CRED_ACQ pid=4938 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:32.877374 kernel: audit: type=1105 audit(1707506312.855:1373): pid=4936 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:32.877522 kernel: audit: type=1103 audit(1707506312.867:1374): pid=4938 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:33.140619 sshd[4936]: pam_unix(sshd:session): session closed for user core Feb 9 19:18:33.141000 audit[4936]: USER_END pid=4936 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:33.145361 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 19:18:33.146830 systemd[1]: sshd@9-172.31.31.30:22-147.75.109.163:34310.service: Deactivated successfully. Feb 9 19:18:33.157147 systemd-logind[1636]: Session 10 logged out. Waiting for processes to exit. Feb 9 19:18:33.157926 kernel: audit: type=1106 audit(1707506313.141:1375): pid=4936 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:33.142000 audit[4936]: CRED_DISP pid=4936 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:33.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.31.30:22-147.75.109.163:34310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:33.168713 systemd-logind[1636]: Removed session 10. Feb 9 19:18:33.168914 kernel: audit: type=1104 audit(1707506313.142:1376): pid=4936 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:38.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.31.30:22-147.75.109.163:50646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:38.168101 systemd[1]: Started sshd@10-172.31.31.30:22-147.75.109.163:50646.service. Feb 9 19:18:38.172056 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:18:38.172186 kernel: audit: type=1130 audit(1707506318.167:1378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.31.30:22-147.75.109.163:50646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:38.343000 audit[4975]: USER_ACCT pid=4975 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:38.344665 sshd[4975]: Accepted publickey for core from 147.75.109.163 port 50646 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:18:38.355000 audit[4975]: CRED_ACQ pid=4975 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:38.357537 sshd[4975]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:18:38.366160 kernel: audit: type=1101 audit(1707506318.343:1379): pid=4975 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:38.366289 kernel: audit: type=1103 audit(1707506318.355:1380): pid=4975 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:38.372369 kernel: audit: type=1006 audit(1707506318.356:1381): pid=4975 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 9 19:18:38.356000 audit[4975]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc683460 a2=3 a3=1 items=0 ppid=1 pid=4975 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:38.383261 kernel: audit: type=1300 audit(1707506318.356:1381): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc683460 a2=3 a3=1 items=0 ppid=1 pid=4975 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:38.356000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:38.388585 kernel: audit: type=1327 audit(1707506318.356:1381): proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:38.392226 systemd-logind[1636]: New session 11 of user core. Feb 9 19:18:38.393351 systemd[1]: Started session-11.scope. Feb 9 19:18:38.405000 audit[4975]: USER_START pid=4975 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:38.420034 kernel: audit: type=1105 audit(1707506318.405:1382): pid=4975 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:38.418000 audit[4977]: CRED_ACQ pid=4977 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:38.432851 kernel: audit: type=1103 audit(1707506318.418:1383): pid=4977 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:38.675687 sshd[4975]: pam_unix(sshd:session): session closed for user core Feb 9 19:18:38.677000 audit[4975]: USER_END pid=4975 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:38.677000 audit[4975]: CRED_DISP pid=4975 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:38.689916 systemd[1]: sshd@10-172.31.31.30:22-147.75.109.163:50646.service: Deactivated successfully. Feb 9 19:18:38.691211 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 19:18:38.698766 kernel: audit: type=1106 audit(1707506318.677:1384): pid=4975 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:38.698948 kernel: audit: type=1104 audit(1707506318.677:1385): pid=4975 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:38.698723 systemd-logind[1636]: Session 11 logged out. Waiting for processes to exit. Feb 9 19:18:38.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.31.30:22-147.75.109.163:50646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:38.706676 systemd-logind[1636]: Removed session 11. Feb 9 19:18:38.710379 systemd[1]: Started sshd@11-172.31.31.30:22-147.75.109.163:50652.service. Feb 9 19:18:38.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.31.30:22-147.75.109.163:50652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:38.881000 audit[4988]: USER_ACCT pid=4988 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:38.882799 sshd[4988]: Accepted publickey for core from 147.75.109.163 port 50652 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:18:38.883000 audit[4988]: CRED_ACQ pid=4988 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:38.883000 audit[4988]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffff94cf10 a2=3 a3=1 items=0 ppid=1 pid=4988 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:38.883000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:38.885429 sshd[4988]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:18:38.892988 systemd-logind[1636]: New session 12 of user core. Feb 9 19:18:38.894639 systemd[1]: Started session-12.scope. Feb 9 19:18:38.903000 audit[4988]: USER_START pid=4988 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:38.906000 audit[4990]: CRED_ACQ pid=4990 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:38.973628 systemd[1]: run-containerd-runc-k8s.io-7924bca9f0b88a9decfb444b2a8f61610d25ea051241e9c6fa270fc336b6ee9b-runc.bm8Rw6.mount: Deactivated successfully. Feb 9 19:18:39.538301 sshd[4988]: pam_unix(sshd:session): session closed for user core Feb 9 19:18:39.539000 audit[4988]: USER_END pid=4988 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:39.539000 audit[4988]: CRED_DISP pid=4988 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:39.544897 systemd[1]: sshd@11-172.31.31.30:22-147.75.109.163:50652.service: Deactivated successfully. Feb 9 19:18:39.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.31.30:22-147.75.109.163:50652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:39.546311 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 19:18:39.546945 systemd-logind[1636]: Session 12 logged out. Waiting for processes to exit. Feb 9 19:18:39.548986 systemd-logind[1636]: Removed session 12. Feb 9 19:18:39.567860 systemd[1]: Started sshd@12-172.31.31.30:22-147.75.109.163:50658.service. Feb 9 19:18:39.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.31.30:22-147.75.109.163:50658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:39.752000 audit[5020]: USER_ACCT pid=5020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:39.753985 sshd[5020]: Accepted publickey for core from 147.75.109.163 port 50658 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:18:39.754000 audit[5020]: CRED_ACQ pid=5020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:39.755000 audit[5020]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd7661560 a2=3 a3=1 items=0 ppid=1 pid=5020 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:39.755000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:39.757443 sshd[5020]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:18:39.766872 systemd[1]: Started session-13.scope. Feb 9 19:18:39.768071 systemd-logind[1636]: New session 13 of user core. Feb 9 19:18:39.776000 audit[5020]: USER_START pid=5020 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:39.779000 audit[5022]: CRED_ACQ pid=5022 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:40.037268 sshd[5020]: pam_unix(sshd:session): session closed for user core Feb 9 19:18:40.038000 audit[5020]: USER_END pid=5020 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:40.039000 audit[5020]: CRED_DISP pid=5020 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:40.042486 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 19:18:40.043721 systemd[1]: sshd@12-172.31.31.30:22-147.75.109.163:50658.service: Deactivated successfully. Feb 9 19:18:40.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.31.30:22-147.75.109.163:50658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:40.045580 systemd-logind[1636]: Session 13 logged out. Waiting for processes to exit. Feb 9 19:18:40.048737 systemd-logind[1636]: Removed session 13. Feb 9 19:18:42.154000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:42.154000 audit[2502]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002832120 a2=fc6 a3=0 items=0 ppid=2360 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 key=(null) Feb 9 19:18:42.154000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:18:42.158000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:42.158000 audit[2502]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002d41900 a2=fc6 a3=0 items=0 ppid=2360 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 key=(null) Feb 9 19:18:42.158000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:18:42.158000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:42.158000 audit[2502]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002d41920 a2=fc6 a3=0 items=0 ppid=2360 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 key=(null) Feb 9 19:18:42.158000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:18:42.158000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:18:42.158000 audit[2502]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002d41940 a2=fc6 a3=0 items=0 ppid=2360 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 key=(null) Feb 9 19:18:42.158000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:18:42.467553 update_engine[1637]: I0209 19:18:42.467133 1637 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 9 19:18:42.467553 update_engine[1637]: I0209 19:18:42.467195 1637 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 9 19:18:42.468868 update_engine[1637]: I0209 19:18:42.468796 1637 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 9 19:18:42.469690 update_engine[1637]: I0209 19:18:42.469622 1637 omaha_request_params.cc:62] Current group set to lts Feb 9 19:18:42.469886 update_engine[1637]: I0209 19:18:42.469844 1637 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 9 19:18:42.469886 update_engine[1637]: I0209 19:18:42.469868 1637 update_attempter.cc:643] Scheduling an action processor start. Feb 9 19:18:42.470016 update_engine[1637]: I0209 19:18:42.469899 1637 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 19:18:42.470016 update_engine[1637]: I0209 19:18:42.469949 1637 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 9 19:18:42.471014 update_engine[1637]: I0209 19:18:42.470953 1637 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 19:18:42.471014 update_engine[1637]: I0209 19:18:42.470994 1637 omaha_request_action.cc:271] Request: Feb 9 19:18:42.471014 update_engine[1637]: Feb 9 19:18:42.471014 update_engine[1637]: Feb 9 19:18:42.471014 update_engine[1637]: Feb 9 19:18:42.471014 update_engine[1637]: Feb 9 19:18:42.471014 update_engine[1637]: Feb 9 19:18:42.471014 update_engine[1637]: Feb 9 19:18:42.471014 update_engine[1637]: Feb 9 19:18:42.471014 update_engine[1637]: Feb 9 19:18:42.471014 update_engine[1637]: I0209 19:18:42.471009 1637 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 19:18:42.472205 locksmithd[1689]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 9 19:18:42.476472 update_engine[1637]: I0209 19:18:42.476415 1637 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 19:18:42.476929 update_engine[1637]: I0209 19:18:42.476822 1637 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 9 19:18:42.551969 update_engine[1637]: E0209 19:18:42.551913 1637 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 19:18:42.552162 update_engine[1637]: I0209 19:18:42.552068 1637 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 9 19:18:45.067448 systemd[1]: Started sshd@13-172.31.31.30:22-147.75.109.163:58808.service. Feb 9 19:18:45.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.31.30:22-147.75.109.163:58808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:45.074839 kernel: kauditd_printk_skb: 35 callbacks suppressed Feb 9 19:18:45.075073 kernel: audit: type=1130 audit(1707506325.070:1409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.31.30:22-147.75.109.163:58808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:45.244000 audit[5036]: USER_ACCT pid=5036 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:45.245557 sshd[5036]: Accepted publickey for core from 147.75.109.163 port 58808 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:18:45.248624 sshd[5036]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:18:45.264784 systemd[1]: Started session-14.scope. Feb 9 19:18:45.266954 systemd-logind[1636]: New session 14 of user core. Feb 9 19:18:45.244000 audit[5036]: CRED_ACQ pid=5036 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:45.279012 kernel: audit: type=1101 audit(1707506325.244:1410): pid=5036 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:45.279137 kernel: audit: type=1103 audit(1707506325.244:1411): pid=5036 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:45.286095 kernel: audit: type=1006 audit(1707506325.244:1412): pid=5036 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 9 19:18:45.244000 audit[5036]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd1b4f5a0 a2=3 a3=1 items=0 ppid=1 pid=5036 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:45.297790 kernel: audit: type=1300 audit(1707506325.244:1412): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd1b4f5a0 a2=3 a3=1 items=0 ppid=1 pid=5036 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:45.244000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:45.301869 kernel: audit: type=1327 audit(1707506325.244:1412): proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:45.307000 audit[5036]: USER_START pid=5036 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:45.309000 audit[5040]: CRED_ACQ pid=5040 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:45.329277 kernel: audit: type=1105 audit(1707506325.307:1413): pid=5036 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:45.329434 kernel: audit: type=1103 audit(1707506325.309:1414): pid=5040 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:45.546734 sshd[5036]: pam_unix(sshd:session): session closed for user core Feb 9 19:18:45.548000 audit[5036]: USER_END pid=5036 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:45.552580 systemd-logind[1636]: Session 14 logged out. Waiting for processes to exit. Feb 9 19:18:45.555025 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 19:18:45.557042 systemd-logind[1636]: Removed session 14. Feb 9 19:18:45.558313 systemd[1]: sshd@13-172.31.31.30:22-147.75.109.163:58808.service: Deactivated successfully. Feb 9 19:18:45.549000 audit[5036]: CRED_DISP pid=5036 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:45.570715 kernel: audit: type=1106 audit(1707506325.548:1415): pid=5036 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:45.570851 kernel: audit: type=1104 audit(1707506325.549:1416): pid=5036 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:45.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.31.30:22-147.75.109.163:58808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:50.580033 systemd[1]: Started sshd@14-172.31.31.30:22-147.75.109.163:58810.service. Feb 9 19:18:50.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.31.30:22-147.75.109.163:58810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:50.582876 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:18:50.582969 kernel: audit: type=1130 audit(1707506330.580:1418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.31.30:22-147.75.109.163:58810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:50.750000 audit[5052]: USER_ACCT pid=5052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:50.751600 sshd[5052]: Accepted publickey for core from 147.75.109.163 port 58810 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:18:50.763880 kernel: audit: type=1101 audit(1707506330.750:1419): pid=5052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:50.763000 audit[5052]: CRED_ACQ pid=5052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:50.773662 systemd[1]: Started session-15.scope. Feb 9 19:18:50.764997 sshd[5052]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:18:50.780767 kernel: audit: type=1103 audit(1707506330.763:1420): pid=5052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:50.780898 kernel: audit: type=1006 audit(1707506330.763:1421): pid=5052 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 9 19:18:50.776706 systemd-logind[1636]: New session 15 of user core. Feb 9 19:18:50.763000 audit[5052]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd1ddbdc0 a2=3 a3=1 items=0 ppid=1 pid=5052 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:50.791707 kernel: audit: type=1300 audit(1707506330.763:1421): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd1ddbdc0 a2=3 a3=1 items=0 ppid=1 pid=5052 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:50.763000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:50.796305 kernel: audit: type=1327 audit(1707506330.763:1421): proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:50.788000 audit[5052]: USER_START pid=5052 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:50.808833 kernel: audit: type=1105 audit(1707506330.788:1422): pid=5052 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:50.796000 audit[5054]: CRED_ACQ pid=5054 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:50.817964 kernel: audit: type=1103 audit(1707506330.796:1423): pid=5054 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:51.044950 sshd[5052]: pam_unix(sshd:session): session closed for user core Feb 9 19:18:51.046000 audit[5052]: USER_END pid=5052 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:51.050745 systemd-logind[1636]: Session 15 logged out. Waiting for processes to exit. Feb 9 19:18:51.053516 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 19:18:51.055596 systemd-logind[1636]: Removed session 15. Feb 9 19:18:51.057027 systemd[1]: sshd@14-172.31.31.30:22-147.75.109.163:58810.service: Deactivated successfully. Feb 9 19:18:51.046000 audit[5052]: CRED_DISP pid=5052 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:51.068363 kernel: audit: type=1106 audit(1707506331.046:1424): pid=5052 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:51.068516 kernel: audit: type=1104 audit(1707506331.046:1425): pid=5052 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:51.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.31.30:22-147.75.109.163:58810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:52.466489 update_engine[1637]: I0209 19:18:52.465875 1637 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 19:18:52.466489 update_engine[1637]: I0209 19:18:52.466209 1637 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 19:18:52.466489 update_engine[1637]: I0209 19:18:52.466437 1637 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 9 19:18:52.467576 update_engine[1637]: E0209 19:18:52.467420 1637 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 19:18:52.467576 update_engine[1637]: I0209 19:18:52.467540 1637 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 9 19:18:56.077165 systemd[1]: Started sshd@15-172.31.31.30:22-147.75.109.163:45678.service. Feb 9 19:18:56.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.31.30:22-147.75.109.163:45678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:56.080222 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:18:56.080313 kernel: audit: type=1130 audit(1707506336.077:1427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.31.30:22-147.75.109.163:45678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:18:56.254000 audit[5064]: USER_ACCT pid=5064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:56.258040 sshd[5064]: Accepted publickey for core from 147.75.109.163 port 45678 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:18:56.268341 sshd[5064]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:18:56.266000 audit[5064]: CRED_ACQ pid=5064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:56.280192 kernel: audit: type=1101 audit(1707506336.254:1428): pid=5064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:56.280335 kernel: audit: type=1103 audit(1707506336.266:1429): pid=5064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:56.280391 kernel: audit: type=1006 audit(1707506336.266:1430): pid=5064 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 9 19:18:56.279189 systemd[1]: Started session-16.scope. Feb 9 19:18:56.282514 systemd-logind[1636]: New session 16 of user core. Feb 9 19:18:56.266000 audit[5064]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc72a550 a2=3 a3=1 items=0 ppid=1 pid=5064 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:56.297600 kernel: audit: type=1300 audit(1707506336.266:1430): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc72a550 a2=3 a3=1 items=0 ppid=1 pid=5064 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:18:56.266000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:56.301868 kernel: audit: type=1327 audit(1707506336.266:1430): proctitle=737368643A20636F7265205B707269765D Feb 9 19:18:56.309000 audit[5064]: USER_START pid=5064 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:56.324364 kernel: audit: type=1105 audit(1707506336.309:1431): pid=5064 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:56.323000 audit[5066]: CRED_ACQ pid=5066 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:56.334876 kernel: audit: type=1103 audit(1707506336.323:1432): pid=5066 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:56.560983 sshd[5064]: pam_unix(sshd:session): session closed for user core Feb 9 19:18:56.562000 audit[5064]: USER_END pid=5064 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:56.566198 systemd-logind[1636]: Session 16 logged out. Waiting for processes to exit. Feb 9 19:18:56.568921 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 19:18:56.570978 systemd-logind[1636]: Removed session 16. Feb 9 19:18:56.572261 systemd[1]: sshd@15-172.31.31.30:22-147.75.109.163:45678.service: Deactivated successfully. Feb 9 19:18:56.562000 audit[5064]: CRED_DISP pid=5064 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:56.583854 kernel: audit: type=1106 audit(1707506336.562:1433): pid=5064 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:56.583944 kernel: audit: type=1104 audit(1707506336.562:1434): pid=5064 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:18:56.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.31.30:22-147.75.109.163:45678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:00.575000 audit[5101]: NETFILTER_CFG table=filter:112 family=2 entries=9 op=nft_register_rule pid=5101 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:00.575000 audit[5101]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffdae6d5b0 a2=0 a3=ffffa1c986c0 items=0 ppid=2987 pid=5101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:00.575000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:00.578000 audit[5101]: NETFILTER_CFG table=nat:113 family=2 entries=20 op=nft_register_rule pid=5101 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:00.578000 audit[5101]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffdae6d5b0 a2=0 a3=ffffa1c986c0 items=0 ppid=2987 pid=5101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:00.578000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:00.611025 kubelet[2844]: I0209 19:19:00.610958 2844 topology_manager.go:215] "Topology Admit Handler" podUID="dbc4feb8-86a8-4e95-a5b3-4a584751a635" podNamespace="calico-apiserver" podName="calico-apiserver-66854bb65-dgr4f" Feb 9 19:19:00.625652 systemd[1]: Created slice kubepods-besteffort-poddbc4feb8_86a8_4e95_a5b3_4a584751a635.slice. Feb 9 19:19:00.671000 audit[5103]: NETFILTER_CFG table=filter:114 family=2 entries=10 op=nft_register_rule pid=5103 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:00.671000 audit[5103]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffdbf82050 a2=0 a3=ffffaee4f6c0 items=0 ppid=2987 pid=5103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:00.671000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:00.679000 audit[5103]: NETFILTER_CFG table=nat:115 family=2 entries=20 op=nft_register_rule pid=5103 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:00.679000 audit[5103]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffdbf82050 a2=0 a3=ffffaee4f6c0 items=0 ppid=2987 pid=5103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:00.679000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:00.696261 kubelet[2844]: I0209 19:19:00.696209 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/dbc4feb8-86a8-4e95-a5b3-4a584751a635-calico-apiserver-certs\") pod \"calico-apiserver-66854bb65-dgr4f\" (UID: \"dbc4feb8-86a8-4e95-a5b3-4a584751a635\") " pod="calico-apiserver/calico-apiserver-66854bb65-dgr4f" Feb 9 19:19:00.696452 kubelet[2844]: I0209 19:19:00.696321 2844 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pcs2w\" (UniqueName: \"kubernetes.io/projected/dbc4feb8-86a8-4e95-a5b3-4a584751a635-kube-api-access-pcs2w\") pod \"calico-apiserver-66854bb65-dgr4f\" (UID: \"dbc4feb8-86a8-4e95-a5b3-4a584751a635\") " pod="calico-apiserver/calico-apiserver-66854bb65-dgr4f" Feb 9 19:19:00.948275 env[1644]: time="2024-02-09T19:19:00.944518247Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66854bb65-dgr4f,Uid:dbc4feb8-86a8-4e95-a5b3-4a584751a635,Namespace:calico-apiserver,Attempt:0,}" Feb 9 19:19:01.354526 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:19:01.354717 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid5c2498364d: link becomes ready Feb 9 19:19:01.349060 systemd-networkd[1448]: calid5c2498364d: Link UP Feb 9 19:19:01.355380 systemd-networkd[1448]: calid5c2498364d: Gained carrier Feb 9 19:19:01.356354 (udev-worker)[5124]: Network interface NamePolicy= disabled on kernel command line. Feb 9 19:19:01.397360 env[1644]: 2024-02-09 19:19:01.163 [INFO][5106] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--31--30-k8s-calico--apiserver--66854bb65--dgr4f-eth0 calico-apiserver-66854bb65- calico-apiserver dbc4feb8-86a8-4e95-a5b3-4a584751a635 1003 0 2024-02-09 19:19:00 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:66854bb65 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-31-30 calico-apiserver-66854bb65-dgr4f eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid5c2498364d [] []}} ContainerID="f725f145849b4d80473ab0bb66b8cd325d6a9dfe5226308a3ae6175843424508" Namespace="calico-apiserver" Pod="calico-apiserver-66854bb65-dgr4f" WorkloadEndpoint="ip--172--31--31--30-k8s-calico--apiserver--66854bb65--dgr4f-" Feb 9 19:19:01.397360 env[1644]: 2024-02-09 19:19:01.164 [INFO][5106] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="f725f145849b4d80473ab0bb66b8cd325d6a9dfe5226308a3ae6175843424508" Namespace="calico-apiserver" Pod="calico-apiserver-66854bb65-dgr4f" WorkloadEndpoint="ip--172--31--31--30-k8s-calico--apiserver--66854bb65--dgr4f-eth0" Feb 9 19:19:01.397360 env[1644]: 2024-02-09 19:19:01.243 [INFO][5118] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f725f145849b4d80473ab0bb66b8cd325d6a9dfe5226308a3ae6175843424508" HandleID="k8s-pod-network.f725f145849b4d80473ab0bb66b8cd325d6a9dfe5226308a3ae6175843424508" Workload="ip--172--31--31--30-k8s-calico--apiserver--66854bb65--dgr4f-eth0" Feb 9 19:19:01.397360 env[1644]: 2024-02-09 19:19:01.268 [INFO][5118] ipam_plugin.go 268: Auto assigning IP ContainerID="f725f145849b4d80473ab0bb66b8cd325d6a9dfe5226308a3ae6175843424508" HandleID="k8s-pod-network.f725f145849b4d80473ab0bb66b8cd325d6a9dfe5226308a3ae6175843424508" Workload="ip--172--31--31--30-k8s-calico--apiserver--66854bb65--dgr4f-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400025e700), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-31-30", "pod":"calico-apiserver-66854bb65-dgr4f", "timestamp":"2024-02-09 19:19:01.243388495 +0000 UTC"}, Hostname:"ip-172-31-31-30", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:19:01.397360 env[1644]: 2024-02-09 19:19:01.268 [INFO][5118] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:19:01.397360 env[1644]: 2024-02-09 19:19:01.268 [INFO][5118] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:19:01.397360 env[1644]: 2024-02-09 19:19:01.268 [INFO][5118] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-31-30' Feb 9 19:19:01.397360 env[1644]: 2024-02-09 19:19:01.271 [INFO][5118] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f725f145849b4d80473ab0bb66b8cd325d6a9dfe5226308a3ae6175843424508" host="ip-172-31-31-30" Feb 9 19:19:01.397360 env[1644]: 2024-02-09 19:19:01.291 [INFO][5118] ipam.go 372: Looking up existing affinities for host host="ip-172-31-31-30" Feb 9 19:19:01.397360 env[1644]: 2024-02-09 19:19:01.300 [INFO][5118] ipam.go 489: Trying affinity for 192.168.10.64/26 host="ip-172-31-31-30" Feb 9 19:19:01.397360 env[1644]: 2024-02-09 19:19:01.304 [INFO][5118] ipam.go 155: Attempting to load block cidr=192.168.10.64/26 host="ip-172-31-31-30" Feb 9 19:19:01.397360 env[1644]: 2024-02-09 19:19:01.309 [INFO][5118] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.10.64/26 host="ip-172-31-31-30" Feb 9 19:19:01.397360 env[1644]: 2024-02-09 19:19:01.309 [INFO][5118] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.10.64/26 handle="k8s-pod-network.f725f145849b4d80473ab0bb66b8cd325d6a9dfe5226308a3ae6175843424508" host="ip-172-31-31-30" Feb 9 19:19:01.397360 env[1644]: 2024-02-09 19:19:01.313 [INFO][5118] ipam.go 1682: Creating new handle: k8s-pod-network.f725f145849b4d80473ab0bb66b8cd325d6a9dfe5226308a3ae6175843424508 Feb 9 19:19:01.397360 env[1644]: 2024-02-09 19:19:01.320 [INFO][5118] ipam.go 1203: Writing block in order to claim IPs block=192.168.10.64/26 handle="k8s-pod-network.f725f145849b4d80473ab0bb66b8cd325d6a9dfe5226308a3ae6175843424508" host="ip-172-31-31-30" Feb 9 19:19:01.397360 env[1644]: 2024-02-09 19:19:01.336 [INFO][5118] ipam.go 1216: Successfully claimed IPs: [192.168.10.69/26] block=192.168.10.64/26 handle="k8s-pod-network.f725f145849b4d80473ab0bb66b8cd325d6a9dfe5226308a3ae6175843424508" host="ip-172-31-31-30" Feb 9 19:19:01.397360 env[1644]: 2024-02-09 19:19:01.336 [INFO][5118] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.10.69/26] handle="k8s-pod-network.f725f145849b4d80473ab0bb66b8cd325d6a9dfe5226308a3ae6175843424508" host="ip-172-31-31-30" Feb 9 19:19:01.397360 env[1644]: 2024-02-09 19:19:01.336 [INFO][5118] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:19:01.397360 env[1644]: 2024-02-09 19:19:01.336 [INFO][5118] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.10.69/26] IPv6=[] ContainerID="f725f145849b4d80473ab0bb66b8cd325d6a9dfe5226308a3ae6175843424508" HandleID="k8s-pod-network.f725f145849b4d80473ab0bb66b8cd325d6a9dfe5226308a3ae6175843424508" Workload="ip--172--31--31--30-k8s-calico--apiserver--66854bb65--dgr4f-eth0" Feb 9 19:19:01.398880 env[1644]: 2024-02-09 19:19:01.339 [INFO][5106] k8s.go 385: Populated endpoint ContainerID="f725f145849b4d80473ab0bb66b8cd325d6a9dfe5226308a3ae6175843424508" Namespace="calico-apiserver" Pod="calico-apiserver-66854bb65-dgr4f" WorkloadEndpoint="ip--172--31--31--30-k8s-calico--apiserver--66854bb65--dgr4f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--30-k8s-calico--apiserver--66854bb65--dgr4f-eth0", GenerateName:"calico-apiserver-66854bb65-", Namespace:"calico-apiserver", SelfLink:"", UID:"dbc4feb8-86a8-4e95-a5b3-4a584751a635", ResourceVersion:"1003", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 19, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66854bb65", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-30", ContainerID:"", Pod:"calico-apiserver-66854bb65-dgr4f", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.10.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid5c2498364d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:19:01.398880 env[1644]: 2024-02-09 19:19:01.340 [INFO][5106] k8s.go 386: Calico CNI using IPs: [192.168.10.69/32] ContainerID="f725f145849b4d80473ab0bb66b8cd325d6a9dfe5226308a3ae6175843424508" Namespace="calico-apiserver" Pod="calico-apiserver-66854bb65-dgr4f" WorkloadEndpoint="ip--172--31--31--30-k8s-calico--apiserver--66854bb65--dgr4f-eth0" Feb 9 19:19:01.398880 env[1644]: 2024-02-09 19:19:01.340 [INFO][5106] dataplane_linux.go 68: Setting the host side veth name to calid5c2498364d ContainerID="f725f145849b4d80473ab0bb66b8cd325d6a9dfe5226308a3ae6175843424508" Namespace="calico-apiserver" Pod="calico-apiserver-66854bb65-dgr4f" WorkloadEndpoint="ip--172--31--31--30-k8s-calico--apiserver--66854bb65--dgr4f-eth0" Feb 9 19:19:01.398880 env[1644]: 2024-02-09 19:19:01.361 [INFO][5106] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="f725f145849b4d80473ab0bb66b8cd325d6a9dfe5226308a3ae6175843424508" Namespace="calico-apiserver" Pod="calico-apiserver-66854bb65-dgr4f" WorkloadEndpoint="ip--172--31--31--30-k8s-calico--apiserver--66854bb65--dgr4f-eth0" Feb 9 19:19:01.398880 env[1644]: 2024-02-09 19:19:01.361 [INFO][5106] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="f725f145849b4d80473ab0bb66b8cd325d6a9dfe5226308a3ae6175843424508" Namespace="calico-apiserver" Pod="calico-apiserver-66854bb65-dgr4f" WorkloadEndpoint="ip--172--31--31--30-k8s-calico--apiserver--66854bb65--dgr4f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--30-k8s-calico--apiserver--66854bb65--dgr4f-eth0", GenerateName:"calico-apiserver-66854bb65-", Namespace:"calico-apiserver", SelfLink:"", UID:"dbc4feb8-86a8-4e95-a5b3-4a584751a635", ResourceVersion:"1003", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 19, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66854bb65", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-30", ContainerID:"f725f145849b4d80473ab0bb66b8cd325d6a9dfe5226308a3ae6175843424508", Pod:"calico-apiserver-66854bb65-dgr4f", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.10.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid5c2498364d", MAC:"f6:7d:4e:64:08:72", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:19:01.398880 env[1644]: 2024-02-09 19:19:01.389 [INFO][5106] k8s.go 491: Wrote updated endpoint to datastore ContainerID="f725f145849b4d80473ab0bb66b8cd325d6a9dfe5226308a3ae6175843424508" Namespace="calico-apiserver" Pod="calico-apiserver-66854bb65-dgr4f" WorkloadEndpoint="ip--172--31--31--30-k8s-calico--apiserver--66854bb65--dgr4f-eth0" Feb 9 19:19:01.438532 env[1644]: time="2024-02-09T19:19:01.437751304Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:19:01.438532 env[1644]: time="2024-02-09T19:19:01.437920147Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:19:01.438532 env[1644]: time="2024-02-09T19:19:01.437947339Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:19:01.438865 env[1644]: time="2024-02-09T19:19:01.438722901Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f725f145849b4d80473ab0bb66b8cd325d6a9dfe5226308a3ae6175843424508 pid=5144 runtime=io.containerd.runc.v2 Feb 9 19:19:01.490752 systemd[1]: Started cri-containerd-f725f145849b4d80473ab0bb66b8cd325d6a9dfe5226308a3ae6175843424508.scope. Feb 9 19:19:01.518657 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 19:19:01.518830 kernel: audit: type=1325 audit(1707506341.509:1440): table=filter:116 family=2 entries=61 op=nft_register_chain pid=5169 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:19:01.509000 audit[5169]: NETFILTER_CFG table=filter:116 family=2 entries=61 op=nft_register_chain pid=5169 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:19:01.509000 audit[5169]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30940 a0=3 a1=ffffef6b70d0 a2=0 a3=ffff90560fa8 items=0 ppid=3895 pid=5169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:01.536851 kernel: audit: type=1300 audit(1707506341.509:1440): arch=c00000b7 syscall=211 success=yes exit=30940 a0=3 a1=ffffef6b70d0 a2=0 a3=ffff90560fa8 items=0 ppid=3895 pid=5169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:01.509000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:19:01.547831 kernel: audit: type=1327 audit(1707506341.509:1440): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:19:01.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.556203 kernel: audit: type=1400 audit(1707506341.546:1441): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.564734 kernel: audit: type=1400 audit(1707506341.546:1442): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.573278 kernel: audit: type=1400 audit(1707506341.546:1443): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.581913 kernel: audit: type=1400 audit(1707506341.546:1444): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.591364 kernel: audit: type=1400 audit(1707506341.546:1445): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.609063 systemd[1]: Started sshd@16-172.31.31.30:22-147.75.109.163:45684.service. Feb 9 19:19:01.617141 kernel: audit: type=1400 audit(1707506341.546:1446): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.617280 kernel: audit: type=1400 audit(1707506341.546:1447): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.546000 audit: BPF prog-id=188 op=LOAD Feb 9 19:19:01.547000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.547000 audit[5158]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=5144 pid=5158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:01.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637323566313435383439623464383034373361623062623636623863 Feb 9 19:19:01.547000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.547000 audit[5158]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=5144 pid=5158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:01.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637323566313435383439623464383034373361623062623636623863 Feb 9 19:19:01.547000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.547000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.547000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.547000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.547000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.547000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.547000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.547000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.547000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.547000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.547000 audit: BPF prog-id=189 op=LOAD Feb 9 19:19:01.547000 audit[5158]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=5144 pid=5158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:01.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637323566313435383439623464383034373361623062623636623863 Feb 9 19:19:01.547000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.547000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.547000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.547000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.547000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.547000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.547000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.547000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.547000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.547000 audit: BPF prog-id=190 op=LOAD Feb 9 19:19:01.547000 audit[5158]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=5144 pid=5158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:01.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637323566313435383439623464383034373361623062623636623863 Feb 9 19:19:01.555000 audit: BPF prog-id=190 op=UNLOAD Feb 9 19:19:01.555000 audit: BPF prog-id=189 op=UNLOAD Feb 9 19:19:01.561000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.561000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.561000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.561000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.561000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.561000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.561000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.561000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.561000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.561000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:01.561000 audit: BPF prog-id=191 op=LOAD Feb 9 19:19:01.561000 audit[5158]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=5144 pid=5158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:01.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637323566313435383439623464383034373361623062623636623863 Feb 9 19:19:01.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.31.30:22-147.75.109.163:45684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:01.644706 env[1644]: time="2024-02-09T19:19:01.644645670Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66854bb65-dgr4f,Uid:dbc4feb8-86a8-4e95-a5b3-4a584751a635,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"f725f145849b4d80473ab0bb66b8cd325d6a9dfe5226308a3ae6175843424508\"" Feb 9 19:19:01.647602 env[1644]: time="2024-02-09T19:19:01.647548713Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 19:19:01.793000 audit[5177]: USER_ACCT pid=5177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:01.794174 sshd[5177]: Accepted publickey for core from 147.75.109.163 port 45684 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:19:01.802000 audit[5177]: CRED_ACQ pid=5177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:01.807000 audit[5177]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff0b8c0d0 a2=3 a3=1 items=0 ppid=1 pid=5177 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:01.807000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:01.808650 sshd[5177]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:19:01.818904 systemd-logind[1636]: New session 17 of user core. Feb 9 19:19:01.820408 systemd[1]: Started session-17.scope. Feb 9 19:19:01.832000 audit[5177]: USER_START pid=5177 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:01.835000 audit[5185]: CRED_ACQ pid=5185 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:02.074950 sshd[5177]: pam_unix(sshd:session): session closed for user core Feb 9 19:19:02.078000 audit[5177]: USER_END pid=5177 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:02.078000 audit[5177]: CRED_DISP pid=5177 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:02.081649 systemd-logind[1636]: Session 17 logged out. Waiting for processes to exit. Feb 9 19:19:02.082102 systemd[1]: sshd@16-172.31.31.30:22-147.75.109.163:45684.service: Deactivated successfully. Feb 9 19:19:02.083530 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 19:19:02.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.31.30:22-147.75.109.163:45684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:02.085303 systemd-logind[1636]: Removed session 17. Feb 9 19:19:02.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.31.30:22-147.75.109.163:45692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:02.104329 systemd[1]: Started sshd@17-172.31.31.30:22-147.75.109.163:45692.service. Feb 9 19:19:02.278000 audit[5195]: USER_ACCT pid=5195 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:02.279162 sshd[5195]: Accepted publickey for core from 147.75.109.163 port 45692 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:19:02.280000 audit[5195]: CRED_ACQ pid=5195 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:02.280000 audit[5195]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff59cc140 a2=3 a3=1 items=0 ppid=1 pid=5195 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:02.280000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:02.282187 sshd[5195]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:19:02.290911 systemd-logind[1636]: New session 18 of user core. Feb 9 19:19:02.291409 systemd[1]: Started session-18.scope. Feb 9 19:19:02.300000 audit[5195]: USER_START pid=5195 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:02.303000 audit[5197]: CRED_ACQ pid=5197 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:02.465717 update_engine[1637]: I0209 19:19:02.465644 1637 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 19:19:02.466373 update_engine[1637]: I0209 19:19:02.466015 1637 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 19:19:02.466373 update_engine[1637]: I0209 19:19:02.466279 1637 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 9 19:19:02.466747 update_engine[1637]: E0209 19:19:02.466701 1637 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 19:19:02.466895 update_engine[1637]: I0209 19:19:02.466867 1637 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 9 19:19:02.752523 sshd[5195]: pam_unix(sshd:session): session closed for user core Feb 9 19:19:02.754000 audit[5195]: USER_END pid=5195 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:02.755000 audit[5195]: CRED_DISP pid=5195 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:02.758413 systemd-logind[1636]: Session 18 logged out. Waiting for processes to exit. Feb 9 19:19:02.758740 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 19:19:02.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.31.30:22-147.75.109.163:45692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:02.760487 systemd[1]: sshd@17-172.31.31.30:22-147.75.109.163:45692.service: Deactivated successfully. Feb 9 19:19:02.762940 systemd-logind[1636]: Removed session 18. Feb 9 19:19:02.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.31.30:22-147.75.109.163:45696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:02.783890 systemd[1]: Started sshd@18-172.31.31.30:22-147.75.109.163:45696.service. Feb 9 19:19:02.808432 systemd-networkd[1448]: calid5c2498364d: Gained IPv6LL Feb 9 19:19:02.959000 audit[5204]: USER_ACCT pid=5204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:02.960499 sshd[5204]: Accepted publickey for core from 147.75.109.163 port 45696 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:19:02.961000 audit[5204]: CRED_ACQ pid=5204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:02.961000 audit[5204]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeea01920 a2=3 a3=1 items=0 ppid=1 pid=5204 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:02.961000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:02.963645 sshd[5204]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:19:02.971244 systemd-logind[1636]: New session 19 of user core. Feb 9 19:19:02.973681 systemd[1]: Started session-19.scope. Feb 9 19:19:02.984000 audit[5204]: USER_START pid=5204 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:02.987000 audit[5206]: CRED_ACQ pid=5206 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:04.985513 env[1644]: time="2024-02-09T19:19:04.985448826Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:19:04.988884 env[1644]: time="2024-02-09T19:19:04.988708354Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:19:04.992025 env[1644]: time="2024-02-09T19:19:04.991970043Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:19:04.999844 env[1644]: time="2024-02-09T19:19:04.995849275Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:19:05.000315 env[1644]: time="2024-02-09T19:19:04.997308467Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 9 19:19:05.011540 env[1644]: time="2024-02-09T19:19:05.006249150Z" level=info msg="CreateContainer within sandbox \"f725f145849b4d80473ab0bb66b8cd325d6a9dfe5226308a3ae6175843424508\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 19:19:05.045563 env[1644]: time="2024-02-09T19:19:05.045476638Z" level=info msg="CreateContainer within sandbox \"f725f145849b4d80473ab0bb66b8cd325d6a9dfe5226308a3ae6175843424508\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"e08bba9e1a33b8a612c3b416af2930fa16970d1a9fd2d52ff6d78d69e49a2c34\"" Feb 9 19:19:05.047502 env[1644]: time="2024-02-09T19:19:05.047428189Z" level=info msg="StartContainer for \"e08bba9e1a33b8a612c3b416af2930fa16970d1a9fd2d52ff6d78d69e49a2c34\"" Feb 9 19:19:05.128040 systemd[1]: Started cri-containerd-e08bba9e1a33b8a612c3b416af2930fa16970d1a9fd2d52ff6d78d69e49a2c34.scope. Feb 9 19:19:05.157948 systemd[1]: run-containerd-runc-k8s.io-e08bba9e1a33b8a612c3b416af2930fa16970d1a9fd2d52ff6d78d69e49a2c34-runc.jtaQfr.mount: Deactivated successfully. Feb 9 19:19:05.244432 sshd[5204]: pam_unix(sshd:session): session closed for user core Feb 9 19:19:05.247000 audit[5204]: USER_END pid=5204 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:05.247000 audit[5204]: CRED_DISP pid=5204 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:05.250914 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 19:19:05.252312 systemd-logind[1636]: Session 19 logged out. Waiting for processes to exit. Feb 9 19:19:05.252553 systemd[1]: sshd@18-172.31.31.30:22-147.75.109.163:45696.service: Deactivated successfully. Feb 9 19:19:05.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.31.30:22-147.75.109.163:45696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:05.255693 systemd-logind[1636]: Removed session 19. Feb 9 19:19:05.274204 systemd[1]: Started sshd@19-172.31.31.30:22-147.75.109.163:53794.service. Feb 9 19:19:05.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.31.30:22-147.75.109.163:53794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:05.306000 audit[5252]: NETFILTER_CFG table=filter:117 family=2 entries=22 op=nft_register_rule pid=5252 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:05.306000 audit[5252]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11996 a0=3 a1=ffffcd2950e0 a2=0 a3=ffffb65736c0 items=0 ppid=2987 pid=5252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:05.306000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:05.314000 audit[5252]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=5252 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:05.314000 audit[5252]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffcd2950e0 a2=0 a3=ffffb65736c0 items=0 ppid=2987 pid=5252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:05.314000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:05.339000 audit[5266]: NETFILTER_CFG table=filter:119 family=2 entries=34 op=nft_register_rule pid=5266 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:05.339000 audit[5266]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11996 a0=3 a1=fffffb186fa0 a2=0 a3=ffffb1d596c0 items=0 ppid=2987 pid=5266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:05.339000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:05.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.348000 audit: BPF prog-id=192 op=LOAD Feb 9 19:19:05.349000 audit[5242]: AVC avc: denied { bpf } for pid=5242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.349000 audit[5242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=5144 pid=5242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:05.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530386262613965316133336238613631326333623431366166323933 Feb 9 19:19:05.349000 audit[5242]: AVC avc: denied { perfmon } for pid=5242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.349000 audit[5242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=5144 pid=5242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:05.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530386262613965316133336238613631326333623431366166323933 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { bpf } for pid=5242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { bpf } for pid=5242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { bpf } for pid=5242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { perfmon } for pid=5242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { perfmon } for pid=5242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { perfmon } for pid=5242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { perfmon } for pid=5242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { perfmon } for pid=5242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { bpf } for pid=5242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { bpf } for pid=5242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit: BPF prog-id=193 op=LOAD Feb 9 19:19:05.350000 audit[5242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=5144 pid=5242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:05.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530386262613965316133336238613631326333623431366166323933 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { bpf } for pid=5242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { bpf } for pid=5242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { perfmon } for pid=5242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { perfmon } for pid=5242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { perfmon } for pid=5242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { perfmon } for pid=5242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { perfmon } for pid=5242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { bpf } for pid=5242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { bpf } for pid=5242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit: BPF prog-id=194 op=LOAD Feb 9 19:19:05.350000 audit[5242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=5144 pid=5242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:05.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530386262613965316133336238613631326333623431366166323933 Feb 9 19:19:05.350000 audit: BPF prog-id=194 op=UNLOAD Feb 9 19:19:05.350000 audit: BPF prog-id=193 op=UNLOAD Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { bpf } for pid=5242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { bpf } for pid=5242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { bpf } for pid=5242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { perfmon } for pid=5242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { perfmon } for pid=5242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { perfmon } for pid=5242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { perfmon } for pid=5242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { perfmon } for pid=5242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { bpf } for pid=5242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit[5242]: AVC avc: denied { bpf } for pid=5242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:19:05.350000 audit: BPF prog-id=195 op=LOAD Feb 9 19:19:05.350000 audit[5242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=5144 pid=5242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:05.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530386262613965316133336238613631326333623431366166323933 Feb 9 19:19:05.342000 audit[5266]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=5266 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:05.342000 audit[5266]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=fffffb186fa0 a2=0 a3=ffffb1d596c0 items=0 ppid=2987 pid=5266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:05.342000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:05.413923 env[1644]: time="2024-02-09T19:19:05.413752079Z" level=info msg="StartContainer for \"e08bba9e1a33b8a612c3b416af2930fa16970d1a9fd2d52ff6d78d69e49a2c34\" returns successfully" Feb 9 19:19:05.470961 sshd[5257]: Accepted publickey for core from 147.75.109.163 port 53794 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:19:05.470000 audit[5257]: USER_ACCT pid=5257 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:05.472000 audit[5257]: CRED_ACQ pid=5257 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:05.472000 audit[5257]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd3e35820 a2=3 a3=1 items=0 ppid=1 pid=5257 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:05.472000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:05.474872 sshd[5257]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:19:05.487347 systemd-logind[1636]: New session 20 of user core. Feb 9 19:19:05.488558 systemd[1]: Started session-20.scope. Feb 9 19:19:05.498000 audit[5257]: USER_START pid=5257 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:05.502000 audit[5279]: CRED_ACQ pid=5279 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:06.311645 sshd[5257]: pam_unix(sshd:session): session closed for user core Feb 9 19:19:06.312000 audit[5257]: USER_END pid=5257 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:06.312000 audit[5257]: CRED_DISP pid=5257 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:06.316953 systemd-logind[1636]: Session 20 logged out. Waiting for processes to exit. Feb 9 19:19:06.321659 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 19:19:06.330222 systemd-logind[1636]: Removed session 20. Feb 9 19:19:06.335153 systemd[1]: sshd@19-172.31.31.30:22-147.75.109.163:53794.service: Deactivated successfully. Feb 9 19:19:06.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.31.30:22-147.75.109.163:53794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:06.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.31.30:22-147.75.109.163:53808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:06.345112 systemd[1]: Started sshd@20-172.31.31.30:22-147.75.109.163:53808.service. Feb 9 19:19:06.393000 audit[5292]: NETFILTER_CFG table=filter:121 family=2 entries=34 op=nft_register_rule pid=5292 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:06.393000 audit[5292]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11996 a0=3 a1=ffffc6405710 a2=0 a3=ffff96f006c0 items=0 ppid=2987 pid=5292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:06.393000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:06.397000 audit[5292]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=5292 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:06.397000 audit[5292]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffc6405710 a2=0 a3=ffff96f006c0 items=0 ppid=2987 pid=5292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:06.397000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:06.526000 audit[5289]: USER_ACCT pid=5289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:06.527884 sshd[5289]: Accepted publickey for core from 147.75.109.163 port 53808 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:19:06.529579 kernel: kauditd_printk_skb: 170 callbacks suppressed Feb 9 19:19:06.529736 kernel: audit: type=1101 audit(1707506346.526:1520): pid=5289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:06.542604 sshd[5289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:19:06.540000 audit[5289]: CRED_ACQ pid=5289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:06.552746 kernel: audit: type=1103 audit(1707506346.540:1521): pid=5289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:06.559055 kernel: audit: type=1006 audit(1707506346.541:1522): pid=5289 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Feb 9 19:19:06.541000 audit[5289]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffebc2dd60 a2=3 a3=1 items=0 ppid=1 pid=5289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:06.569615 kernel: audit: type=1300 audit(1707506346.541:1522): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffebc2dd60 a2=3 a3=1 items=0 ppid=1 pid=5289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:06.572069 kernel: audit: type=1327 audit(1707506346.541:1522): proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:06.541000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:06.579870 systemd-logind[1636]: New session 21 of user core. Feb 9 19:19:06.582939 systemd[1]: Started session-21.scope. Feb 9 19:19:06.592000 audit[5289]: USER_START pid=5289 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:06.592000 audit[5295]: CRED_ACQ pid=5295 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:06.606858 kernel: audit: type=1105 audit(1707506346.592:1523): pid=5289 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:06.618869 kernel: audit: type=1103 audit(1707506346.592:1524): pid=5295 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:06.869331 sshd[5289]: pam_unix(sshd:session): session closed for user core Feb 9 19:19:06.871000 audit[5289]: USER_END pid=5289 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:06.887048 systemd[1]: sshd@20-172.31.31.30:22-147.75.109.163:53808.service: Deactivated successfully. Feb 9 19:19:06.888526 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 19:19:06.890887 systemd-logind[1636]: Session 21 logged out. Waiting for processes to exit. Feb 9 19:19:06.872000 audit[5289]: CRED_DISP pid=5289 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:06.901956 kernel: audit: type=1106 audit(1707506346.871:1525): pid=5289 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:06.902074 kernel: audit: type=1104 audit(1707506346.872:1526): pid=5289 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:06.901932 systemd-logind[1636]: Removed session 21. Feb 9 19:19:06.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.31.30:22-147.75.109.163:53808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:06.915473 kernel: audit: type=1131 audit(1707506346.886:1527): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.31.30:22-147.75.109.163:53808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:07.240000 audit[5254]: AVC avc: denied { watch } for pid=5254 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_19_00.2190330206/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c684 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c186,c684 tclass=file permissive=0 Feb 9 19:19:07.240000 audit[5254]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40009fc100 a2=fc6 a3=0 items=0 ppid=5144 pid=5254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c684 key=(null) Feb 9 19:19:07.240000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:19:07.417000 audit[5307]: NETFILTER_CFG table=filter:123 family=2 entries=34 op=nft_register_rule pid=5307 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:07.417000 audit[5307]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11996 a0=3 a1=ffffda243690 a2=0 a3=ffff946506c0 items=0 ppid=2987 pid=5307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:07.417000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:07.419000 audit[5307]: NETFILTER_CFG table=nat:124 family=2 entries=20 op=nft_register_rule pid=5307 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:07.419000 audit[5307]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffda243690 a2=0 a3=ffff946506c0 items=0 ppid=2987 pid=5307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:07.419000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:11.901401 systemd[1]: Started sshd@21-172.31.31.30:22-147.75.109.163:53812.service. Feb 9 19:19:11.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.31.30:22-147.75.109.163:53812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:11.906904 kernel: kauditd_printk_skb: 9 callbacks suppressed Feb 9 19:19:11.907046 kernel: audit: type=1130 audit(1707506351.901:1531): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.31.30:22-147.75.109.163:53812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:12.080000 audit[5333]: USER_ACCT pid=5333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:12.082097 sshd[5333]: Accepted publickey for core from 147.75.109.163 port 53812 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:19:12.085531 sshd[5333]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:19:12.083000 audit[5333]: CRED_ACQ pid=5333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:12.103775 kernel: audit: type=1101 audit(1707506352.080:1532): pid=5333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:12.103936 kernel: audit: type=1103 audit(1707506352.083:1533): pid=5333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:12.110337 kernel: audit: type=1006 audit(1707506352.084:1534): pid=5333 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 9 19:19:12.111917 kernel: audit: type=1300 audit(1707506352.084:1534): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc28e3b30 a2=3 a3=1 items=0 ppid=1 pid=5333 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:12.084000 audit[5333]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc28e3b30 a2=3 a3=1 items=0 ppid=1 pid=5333 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:12.084000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:12.129879 kernel: audit: type=1327 audit(1707506352.084:1534): proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:12.129788 systemd-logind[1636]: New session 22 of user core. Feb 9 19:19:12.132583 systemd[1]: Started session-22.scope. Feb 9 19:19:12.141000 audit[5333]: USER_START pid=5333 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:12.148000 audit[5335]: CRED_ACQ pid=5335 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:12.163491 kernel: audit: type=1105 audit(1707506352.141:1535): pid=5333 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:12.163608 kernel: audit: type=1103 audit(1707506352.148:1536): pid=5335 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:12.381534 sshd[5333]: pam_unix(sshd:session): session closed for user core Feb 9 19:19:12.383000 audit[5333]: USER_END pid=5333 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:12.387295 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 19:19:12.388651 systemd[1]: sshd@21-172.31.31.30:22-147.75.109.163:53812.service: Deactivated successfully. Feb 9 19:19:12.384000 audit[5333]: CRED_DISP pid=5333 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:12.396614 systemd-logind[1636]: Session 22 logged out. Waiting for processes to exit. Feb 9 19:19:12.405857 kernel: audit: type=1106 audit(1707506352.383:1537): pid=5333 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:12.405955 kernel: audit: type=1104 audit(1707506352.384:1538): pid=5333 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:12.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.31.30:22-147.75.109.163:53812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:12.407229 systemd-logind[1636]: Removed session 22. Feb 9 19:19:12.466331 update_engine[1637]: I0209 19:19:12.465799 1637 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 19:19:12.466331 update_engine[1637]: I0209 19:19:12.466127 1637 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 19:19:12.467203 update_engine[1637]: I0209 19:19:12.466398 1637 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 9 19:19:12.467203 update_engine[1637]: E0209 19:19:12.466884 1637 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 19:19:12.467203 update_engine[1637]: I0209 19:19:12.466998 1637 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 19:19:12.467203 update_engine[1637]: I0209 19:19:12.467011 1637 omaha_request_action.cc:621] Omaha request response: Feb 9 19:19:12.467203 update_engine[1637]: E0209 19:19:12.467118 1637 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 9 19:19:12.467203 update_engine[1637]: I0209 19:19:12.467144 1637 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 9 19:19:12.467203 update_engine[1637]: I0209 19:19:12.467154 1637 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 19:19:12.467203 update_engine[1637]: I0209 19:19:12.467164 1637 update_attempter.cc:306] Processing Done. Feb 9 19:19:12.467203 update_engine[1637]: E0209 19:19:12.467182 1637 update_attempter.cc:619] Update failed. Feb 9 19:19:12.467203 update_engine[1637]: I0209 19:19:12.467195 1637 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 9 19:19:12.467203 update_engine[1637]: I0209 19:19:12.467204 1637 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 9 19:19:12.467970 update_engine[1637]: I0209 19:19:12.467214 1637 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 9 19:19:12.467970 update_engine[1637]: I0209 19:19:12.467317 1637 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 19:19:12.467970 update_engine[1637]: I0209 19:19:12.467351 1637 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 19:19:12.467970 update_engine[1637]: I0209 19:19:12.467362 1637 omaha_request_action.cc:271] Request: Feb 9 19:19:12.467970 update_engine[1637]: Feb 9 19:19:12.467970 update_engine[1637]: Feb 9 19:19:12.467970 update_engine[1637]: Feb 9 19:19:12.467970 update_engine[1637]: Feb 9 19:19:12.467970 update_engine[1637]: Feb 9 19:19:12.467970 update_engine[1637]: Feb 9 19:19:12.467970 update_engine[1637]: I0209 19:19:12.467372 1637 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 19:19:12.467970 update_engine[1637]: I0209 19:19:12.467579 1637 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 19:19:12.467970 update_engine[1637]: I0209 19:19:12.467798 1637 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 9 19:19:12.469147 update_engine[1637]: E0209 19:19:12.469100 1637 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 19:19:12.469264 update_engine[1637]: I0209 19:19:12.469236 1637 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 19:19:12.469264 update_engine[1637]: I0209 19:19:12.469251 1637 omaha_request_action.cc:621] Omaha request response: Feb 9 19:19:12.469264 update_engine[1637]: I0209 19:19:12.469262 1637 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 19:19:12.469429 update_engine[1637]: I0209 19:19:12.469271 1637 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 19:19:12.469429 update_engine[1637]: I0209 19:19:12.469280 1637 update_attempter.cc:306] Processing Done. Feb 9 19:19:12.469429 update_engine[1637]: I0209 19:19:12.469290 1637 update_attempter.cc:310] Error event sent. Feb 9 19:19:12.469429 update_engine[1637]: I0209 19:19:12.469305 1637 update_check_scheduler.cc:74] Next update check in 40m55s Feb 9 19:19:12.470158 locksmithd[1689]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 9 19:19:12.470914 locksmithd[1689]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 9 19:19:13.941000 audit[5344]: NETFILTER_CFG table=filter:125 family=2 entries=22 op=nft_register_rule pid=5344 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:13.941000 audit[5344]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffce065fd0 a2=0 a3=ffffa14c46c0 items=0 ppid=2987 pid=5344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:13.941000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:13.948000 audit[5344]: NETFILTER_CFG table=nat:126 family=2 entries=104 op=nft_register_chain pid=5344 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:13.948000 audit[5344]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=47436 a0=3 a1=ffffce065fd0 a2=0 a3=ffffa14c46c0 items=0 ppid=2987 pid=5344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:13.948000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:17.422619 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 19:19:17.422740 kernel: audit: type=1130 audit(1707506357.409:1542): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.31.30:22-147.75.109.163:38232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:17.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.31.30:22-147.75.109.163:38232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:17.411238 systemd[1]: Started sshd@22-172.31.31.30:22-147.75.109.163:38232.service. Feb 9 19:19:17.586000 audit[5350]: USER_ACCT pid=5350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:17.588495 sshd[5350]: Accepted publickey for core from 147.75.109.163 port 38232 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:19:17.599862 kernel: audit: type=1101 audit(1707506357.586:1543): pid=5350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:17.598000 audit[5350]: CRED_ACQ pid=5350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:17.606484 sshd[5350]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:19:17.616750 kernel: audit: type=1103 audit(1707506357.598:1544): pid=5350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:17.616930 kernel: audit: type=1006 audit(1707506357.598:1545): pid=5350 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 9 19:19:17.598000 audit[5350]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff38d1840 a2=3 a3=1 items=0 ppid=1 pid=5350 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:17.627743 kernel: audit: type=1300 audit(1707506357.598:1545): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff38d1840 a2=3 a3=1 items=0 ppid=1 pid=5350 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:17.598000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:17.631553 kernel: audit: type=1327 audit(1707506357.598:1545): proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:17.633689 systemd-logind[1636]: New session 23 of user core. Feb 9 19:19:17.634326 systemd[1]: Started session-23.scope. Feb 9 19:19:17.643000 audit[5350]: USER_START pid=5350 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:17.655000 audit[5352]: CRED_ACQ pid=5352 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:17.666800 kernel: audit: type=1105 audit(1707506357.643:1546): pid=5350 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:17.666922 kernel: audit: type=1103 audit(1707506357.655:1547): pid=5352 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:17.910190 sshd[5350]: pam_unix(sshd:session): session closed for user core Feb 9 19:19:17.911000 audit[5350]: USER_END pid=5350 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:17.926984 systemd[1]: sshd@22-172.31.31.30:22-147.75.109.163:38232.service: Deactivated successfully. Feb 9 19:19:17.911000 audit[5350]: CRED_DISP pid=5350 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:17.928315 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 19:19:17.936333 kernel: audit: type=1106 audit(1707506357.911:1548): pid=5350 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:17.936425 kernel: audit: type=1104 audit(1707506357.911:1549): pid=5350 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:17.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.31.30:22-147.75.109.163:38232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:17.937525 systemd-logind[1636]: Session 23 logged out. Waiting for processes to exit. Feb 9 19:19:17.939419 systemd-logind[1636]: Removed session 23. Feb 9 19:19:22.946057 systemd[1]: Started sshd@23-172.31.31.30:22-147.75.109.163:38236.service. Feb 9 19:19:22.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.31.30:22-147.75.109.163:38236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:22.949037 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:19:22.949125 kernel: audit: type=1130 audit(1707506362.946:1551): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.31.30:22-147.75.109.163:38236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:23.131000 audit[5368]: USER_ACCT pid=5368 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:23.143126 sshd[5368]: Accepted publickey for core from 147.75.109.163 port 38236 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:19:23.146354 sshd[5368]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:19:23.144000 audit[5368]: CRED_ACQ pid=5368 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:23.161781 kernel: audit: type=1101 audit(1707506363.131:1552): pid=5368 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:23.162009 kernel: audit: type=1103 audit(1707506363.144:1553): pid=5368 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:23.162063 kernel: audit: type=1006 audit(1707506363.144:1554): pid=5368 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 9 19:19:23.156613 systemd-logind[1636]: New session 24 of user core. Feb 9 19:19:23.163648 systemd[1]: Started session-24.scope. Feb 9 19:19:23.144000 audit[5368]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc1cf2ec0 a2=3 a3=1 items=0 ppid=1 pid=5368 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:23.178607 kernel: audit: type=1300 audit(1707506363.144:1554): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc1cf2ec0 a2=3 a3=1 items=0 ppid=1 pid=5368 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:23.144000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:23.183848 kernel: audit: type=1327 audit(1707506363.144:1554): proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:23.184000 audit[5368]: USER_START pid=5368 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:23.198462 kernel: audit: type=1105 audit(1707506363.184:1555): pid=5368 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:23.198000 audit[5370]: CRED_ACQ pid=5370 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:23.210939 kernel: audit: type=1103 audit(1707506363.198:1556): pid=5370 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:23.492676 sshd[5368]: pam_unix(sshd:session): session closed for user core Feb 9 19:19:23.494000 audit[5368]: USER_END pid=5368 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:23.500442 systemd-logind[1636]: Session 24 logged out. Waiting for processes to exit. Feb 9 19:19:23.502394 systemd[1]: sshd@23-172.31.31.30:22-147.75.109.163:38236.service: Deactivated successfully. Feb 9 19:19:23.503853 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 19:19:23.506313 systemd-logind[1636]: Removed session 24. Feb 9 19:19:23.494000 audit[5368]: CRED_DISP pid=5368 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:23.517166 kernel: audit: type=1106 audit(1707506363.494:1557): pid=5368 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:23.517311 kernel: audit: type=1104 audit(1707506363.494:1558): pid=5368 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:23.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.31.30:22-147.75.109.163:38236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:25.975000 audit[2537]: AVC avc: denied { watch } for pid=2537 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:19:25.975000 audit[2537]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=400be2f8c0 a2=fc6 a3=0 items=0 ppid=2380 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 key=(null) Feb 9 19:19:25.975000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:19:25.975000 audit[2537]: AVC avc: denied { watch } for pid=2537 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:19:25.975000 audit[2537]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=400df6afe0 a2=fc6 a3=0 items=0 ppid=2380 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 key=(null) Feb 9 19:19:25.975000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:19:25.984000 audit[2537]: AVC avc: denied { watch } for pid=2537 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520990 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:19:25.984000 audit[2537]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=400bde2a50 a2=fc6 a3=0 items=0 ppid=2380 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 key=(null) Feb 9 19:19:25.984000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:19:26.024000 audit[2537]: AVC avc: denied { watch } for pid=2537 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:19:26.024000 audit[2537]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=400be2fb00 a2=fc6 a3=0 items=0 ppid=2380 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 key=(null) Feb 9 19:19:26.024000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:19:26.029000 audit[2537]: AVC avc: denied { watch } for pid=2537 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:19:26.029000 audit[2537]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=400df6b1c0 a2=fc6 a3=0 items=0 ppid=2380 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 key=(null) Feb 9 19:19:26.029000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:19:26.058000 audit[2537]: AVC avc: denied { watch } for pid=2537 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:19:26.058000 audit[2537]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=400bde2ba0 a2=fc6 a3=0 items=0 ppid=2380 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c455 key=(null) Feb 9 19:19:26.058000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E3330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:19:27.260000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:19:27.260000 audit[2502]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002842f40 a2=fc6 a3=0 items=0 ppid=2360 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 key=(null) Feb 9 19:19:27.260000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:19:27.260000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:19:27.260000 audit[2502]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400209c570 a2=fc6 a3=0 items=0 ppid=2360 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 key=(null) Feb 9 19:19:27.260000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:19:28.523553 systemd[1]: Started sshd@24-172.31.31.30:22-147.75.109.163:58812.service. Feb 9 19:19:28.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.31.30:22-147.75.109.163:58812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:28.529978 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 19:19:28.530088 kernel: audit: type=1130 audit(1707506368.523:1568): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.31.30:22-147.75.109.163:58812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:28.695577 sshd[5380]: Accepted publickey for core from 147.75.109.163 port 58812 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:19:28.694000 audit[5380]: USER_ACCT pid=5380 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:28.707015 sshd[5380]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:19:28.705000 audit[5380]: CRED_ACQ pid=5380 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:28.717318 kernel: audit: type=1101 audit(1707506368.694:1569): pid=5380 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:28.717480 kernel: audit: type=1103 audit(1707506368.705:1570): pid=5380 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:28.725363 kernel: audit: type=1006 audit(1707506368.705:1571): pid=5380 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 9 19:19:28.705000 audit[5380]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff0170ec0 a2=3 a3=1 items=0 ppid=1 pid=5380 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:28.741602 kernel: audit: type=1300 audit(1707506368.705:1571): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff0170ec0 a2=3 a3=1 items=0 ppid=1 pid=5380 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:28.735686 systemd-logind[1636]: New session 25 of user core. Feb 9 19:19:28.741779 systemd[1]: Started session-25.scope. Feb 9 19:19:28.705000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:28.747971 kernel: audit: type=1327 audit(1707506368.705:1571): proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:28.756000 audit[5380]: USER_START pid=5380 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:28.770000 audit[5382]: CRED_ACQ pid=5382 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:28.782254 kernel: audit: type=1105 audit(1707506368.756:1572): pid=5380 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:28.782492 kernel: audit: type=1103 audit(1707506368.770:1573): pid=5382 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:28.999637 sshd[5380]: pam_unix(sshd:session): session closed for user core Feb 9 19:19:29.000000 audit[5380]: USER_END pid=5380 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:29.004632 systemd-logind[1636]: Session 25 logged out. Waiting for processes to exit. Feb 9 19:19:29.015741 systemd[1]: sshd@24-172.31.31.30:22-147.75.109.163:58812.service: Deactivated successfully. Feb 9 19:19:29.017210 systemd[1]: session-25.scope: Deactivated successfully. Feb 9 19:19:29.000000 audit[5380]: CRED_DISP pid=5380 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:29.020802 systemd-logind[1636]: Removed session 25. Feb 9 19:19:29.028187 kernel: audit: type=1106 audit(1707506369.000:1574): pid=5380 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:29.028308 kernel: audit: type=1104 audit(1707506369.000:1575): pid=5380 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:29.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.31.30:22-147.75.109.163:58812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:30.975547 systemd[1]: run-containerd-runc-k8s.io-e08bba9e1a33b8a612c3b416af2930fa16970d1a9fd2d52ff6d78d69e49a2c34-runc.rJ0RTs.mount: Deactivated successfully. Feb 9 19:19:31.052145 kubelet[2844]: I0209 19:19:31.052103 2844 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-66854bb65-dgr4f" podStartSLOduration=27.69821078 podCreationTimestamp="2024-02-09 19:19:00 +0000 UTC" firstStartedPulling="2024-02-09 19:19:01.64679336 +0000 UTC m=+91.791568727" lastFinishedPulling="2024-02-09 19:19:05.000624481 +0000 UTC m=+95.145399848" observedRunningTime="2024-02-09 19:19:05.870727342 +0000 UTC m=+96.015502709" watchObservedRunningTime="2024-02-09 19:19:31.052041901 +0000 UTC m=+121.196817304" Feb 9 19:19:31.096000 audit[5414]: NETFILTER_CFG table=filter:127 family=2 entries=9 op=nft_register_rule pid=5414 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:31.096000 audit[5414]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffd79be610 a2=0 a3=ffff850c06c0 items=0 ppid=2987 pid=5414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:31.096000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:31.102000 audit[5414]: NETFILTER_CFG table=nat:128 family=2 entries=51 op=nft_register_chain pid=5414 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:31.102000 audit[5414]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=17716 a0=3 a1=ffffd79be610 a2=0 a3=ffff850c06c0 items=0 ppid=2987 pid=5414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:31.102000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:32.509000 audit[5416]: NETFILTER_CFG table=filter:129 family=2 entries=8 op=nft_register_rule pid=5416 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:32.509000 audit[5416]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=fffff67463f0 a2=0 a3=ffffac7846c0 items=0 ppid=2987 pid=5416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:32.509000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:32.514000 audit[5416]: NETFILTER_CFG table=nat:130 family=2 entries=58 op=nft_register_chain pid=5416 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:19:32.514000 audit[5416]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19604 a0=3 a1=fffff67463f0 a2=0 a3=ffffac7846c0 items=0 ppid=2987 pid=5416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:32.514000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:19:33.128653 systemd[1]: run-containerd-runc-k8s.io-8de69f2b97691ecf3a413b1067fd5efe3e850bc9bc3ea7932bc54e0fc73817d6-runc.9NSfZG.mount: Deactivated successfully. Feb 9 19:19:34.029362 systemd[1]: Started sshd@25-172.31.31.30:22-147.75.109.163:58824.service. Feb 9 19:19:34.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.31.30:22-147.75.109.163:58824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:34.036016 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 19:19:34.036172 kernel: audit: type=1130 audit(1707506374.029:1581): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.31.30:22-147.75.109.163:58824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:34.204000 audit[5437]: USER_ACCT pid=5437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:34.206171 sshd[5437]: Accepted publickey for core from 147.75.109.163 port 58824 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:19:34.219110 sshd[5437]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:19:34.217000 audit[5437]: CRED_ACQ pid=5437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:34.229845 kernel: audit: type=1101 audit(1707506374.204:1582): pid=5437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:34.230015 kernel: audit: type=1103 audit(1707506374.217:1583): pid=5437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:34.239644 kernel: audit: type=1006 audit(1707506374.217:1584): pid=5437 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 9 19:19:34.239908 systemd-logind[1636]: New session 26 of user core. Feb 9 19:19:34.241146 systemd[1]: Started session-26.scope. Feb 9 19:19:34.217000 audit[5437]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd8576b0 a2=3 a3=1 items=0 ppid=1 pid=5437 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:34.252847 kernel: audit: type=1300 audit(1707506374.217:1584): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd8576b0 a2=3 a3=1 items=0 ppid=1 pid=5437 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:34.217000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:34.266456 kernel: audit: type=1327 audit(1707506374.217:1584): proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:34.257000 audit[5437]: USER_START pid=5437 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:34.279417 kernel: audit: type=1105 audit(1707506374.257:1585): pid=5437 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:34.260000 audit[5439]: CRED_ACQ pid=5439 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:34.291968 kernel: audit: type=1103 audit(1707506374.260:1586): pid=5439 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:34.539105 sshd[5437]: pam_unix(sshd:session): session closed for user core Feb 9 19:19:34.540000 audit[5437]: USER_END pid=5437 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:34.544478 systemd-logind[1636]: Session 26 logged out. Waiting for processes to exit. Feb 9 19:19:34.545885 systemd[1]: session-26.scope: Deactivated successfully. Feb 9 19:19:34.547006 systemd[1]: sshd@25-172.31.31.30:22-147.75.109.163:58824.service: Deactivated successfully. Feb 9 19:19:34.550078 systemd-logind[1636]: Removed session 26. Feb 9 19:19:34.540000 audit[5437]: CRED_DISP pid=5437 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:34.562606 kernel: audit: type=1106 audit(1707506374.540:1587): pid=5437 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:34.562820 kernel: audit: type=1104 audit(1707506374.540:1588): pid=5437 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:34.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.31.30:22-147.75.109.163:58824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:38.975240 systemd[1]: run-containerd-runc-k8s.io-7924bca9f0b88a9decfb444b2a8f61610d25ea051241e9c6fa270fc336b6ee9b-runc.60e2S4.mount: Deactivated successfully. Feb 9 19:19:39.572860 systemd[1]: Started sshd@26-172.31.31.30:22-147.75.109.163:43028.service. Feb 9 19:19:39.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.31.30:22-147.75.109.163:43028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:39.575766 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:19:39.575926 kernel: audit: type=1130 audit(1707506379.572:1590): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.31.30:22-147.75.109.163:43028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:39.750000 audit[5478]: USER_ACCT pid=5478 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:39.751264 sshd[5478]: Accepted publickey for core from 147.75.109.163 port 43028 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:19:39.762910 kernel: audit: type=1101 audit(1707506379.750:1591): pid=5478 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:39.764245 sshd[5478]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:19:39.762000 audit[5478]: CRED_ACQ pid=5478 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:39.780263 kernel: audit: type=1103 audit(1707506379.762:1592): pid=5478 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:39.780413 kernel: audit: type=1006 audit(1707506379.762:1593): pid=5478 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 9 19:19:39.762000 audit[5478]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffddd63a00 a2=3 a3=1 items=0 ppid=1 pid=5478 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:39.790913 kernel: audit: type=1300 audit(1707506379.762:1593): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffddd63a00 a2=3 a3=1 items=0 ppid=1 pid=5478 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:39.762000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:39.794678 kernel: audit: type=1327 audit(1707506379.762:1593): proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:39.800701 systemd-logind[1636]: New session 27 of user core. Feb 9 19:19:39.803238 systemd[1]: Started session-27.scope. Feb 9 19:19:39.812000 audit[5478]: USER_START pid=5478 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:39.826855 kernel: audit: type=1105 audit(1707506379.812:1594): pid=5478 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:39.828000 audit[5481]: CRED_ACQ pid=5481 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:39.845857 kernel: audit: type=1103 audit(1707506379.828:1595): pid=5481 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:40.070008 sshd[5478]: pam_unix(sshd:session): session closed for user core Feb 9 19:19:40.071000 audit[5478]: USER_END pid=5478 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:40.085648 systemd[1]: sshd@26-172.31.31.30:22-147.75.109.163:43028.service: Deactivated successfully. Feb 9 19:19:40.087056 systemd[1]: session-27.scope: Deactivated successfully. Feb 9 19:19:40.071000 audit[5478]: CRED_DISP pid=5478 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:40.097640 kernel: audit: type=1106 audit(1707506380.071:1596): pid=5478 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:40.097799 kernel: audit: type=1104 audit(1707506380.071:1597): pid=5478 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:40.097722 systemd-logind[1636]: Session 27 logged out. Waiting for processes to exit. Feb 9 19:19:40.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.31.30:22-147.75.109.163:43028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:40.100465 systemd-logind[1636]: Removed session 27. Feb 9 19:19:42.156000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:19:42.156000 audit[2502]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002a57380 a2=fc6 a3=0 items=0 ppid=2360 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 key=(null) Feb 9 19:19:42.156000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:19:42.159000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:19:42.159000 audit[2502]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029f1600 a2=fc6 a3=0 items=0 ppid=2360 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 key=(null) Feb 9 19:19:42.159000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:19:42.159000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:19:42.159000 audit[2502]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029f1620 a2=fc6 a3=0 items=0 ppid=2360 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 key=(null) Feb 9 19:19:42.159000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:19:42.160000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:19:42.160000 audit[2502]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029f1740 a2=fc6 a3=0 items=0 ppid=2360 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 key=(null) Feb 9 19:19:42.160000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:19:45.102584 systemd[1]: Started sshd@27-172.31.31.30:22-147.75.109.163:42518.service. Feb 9 19:19:45.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.31.30:22-147.75.109.163:42518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:45.107895 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 19:19:45.108059 kernel: audit: type=1130 audit(1707506385.102:1603): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.31.30:22-147.75.109.163:42518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:45.279000 audit[5494]: USER_ACCT pid=5494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:45.280222 sshd[5494]: Accepted publickey for core from 147.75.109.163 port 42518 ssh2: RSA SHA256:vbbYXSA+vx4OxGE8RCTI42TSNHgOaZKYEuMHy2EWP78 Feb 9 19:19:45.291898 kernel: audit: type=1101 audit(1707506385.279:1604): pid=5494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:45.291000 audit[5494]: CRED_ACQ pid=5494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:45.293512 sshd[5494]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:19:45.308352 kernel: audit: type=1103 audit(1707506385.291:1605): pid=5494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:45.308571 kernel: audit: type=1006 audit(1707506385.291:1606): pid=5494 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 9 19:19:45.291000 audit[5494]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffa707510 a2=3 a3=1 items=0 ppid=1 pid=5494 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:45.319646 kernel: audit: type=1300 audit(1707506385.291:1606): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffa707510 a2=3 a3=1 items=0 ppid=1 pid=5494 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:19:45.291000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:45.323436 kernel: audit: type=1327 audit(1707506385.291:1606): proctitle=737368643A20636F7265205B707269765D Feb 9 19:19:45.328943 systemd-logind[1636]: New session 28 of user core. Feb 9 19:19:45.330617 systemd[1]: Started session-28.scope. Feb 9 19:19:45.340000 audit[5494]: USER_START pid=5494 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:45.355204 kernel: audit: type=1105 audit(1707506385.340:1607): pid=5494 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:45.355383 kernel: audit: type=1103 audit(1707506385.353:1608): pid=5498 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:45.353000 audit[5498]: CRED_ACQ pid=5498 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:45.591116 sshd[5494]: pam_unix(sshd:session): session closed for user core Feb 9 19:19:45.592000 audit[5494]: USER_END pid=5494 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:45.596311 systemd[1]: session-28.scope: Deactivated successfully. Feb 9 19:19:45.597621 systemd[1]: sshd@27-172.31.31.30:22-147.75.109.163:42518.service: Deactivated successfully. Feb 9 19:19:45.606056 systemd-logind[1636]: Session 28 logged out. Waiting for processes to exit. Feb 9 19:19:45.593000 audit[5494]: CRED_DISP pid=5494 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:45.616608 kernel: audit: type=1106 audit(1707506385.592:1609): pid=5494 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:45.616734 kernel: audit: type=1104 audit(1707506385.593:1610): pid=5494 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:19:45.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.31.30:22-147.75.109.163:42518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:19:45.617454 systemd-logind[1636]: Removed session 28. Feb 9 19:19:58.233248 systemd[1]: run-containerd-runc-k8s.io-8de69f2b97691ecf3a413b1067fd5efe3e850bc9bc3ea7932bc54e0fc73817d6-runc.jNqEvC.mount: Deactivated successfully. Feb 9 19:19:59.923490 systemd[1]: cri-containerd-eec34b3d6ea91bc045981ad25ea7d8de1951e7650e1f9904c65b57141d7a5a04.scope: Deactivated successfully. Feb 9 19:19:59.924097 systemd[1]: cri-containerd-eec34b3d6ea91bc045981ad25ea7d8de1951e7650e1f9904c65b57141d7a5a04.scope: Consumed 10.706s CPU time. Feb 9 19:19:59.923000 audit: BPF prog-id=126 op=UNLOAD Feb 9 19:19:59.927790 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:19:59.927937 kernel: audit: type=1334 audit(1707506399.923:1612): prog-id=126 op=UNLOAD Feb 9 19:19:59.930000 audit: BPF prog-id=129 op=UNLOAD Feb 9 19:19:59.933915 kernel: audit: type=1334 audit(1707506399.930:1613): prog-id=129 op=UNLOAD Feb 9 19:19:59.971477 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-eec34b3d6ea91bc045981ad25ea7d8de1951e7650e1f9904c65b57141d7a5a04-rootfs.mount: Deactivated successfully. Feb 9 19:19:59.973546 env[1644]: time="2024-02-09T19:19:59.973482192Z" level=info msg="shim disconnected" id=eec34b3d6ea91bc045981ad25ea7d8de1951e7650e1f9904c65b57141d7a5a04 Feb 9 19:19:59.974234 env[1644]: time="2024-02-09T19:19:59.974195954Z" level=warning msg="cleaning up after shim disconnected" id=eec34b3d6ea91bc045981ad25ea7d8de1951e7650e1f9904c65b57141d7a5a04 namespace=k8s.io Feb 9 19:19:59.974350 env[1644]: time="2024-02-09T19:19:59.974321850Z" level=info msg="cleaning up dead shim" Feb 9 19:19:59.989982 env[1644]: time="2024-02-09T19:19:59.989924431Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:19:59Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5548 runtime=io.containerd.runc.v2\n" Feb 9 19:20:00.830068 systemd[1]: cri-containerd-1f48f084c6bc3dcabbb4f849d7428108c4977b187fddb3b38acc1bfd937b6687.scope: Deactivated successfully. Feb 9 19:20:00.830623 systemd[1]: cri-containerd-1f48f084c6bc3dcabbb4f849d7428108c4977b187fddb3b38acc1bfd937b6687.scope: Consumed 5.448s CPU time. Feb 9 19:20:00.833000 audit: BPF prog-id=85 op=UNLOAD Feb 9 19:20:00.833000 audit: BPF prog-id=113 op=UNLOAD Feb 9 19:20:00.840490 kernel: audit: type=1334 audit(1707506400.833:1614): prog-id=85 op=UNLOAD Feb 9 19:20:00.840631 kernel: audit: type=1334 audit(1707506400.833:1615): prog-id=113 op=UNLOAD Feb 9 19:20:00.882449 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1f48f084c6bc3dcabbb4f849d7428108c4977b187fddb3b38acc1bfd937b6687-rootfs.mount: Deactivated successfully. Feb 9 19:20:00.886105 env[1644]: time="2024-02-09T19:20:00.886041466Z" level=info msg="shim disconnected" id=1f48f084c6bc3dcabbb4f849d7428108c4977b187fddb3b38acc1bfd937b6687 Feb 9 19:20:00.886544 env[1644]: time="2024-02-09T19:20:00.886500183Z" level=warning msg="cleaning up after shim disconnected" id=1f48f084c6bc3dcabbb4f849d7428108c4977b187fddb3b38acc1bfd937b6687 namespace=k8s.io Feb 9 19:20:00.886687 env[1644]: time="2024-02-09T19:20:00.886657856Z" level=info msg="cleaning up dead shim" Feb 9 19:20:00.904048 env[1644]: time="2024-02-09T19:20:00.903991070Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:20:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5573 runtime=io.containerd.runc.v2\n" Feb 9 19:20:00.979965 systemd[1]: run-containerd-runc-k8s.io-e08bba9e1a33b8a612c3b416af2930fa16970d1a9fd2d52ff6d78d69e49a2c34-runc.aneDa2.mount: Deactivated successfully. Feb 9 19:20:01.016123 kubelet[2844]: I0209 19:20:01.016083 2844 scope.go:117] "RemoveContainer" containerID="eec34b3d6ea91bc045981ad25ea7d8de1951e7650e1f9904c65b57141d7a5a04" Feb 9 19:20:01.020418 env[1644]: time="2024-02-09T19:20:01.020332271Z" level=info msg="CreateContainer within sandbox \"dace44349bd01bf93a55c4cb6f0a4a5be992fc61bc28886f352da630b0de3827\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Feb 9 19:20:01.024272 kubelet[2844]: I0209 19:20:01.023124 2844 scope.go:117] "RemoveContainer" containerID="1f48f084c6bc3dcabbb4f849d7428108c4977b187fddb3b38acc1bfd937b6687" Feb 9 19:20:01.030164 env[1644]: time="2024-02-09T19:20:01.029372116Z" level=info msg="CreateContainer within sandbox \"0b50f65fb89403193d6f8bbd15cf1f67ebb3d77fb42a8969662a6165a50d445d\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Feb 9 19:20:01.054749 env[1644]: time="2024-02-09T19:20:01.052958363Z" level=info msg="CreateContainer within sandbox \"dace44349bd01bf93a55c4cb6f0a4a5be992fc61bc28886f352da630b0de3827\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"d3ed89baa1f5e5563974290c6036cbd0f129c8a2b9d10791cd58206ad38d40f6\"" Feb 9 19:20:01.063918 env[1644]: time="2024-02-09T19:20:01.061067502Z" level=info msg="StartContainer for \"d3ed89baa1f5e5563974290c6036cbd0f129c8a2b9d10791cd58206ad38d40f6\"" Feb 9 19:20:01.073901 env[1644]: time="2024-02-09T19:20:01.072047013Z" level=info msg="CreateContainer within sandbox \"0b50f65fb89403193d6f8bbd15cf1f67ebb3d77fb42a8969662a6165a50d445d\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"d4013164d3ea7d5df5ef476d0fb6fa3d734dda54288e466f0a3bc9c9c5313646\"" Feb 9 19:20:01.073901 env[1644]: time="2024-02-09T19:20:01.072933630Z" level=info msg="StartContainer for \"d4013164d3ea7d5df5ef476d0fb6fa3d734dda54288e466f0a3bc9c9c5313646\"" Feb 9 19:20:01.081225 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount930615570.mount: Deactivated successfully. Feb 9 19:20:01.106010 systemd[1]: Started cri-containerd-d3ed89baa1f5e5563974290c6036cbd0f129c8a2b9d10791cd58206ad38d40f6.scope. Feb 9 19:20:01.131536 systemd[1]: Started cri-containerd-d4013164d3ea7d5df5ef476d0fb6fa3d734dda54288e466f0a3bc9c9c5313646.scope. Feb 9 19:20:01.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.183801 kernel: audit: type=1400 audit(1707506401.166:1616): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.183979 kernel: audit: type=1400 audit(1707506401.173:1617): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.184031 kernel: audit: type=1400 audit(1707506401.173:1618): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.199618 kernel: audit: type=1400 audit(1707506401.173:1619): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.212428 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:20:01.212622 kernel: audit: type=1400 audit(1707506401.173:1620): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.173000 audit: BPF prog-id=196 op=LOAD Feb 9 19:20:01.175000 audit[5622]: AVC avc: denied { bpf } for pid=5622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.175000 audit[5622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3001 pid=5622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:20:01.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433656438396261613166356535353633393734323930633630333663 Feb 9 19:20:01.175000 audit[5622]: AVC avc: denied { perfmon } for pid=5622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.175000 audit[5622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3001 pid=5622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:20:01.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433656438396261613166356535353633393734323930633630333663 Feb 9 19:20:01.175000 audit[5622]: AVC avc: denied { bpf } for pid=5622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.175000 audit[5622]: AVC avc: denied { bpf } for pid=5622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.175000 audit[5622]: AVC avc: denied { bpf } for pid=5622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.175000 audit[5622]: AVC avc: denied { perfmon } for pid=5622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.175000 audit[5622]: AVC avc: denied { perfmon } for pid=5622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.175000 audit[5622]: AVC avc: denied { perfmon } for pid=5622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.175000 audit[5622]: AVC avc: denied { perfmon } for pid=5622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.175000 audit[5622]: AVC avc: denied { perfmon } for pid=5622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.175000 audit[5622]: AVC avc: denied { bpf } for pid=5622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.175000 audit[5622]: AVC avc: denied { bpf } for pid=5622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.175000 audit: BPF prog-id=197 op=LOAD Feb 9 19:20:01.175000 audit[5622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3001 pid=5622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:20:01.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433656438396261613166356535353633393734323930633630333663 Feb 9 19:20:01.184000 audit[5622]: AVC avc: denied { bpf } for pid=5622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.184000 audit[5622]: AVC avc: denied { bpf } for pid=5622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.184000 audit[5622]: AVC avc: denied { perfmon } for pid=5622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.184000 audit[5622]: AVC avc: denied { perfmon } for pid=5622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.184000 audit[5622]: AVC avc: denied { perfmon } for pid=5622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.184000 audit[5622]: AVC avc: denied { perfmon } for pid=5622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.184000 audit[5622]: AVC avc: denied { perfmon } for pid=5622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.184000 audit[5622]: AVC avc: denied { bpf } for pid=5622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.184000 audit[5622]: AVC avc: denied { bpf } for pid=5622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.184000 audit: BPF prog-id=198 op=LOAD Feb 9 19:20:01.184000 audit[5622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3001 pid=5622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:20:01.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433656438396261613166356535353633393734323930633630333663 Feb 9 19:20:01.190000 audit: BPF prog-id=198 op=UNLOAD Feb 9 19:20:01.190000 audit: BPF prog-id=197 op=UNLOAD Feb 9 19:20:01.190000 audit[5622]: AVC avc: denied { bpf } for pid=5622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.190000 audit[5622]: AVC avc: denied { bpf } for pid=5622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.190000 audit[5622]: AVC avc: denied { bpf } for pid=5622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.190000 audit[5622]: AVC avc: denied { perfmon } for pid=5622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.190000 audit[5622]: AVC avc: denied { perfmon } for pid=5622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.190000 audit[5622]: AVC avc: denied { perfmon } for pid=5622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.190000 audit[5622]: AVC avc: denied { perfmon } for pid=5622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.190000 audit[5622]: AVC avc: denied { perfmon } for pid=5622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.190000 audit[5622]: AVC avc: denied { bpf } for pid=5622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.190000 audit[5622]: AVC avc: denied { bpf } for pid=5622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.190000 audit: BPF prog-id=199 op=LOAD Feb 9 19:20:01.190000 audit[5622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3001 pid=5622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:20:01.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433656438396261613166356535353633393734323930633630333663 Feb 9 19:20:01.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:01.266924 env[1644]: time="2024-02-09T19:20:01.266860798Z" level=info msg="StartContainer for \"d3ed89baa1f5e5563974290c6036cbd0f129c8a2b9d10791cd58206ad38d40f6\" returns successfully" Feb 9 19:20:01.291243 env[1644]: time="2024-02-09T19:20:01.291161142Z" level=info msg="StartContainer for \"d4013164d3ea7d5df5ef476d0fb6fa3d734dda54288e466f0a3bc9c9c5313646\" returns successfully" Feb 9 19:20:02.644400 kubelet[2844]: E0209 19:20:02.644333 2844 controller.go:193] "Failed to update lease" err="Put \"https://172.31.31.30:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-31-30?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 19:20:03.277000 audit[5654]: AVC avc: denied { watch } for pid=5654 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:20:03.277000 audit[5654]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000740180 a2=fc6 a3=0 items=0 ppid=2360 pid=5654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 key=(null) Feb 9 19:20:03.277000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:20:03.278000 audit[5654]: AVC avc: denied { watch } for pid=5654 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:20:03.278000 audit[5654]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000430140 a2=fc6 a3=0 items=0 ppid=2360 pid=5654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c525 key=(null) Feb 9 19:20:03.278000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:20:05.353740 systemd[1]: cri-containerd-ad0db9a3ac49184bd486d0ad4140e5f8d6367a6a0604aa4a212a980b035b3087.scope: Deactivated successfully. Feb 9 19:20:05.354285 systemd[1]: cri-containerd-ad0db9a3ac49184bd486d0ad4140e5f8d6367a6a0604aa4a212a980b035b3087.scope: Consumed 4.124s CPU time. Feb 9 19:20:05.363057 kernel: kauditd_printk_skb: 182 callbacks suppressed Feb 9 19:20:05.363200 kernel: audit: type=1334 audit(1707506405.357:1644): prog-id=89 op=UNLOAD Feb 9 19:20:05.357000 audit: BPF prog-id=89 op=UNLOAD Feb 9 19:20:05.366362 kernel: audit: type=1334 audit(1707506405.357:1645): prog-id=112 op=UNLOAD Feb 9 19:20:05.357000 audit: BPF prog-id=112 op=UNLOAD Feb 9 19:20:05.395384 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ad0db9a3ac49184bd486d0ad4140e5f8d6367a6a0604aa4a212a980b035b3087-rootfs.mount: Deactivated successfully. Feb 9 19:20:05.397090 env[1644]: time="2024-02-09T19:20:05.397009926Z" level=info msg="shim disconnected" id=ad0db9a3ac49184bd486d0ad4140e5f8d6367a6a0604aa4a212a980b035b3087 Feb 9 19:20:05.397645 env[1644]: time="2024-02-09T19:20:05.397086621Z" level=warning msg="cleaning up after shim disconnected" id=ad0db9a3ac49184bd486d0ad4140e5f8d6367a6a0604aa4a212a980b035b3087 namespace=k8s.io Feb 9 19:20:05.397645 env[1644]: time="2024-02-09T19:20:05.397109890Z" level=info msg="cleaning up dead shim" Feb 9 19:20:05.413570 env[1644]: time="2024-02-09T19:20:05.413492257Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:20:05Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5717 runtime=io.containerd.runc.v2\n" Feb 9 19:20:06.050590 kubelet[2844]: I0209 19:20:06.050556 2844 scope.go:117] "RemoveContainer" containerID="ad0db9a3ac49184bd486d0ad4140e5f8d6367a6a0604aa4a212a980b035b3087" Feb 9 19:20:06.054546 env[1644]: time="2024-02-09T19:20:06.054484820Z" level=info msg="CreateContainer within sandbox \"577a0c1b6bf9769d502287ab9ac03f0647533d49d7bcec1374b60bdb47295285\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Feb 9 19:20:06.078913 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3840447045.mount: Deactivated successfully. Feb 9 19:20:06.093615 env[1644]: time="2024-02-09T19:20:06.093555033Z" level=info msg="CreateContainer within sandbox \"577a0c1b6bf9769d502287ab9ac03f0647533d49d7bcec1374b60bdb47295285\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"3165b42e5eb70f07d37cd1351bc810104debcf5b638947f455a049c278f9b8af\"" Feb 9 19:20:06.094580 env[1644]: time="2024-02-09T19:20:06.094536442Z" level=info msg="StartContainer for \"3165b42e5eb70f07d37cd1351bc810104debcf5b638947f455a049c278f9b8af\"" Feb 9 19:20:06.135264 systemd[1]: Started cri-containerd-3165b42e5eb70f07d37cd1351bc810104debcf5b638947f455a049c278f9b8af.scope. Feb 9 19:20:06.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.185984 kernel: audit: type=1400 audit(1707506406.169:1646): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.186169 kernel: audit: type=1400 audit(1707506406.170:1647): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.186228 kernel: audit: type=1400 audit(1707506406.170:1648): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.201478 kernel: audit: type=1400 audit(1707506406.170:1649): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.210090 kernel: audit: type=1400 audit(1707506406.170:1650): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.218513 kernel: audit: type=1400 audit(1707506406.170:1651): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.218619 kernel: audit: type=1400 audit(1707506406.170:1652): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.233831 kernel: audit: type=1400 audit(1707506406.170:1653): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.176000 audit: BPF prog-id=204 op=LOAD Feb 9 19:20:06.178000 audit[5738]: AVC avc: denied { bpf } for pid=5738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.178000 audit[5738]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2407 pid=5738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:20:06.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331363562343265356562373066303764333763643133353162633831 Feb 9 19:20:06.178000 audit[5738]: AVC avc: denied { perfmon } for pid=5738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.178000 audit[5738]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2407 pid=5738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:20:06.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331363562343265356562373066303764333763643133353162633831 Feb 9 19:20:06.178000 audit[5738]: AVC avc: denied { bpf } for pid=5738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.178000 audit[5738]: AVC avc: denied { bpf } for pid=5738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.178000 audit[5738]: AVC avc: denied { bpf } for pid=5738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.178000 audit[5738]: AVC avc: denied { perfmon } for pid=5738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.178000 audit[5738]: AVC avc: denied { perfmon } for pid=5738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.178000 audit[5738]: AVC avc: denied { perfmon } for pid=5738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.178000 audit[5738]: AVC avc: denied { perfmon } for pid=5738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.178000 audit[5738]: AVC avc: denied { perfmon } for pid=5738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.178000 audit[5738]: AVC avc: denied { bpf } for pid=5738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.178000 audit[5738]: AVC avc: denied { bpf } for pid=5738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.178000 audit: BPF prog-id=205 op=LOAD Feb 9 19:20:06.178000 audit[5738]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2407 pid=5738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:20:06.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331363562343265356562373066303764333763643133353162633831 Feb 9 19:20:06.185000 audit[5738]: AVC avc: denied { bpf } for pid=5738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.185000 audit[5738]: AVC avc: denied { bpf } for pid=5738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.185000 audit[5738]: AVC avc: denied { perfmon } for pid=5738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.185000 audit[5738]: AVC avc: denied { perfmon } for pid=5738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.185000 audit[5738]: AVC avc: denied { perfmon } for pid=5738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.185000 audit[5738]: AVC avc: denied { perfmon } for pid=5738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.185000 audit[5738]: AVC avc: denied { perfmon } for pid=5738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.185000 audit[5738]: AVC avc: denied { bpf } for pid=5738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.185000 audit[5738]: AVC avc: denied { bpf } for pid=5738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.185000 audit: BPF prog-id=206 op=LOAD Feb 9 19:20:06.185000 audit[5738]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2407 pid=5738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:20:06.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331363562343265356562373066303764333763643133353162633831 Feb 9 19:20:06.196000 audit: BPF prog-id=206 op=UNLOAD Feb 9 19:20:06.196000 audit: BPF prog-id=205 op=UNLOAD Feb 9 19:20:06.196000 audit[5738]: AVC avc: denied { bpf } for pid=5738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.196000 audit[5738]: AVC avc: denied { bpf } for pid=5738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.196000 audit[5738]: AVC avc: denied { bpf } for pid=5738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.196000 audit[5738]: AVC avc: denied { perfmon } for pid=5738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.196000 audit[5738]: AVC avc: denied { perfmon } for pid=5738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.196000 audit[5738]: AVC avc: denied { perfmon } for pid=5738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.196000 audit[5738]: AVC avc: denied { perfmon } for pid=5738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.196000 audit[5738]: AVC avc: denied { perfmon } for pid=5738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.196000 audit[5738]: AVC avc: denied { bpf } for pid=5738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.196000 audit[5738]: AVC avc: denied { bpf } for pid=5738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:20:06.196000 audit: BPF prog-id=207 op=LOAD Feb 9 19:20:06.196000 audit[5738]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2407 pid=5738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:20:06.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331363562343265356562373066303764333763643133353162633831 Feb 9 19:20:06.278135 env[1644]: time="2024-02-09T19:20:06.275269720Z" level=info msg="StartContainer for \"3165b42e5eb70f07d37cd1351bc810104debcf5b638947f455a049c278f9b8af\" returns successfully" Feb 9 19:20:07.240000 audit[5254]: AVC avc: denied { watch } for pid=5254 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_19_00.2190330206/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c684 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c186,c684 tclass=file permissive=0 Feb 9 19:20:07.240000 audit[5254]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000f8c7c0 a2=fc6 a3=0 items=0 ppid=5144 pid=5254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c684 key=(null) Feb 9 19:20:07.240000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:20:08.975695 systemd[1]: run-containerd-runc-k8s.io-7924bca9f0b88a9decfb444b2a8f61610d25ea051241e9c6fa270fc336b6ee9b-runc.xm9DpH.mount: Deactivated successfully. Feb 9 19:20:12.645162 kubelet[2844]: E0209 19:20:12.645111 2844 controller.go:193] "Failed to update lease" err="Put \"https://172.31.31.30:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-31-30?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)"