Feb 12 20:22:20.056268 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Feb 12 20:22:20.056308 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Feb 12 18:07:00 -00 2024 Feb 12 20:22:20.056330 kernel: efi: EFI v2.70 by EDK II Feb 12 20:22:20.056345 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7ac1aa98 MEMRESERVE=0x71a8cf98 Feb 12 20:22:20.056359 kernel: ACPI: Early table checksum verification disabled Feb 12 20:22:20.056372 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Feb 12 20:22:20.056388 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Feb 12 20:22:20.056402 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Feb 12 20:22:20.056416 kernel: ACPI: DSDT 0x0000000078640000 00154F (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Feb 12 20:22:20.056429 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Feb 12 20:22:20.056448 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Feb 12 20:22:20.056462 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Feb 12 20:22:20.056475 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Feb 12 20:22:20.056490 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Feb 12 20:22:20.056506 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Feb 12 20:22:20.056525 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Feb 12 20:22:20.056540 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Feb 12 20:22:20.056554 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Feb 12 20:22:20.056568 kernel: printk: bootconsole [uart0] enabled Feb 12 20:22:20.056582 kernel: NUMA: Failed to initialise from firmware Feb 12 20:22:20.056597 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Feb 12 20:22:20.056612 kernel: NUMA: NODE_DATA [mem 0x4b5841900-0x4b5846fff] Feb 12 20:22:20.056626 kernel: Zone ranges: Feb 12 20:22:20.056641 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Feb 12 20:22:20.056655 kernel: DMA32 empty Feb 12 20:22:20.056669 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Feb 12 20:22:20.056687 kernel: Movable zone start for each node Feb 12 20:22:20.056702 kernel: Early memory node ranges Feb 12 20:22:20.056716 kernel: node 0: [mem 0x0000000040000000-0x00000000786effff] Feb 12 20:22:20.056731 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Feb 12 20:22:20.056745 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Feb 12 20:22:20.056759 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Feb 12 20:22:20.056774 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Feb 12 20:22:20.056788 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Feb 12 20:22:20.056803 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Feb 12 20:22:20.056817 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Feb 12 20:22:20.056831 kernel: psci: probing for conduit method from ACPI. Feb 12 20:22:20.056845 kernel: psci: PSCIv1.0 detected in firmware. Feb 12 20:22:20.056864 kernel: psci: Using standard PSCI v0.2 function IDs Feb 12 20:22:20.056879 kernel: psci: Trusted OS migration not required Feb 12 20:22:20.056899 kernel: psci: SMC Calling Convention v1.1 Feb 12 20:22:20.056915 kernel: ACPI: SRAT not present Feb 12 20:22:20.056961 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 12 20:22:20.056983 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 12 20:22:20.056999 kernel: pcpu-alloc: [0] 0 [0] 1 Feb 12 20:22:20.057015 kernel: Detected PIPT I-cache on CPU0 Feb 12 20:22:20.057030 kernel: CPU features: detected: GIC system register CPU interface Feb 12 20:22:20.057046 kernel: CPU features: detected: Spectre-v2 Feb 12 20:22:20.057061 kernel: CPU features: detected: Spectre-v3a Feb 12 20:22:20.057076 kernel: CPU features: detected: Spectre-BHB Feb 12 20:22:20.057091 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 12 20:22:20.057106 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 12 20:22:20.057121 kernel: CPU features: detected: ARM erratum 1742098 Feb 12 20:22:20.057137 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Feb 12 20:22:20.057155 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Feb 12 20:22:20.057171 kernel: Policy zone: Normal Feb 12 20:22:20.057188 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=0a07ee1673be713cb46dc1305004c8854c4690dc8835a87e3bc71aa6c6a62e40 Feb 12 20:22:20.057205 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 20:22:20.057220 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 12 20:22:20.057236 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 20:22:20.057251 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 20:22:20.057266 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Feb 12 20:22:20.057282 kernel: Memory: 3826316K/4030464K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 204148K reserved, 0K cma-reserved) Feb 12 20:22:20.057298 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 12 20:22:20.057317 kernel: trace event string verifier disabled Feb 12 20:22:20.057333 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 12 20:22:20.057348 kernel: rcu: RCU event tracing is enabled. Feb 12 20:22:20.057364 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 12 20:22:20.057380 kernel: Trampoline variant of Tasks RCU enabled. Feb 12 20:22:20.057395 kernel: Tracing variant of Tasks RCU enabled. Feb 12 20:22:20.057411 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 20:22:20.057426 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 12 20:22:20.057442 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 12 20:22:20.057457 kernel: GICv3: 96 SPIs implemented Feb 12 20:22:20.057471 kernel: GICv3: 0 Extended SPIs implemented Feb 12 20:22:20.057486 kernel: GICv3: Distributor has no Range Selector support Feb 12 20:22:20.057505 kernel: Root IRQ handler: gic_handle_irq Feb 12 20:22:20.057520 kernel: GICv3: 16 PPIs implemented Feb 12 20:22:20.057536 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Feb 12 20:22:20.057551 kernel: ACPI: SRAT not present Feb 12 20:22:20.057565 kernel: ITS [mem 0x10080000-0x1009ffff] Feb 12 20:22:20.057580 kernel: ITS@0x0000000010080000: allocated 8192 Devices @4000a0000 (indirect, esz 8, psz 64K, shr 1) Feb 12 20:22:20.057596 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000b0000 (flat, esz 8, psz 64K, shr 1) Feb 12 20:22:20.057611 kernel: GICv3: using LPI property table @0x00000004000c0000 Feb 12 20:22:20.057627 kernel: ITS: Using hypervisor restricted LPI range [128] Feb 12 20:22:20.057642 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Feb 12 20:22:20.057657 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Feb 12 20:22:20.057676 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Feb 12 20:22:20.057692 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Feb 12 20:22:20.057707 kernel: Console: colour dummy device 80x25 Feb 12 20:22:20.057723 kernel: printk: console [tty1] enabled Feb 12 20:22:20.057738 kernel: ACPI: Core revision 20210730 Feb 12 20:22:20.057754 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Feb 12 20:22:20.057770 kernel: pid_max: default: 32768 minimum: 301 Feb 12 20:22:20.057785 kernel: LSM: Security Framework initializing Feb 12 20:22:20.057801 kernel: SELinux: Initializing. Feb 12 20:22:20.057816 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 20:22:20.057836 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 20:22:20.057852 kernel: rcu: Hierarchical SRCU implementation. Feb 12 20:22:20.057867 kernel: Platform MSI: ITS@0x10080000 domain created Feb 12 20:22:20.057883 kernel: PCI/MSI: ITS@0x10080000 domain created Feb 12 20:22:20.057898 kernel: Remapping and enabling EFI services. Feb 12 20:22:20.057914 kernel: smp: Bringing up secondary CPUs ... Feb 12 20:22:20.060129 kernel: Detected PIPT I-cache on CPU1 Feb 12 20:22:20.060148 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Feb 12 20:22:20.060165 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Feb 12 20:22:20.060188 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Feb 12 20:22:20.060204 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 20:22:20.060220 kernel: SMP: Total of 2 processors activated. Feb 12 20:22:20.060237 kernel: CPU features: detected: 32-bit EL0 Support Feb 12 20:22:20.060253 kernel: CPU features: detected: 32-bit EL1 Support Feb 12 20:22:20.060269 kernel: CPU features: detected: CRC32 instructions Feb 12 20:22:20.060285 kernel: CPU: All CPU(s) started at EL1 Feb 12 20:22:20.060301 kernel: alternatives: patching kernel code Feb 12 20:22:20.060317 kernel: devtmpfs: initialized Feb 12 20:22:20.060337 kernel: KASLR disabled due to lack of seed Feb 12 20:22:20.060354 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 20:22:20.060371 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 12 20:22:20.060397 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 20:22:20.060418 kernel: SMBIOS 3.0.0 present. Feb 12 20:22:20.060434 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Feb 12 20:22:20.060451 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 20:22:20.060468 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 12 20:22:20.060484 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 12 20:22:20.060501 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 12 20:22:20.060518 kernel: audit: initializing netlink subsys (disabled) Feb 12 20:22:20.060535 kernel: audit: type=2000 audit(0.253:1): state=initialized audit_enabled=0 res=1 Feb 12 20:22:20.060556 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 20:22:20.060573 kernel: cpuidle: using governor menu Feb 12 20:22:20.060589 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 12 20:22:20.060606 kernel: ASID allocator initialised with 32768 entries Feb 12 20:22:20.060622 kernel: ACPI: bus type PCI registered Feb 12 20:22:20.060643 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 20:22:20.060659 kernel: Serial: AMBA PL011 UART driver Feb 12 20:22:20.060676 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 20:22:20.060692 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 12 20:22:20.060709 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 20:22:20.060725 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 12 20:22:20.060742 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 20:22:20.060758 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 12 20:22:20.060774 kernel: ACPI: Added _OSI(Module Device) Feb 12 20:22:20.060810 kernel: ACPI: Added _OSI(Processor Device) Feb 12 20:22:20.060831 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 20:22:20.060849 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 20:22:20.060866 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 20:22:20.060882 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 20:22:20.060898 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 20:22:20.060915 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 20:22:20.076013 kernel: ACPI: Interpreter enabled Feb 12 20:22:20.076033 kernel: ACPI: Using GIC for interrupt routing Feb 12 20:22:20.076059 kernel: ACPI: MCFG table detected, 1 entries Feb 12 20:22:20.076077 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Feb 12 20:22:20.076393 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 12 20:22:20.076604 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Feb 12 20:22:20.076801 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Feb 12 20:22:20.078055 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Feb 12 20:22:20.078258 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Feb 12 20:22:20.078303 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Feb 12 20:22:20.078321 kernel: acpiphp: Slot [1] registered Feb 12 20:22:20.078338 kernel: acpiphp: Slot [2] registered Feb 12 20:22:20.078355 kernel: acpiphp: Slot [3] registered Feb 12 20:22:20.078371 kernel: acpiphp: Slot [4] registered Feb 12 20:22:20.078387 kernel: acpiphp: Slot [5] registered Feb 12 20:22:20.078404 kernel: acpiphp: Slot [6] registered Feb 12 20:22:20.078420 kernel: acpiphp: Slot [7] registered Feb 12 20:22:20.078436 kernel: acpiphp: Slot [8] registered Feb 12 20:22:20.078455 kernel: acpiphp: Slot [9] registered Feb 12 20:22:20.078472 kernel: acpiphp: Slot [10] registered Feb 12 20:22:20.078488 kernel: acpiphp: Slot [11] registered Feb 12 20:22:20.078504 kernel: acpiphp: Slot [12] registered Feb 12 20:22:20.078520 kernel: acpiphp: Slot [13] registered Feb 12 20:22:20.078536 kernel: acpiphp: Slot [14] registered Feb 12 20:22:20.078552 kernel: acpiphp: Slot [15] registered Feb 12 20:22:20.078569 kernel: acpiphp: Slot [16] registered Feb 12 20:22:20.078585 kernel: acpiphp: Slot [17] registered Feb 12 20:22:20.078601 kernel: acpiphp: Slot [18] registered Feb 12 20:22:20.078621 kernel: acpiphp: Slot [19] registered Feb 12 20:22:20.078637 kernel: acpiphp: Slot [20] registered Feb 12 20:22:20.078653 kernel: acpiphp: Slot [21] registered Feb 12 20:22:20.078669 kernel: acpiphp: Slot [22] registered Feb 12 20:22:20.078685 kernel: acpiphp: Slot [23] registered Feb 12 20:22:20.078701 kernel: acpiphp: Slot [24] registered Feb 12 20:22:20.078717 kernel: acpiphp: Slot [25] registered Feb 12 20:22:20.078733 kernel: acpiphp: Slot [26] registered Feb 12 20:22:20.078749 kernel: acpiphp: Slot [27] registered Feb 12 20:22:20.078769 kernel: acpiphp: Slot [28] registered Feb 12 20:22:20.078785 kernel: acpiphp: Slot [29] registered Feb 12 20:22:20.078801 kernel: acpiphp: Slot [30] registered Feb 12 20:22:20.078817 kernel: acpiphp: Slot [31] registered Feb 12 20:22:20.078833 kernel: PCI host bridge to bus 0000:00 Feb 12 20:22:20.080094 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Feb 12 20:22:20.080291 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Feb 12 20:22:20.080476 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Feb 12 20:22:20.080666 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Feb 12 20:22:20.080891 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Feb 12 20:22:20.082189 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Feb 12 20:22:20.082424 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Feb 12 20:22:20.082641 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Feb 12 20:22:20.082842 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Feb 12 20:22:20.083083 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 12 20:22:20.083298 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Feb 12 20:22:20.083506 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Feb 12 20:22:20.083709 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Feb 12 20:22:20.083910 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Feb 12 20:22:20.086250 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 12 20:22:20.086477 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Feb 12 20:22:20.086686 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Feb 12 20:22:20.086887 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Feb 12 20:22:20.088172 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Feb 12 20:22:20.088389 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Feb 12 20:22:20.088574 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Feb 12 20:22:20.088753 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Feb 12 20:22:20.089999 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Feb 12 20:22:20.090050 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Feb 12 20:22:20.090069 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Feb 12 20:22:20.090087 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Feb 12 20:22:20.090104 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Feb 12 20:22:20.090120 kernel: iommu: Default domain type: Translated Feb 12 20:22:20.090137 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 12 20:22:20.090153 kernel: vgaarb: loaded Feb 12 20:22:20.090169 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 20:22:20.090186 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 20:22:20.090207 kernel: PTP clock support registered Feb 12 20:22:20.090223 kernel: Registered efivars operations Feb 12 20:22:20.090240 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 12 20:22:20.090256 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 20:22:20.090288 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 20:22:20.090309 kernel: pnp: PnP ACPI init Feb 12 20:22:20.090561 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Feb 12 20:22:20.090587 kernel: pnp: PnP ACPI: found 1 devices Feb 12 20:22:20.090605 kernel: NET: Registered PF_INET protocol family Feb 12 20:22:20.090627 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 12 20:22:20.090644 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 12 20:22:20.090661 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 20:22:20.090678 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 20:22:20.090694 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 12 20:22:20.090711 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 12 20:22:20.090727 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 20:22:20.090744 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 20:22:20.090760 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 20:22:20.090780 kernel: PCI: CLS 0 bytes, default 64 Feb 12 20:22:20.090797 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Feb 12 20:22:20.090813 kernel: kvm [1]: HYP mode not available Feb 12 20:22:20.090829 kernel: Initialise system trusted keyrings Feb 12 20:22:20.090846 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 12 20:22:20.090862 kernel: Key type asymmetric registered Feb 12 20:22:20.090879 kernel: Asymmetric key parser 'x509' registered Feb 12 20:22:20.090895 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 20:22:20.090911 kernel: io scheduler mq-deadline registered Feb 12 20:22:20.090968 kernel: io scheduler kyber registered Feb 12 20:22:20.090985 kernel: io scheduler bfq registered Feb 12 20:22:20.091207 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Feb 12 20:22:20.091234 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Feb 12 20:22:20.091251 kernel: ACPI: button: Power Button [PWRB] Feb 12 20:22:20.091268 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 20:22:20.091285 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Feb 12 20:22:20.091484 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Feb 12 20:22:20.091513 kernel: printk: console [ttyS0] disabled Feb 12 20:22:20.091531 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Feb 12 20:22:20.091547 kernel: printk: console [ttyS0] enabled Feb 12 20:22:20.091564 kernel: printk: bootconsole [uart0] disabled Feb 12 20:22:20.091580 kernel: thunder_xcv, ver 1.0 Feb 12 20:22:20.091597 kernel: thunder_bgx, ver 1.0 Feb 12 20:22:20.091613 kernel: nicpf, ver 1.0 Feb 12 20:22:20.091629 kernel: nicvf, ver 1.0 Feb 12 20:22:20.091840 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 12 20:22:20.099361 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-12T20:22:19 UTC (1707769339) Feb 12 20:22:20.099406 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 12 20:22:20.099424 kernel: NET: Registered PF_INET6 protocol family Feb 12 20:22:20.099441 kernel: Segment Routing with IPv6 Feb 12 20:22:20.099457 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 20:22:20.099473 kernel: NET: Registered PF_PACKET protocol family Feb 12 20:22:20.099490 kernel: Key type dns_resolver registered Feb 12 20:22:20.099507 kernel: registered taskstats version 1 Feb 12 20:22:20.099531 kernel: Loading compiled-in X.509 certificates Feb 12 20:22:20.099549 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: c8c3faa6fd8ae0112832fff0e3d0e58448a7eb6c' Feb 12 20:22:20.099566 kernel: Key type .fscrypt registered Feb 12 20:22:20.099582 kernel: Key type fscrypt-provisioning registered Feb 12 20:22:20.099598 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 20:22:20.099615 kernel: ima: Allocated hash algorithm: sha1 Feb 12 20:22:20.099631 kernel: ima: No architecture policies found Feb 12 20:22:20.099647 kernel: Freeing unused kernel memory: 34688K Feb 12 20:22:20.099664 kernel: Run /init as init process Feb 12 20:22:20.099684 kernel: with arguments: Feb 12 20:22:20.099701 kernel: /init Feb 12 20:22:20.099717 kernel: with environment: Feb 12 20:22:20.099732 kernel: HOME=/ Feb 12 20:22:20.099749 kernel: TERM=linux Feb 12 20:22:20.099765 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 20:22:20.099786 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 20:22:20.099807 systemd[1]: Detected virtualization amazon. Feb 12 20:22:20.099830 systemd[1]: Detected architecture arm64. Feb 12 20:22:20.099848 systemd[1]: Running in initrd. Feb 12 20:22:20.099865 systemd[1]: No hostname configured, using default hostname. Feb 12 20:22:20.099882 systemd[1]: Hostname set to . Feb 12 20:22:20.099901 systemd[1]: Initializing machine ID from VM UUID. Feb 12 20:22:20.099966 systemd[1]: Queued start job for default target initrd.target. Feb 12 20:22:20.099991 systemd[1]: Started systemd-ask-password-console.path. Feb 12 20:22:20.100009 systemd[1]: Reached target cryptsetup.target. Feb 12 20:22:20.100033 systemd[1]: Reached target paths.target. Feb 12 20:22:20.100051 systemd[1]: Reached target slices.target. Feb 12 20:22:20.100068 systemd[1]: Reached target swap.target. Feb 12 20:22:20.100086 systemd[1]: Reached target timers.target. Feb 12 20:22:20.100104 systemd[1]: Listening on iscsid.socket. Feb 12 20:22:20.100122 systemd[1]: Listening on iscsiuio.socket. Feb 12 20:22:20.100140 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 20:22:20.100158 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 20:22:20.100180 systemd[1]: Listening on systemd-journald.socket. Feb 12 20:22:20.100198 systemd[1]: Listening on systemd-networkd.socket. Feb 12 20:22:20.100215 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 20:22:20.100233 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 20:22:20.100251 systemd[1]: Reached target sockets.target. Feb 12 20:22:20.100268 systemd[1]: Starting kmod-static-nodes.service... Feb 12 20:22:20.100286 systemd[1]: Finished network-cleanup.service. Feb 12 20:22:20.100304 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 20:22:20.100322 systemd[1]: Starting systemd-journald.service... Feb 12 20:22:20.100344 systemd[1]: Starting systemd-modules-load.service... Feb 12 20:22:20.100362 systemd[1]: Starting systemd-resolved.service... Feb 12 20:22:20.100379 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 20:22:20.100397 systemd[1]: Finished kmod-static-nodes.service. Feb 12 20:22:20.100415 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 20:22:20.100433 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 20:22:20.100450 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 20:22:20.100468 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 20:22:20.100486 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 20:22:20.100508 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 20:22:20.100527 kernel: audit: type=1130 audit(1707769340.066:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:20.100545 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 20:22:20.100562 systemd[1]: Starting dracut-cmdline.service... Feb 12 20:22:20.100584 systemd-journald[309]: Journal started Feb 12 20:22:20.100676 systemd-journald[309]: Runtime Journal (/run/log/journal/ec2af99e6cdbb6bbee454fd509f2ad97) is 8.0M, max 75.4M, 67.4M free. Feb 12 20:22:20.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:20.016992 systemd-modules-load[310]: Inserted module 'overlay' Feb 12 20:22:20.113114 systemd[1]: Started systemd-journald.service. Feb 12 20:22:20.033736 systemd-resolved[311]: Positive Trust Anchors: Feb 12 20:22:20.033750 systemd-resolved[311]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 20:22:20.033803 systemd-resolved[311]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 20:22:20.180037 kernel: audit: type=1130 audit(1707769340.131:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:20.180078 kernel: Bridge firewalling registered Feb 12 20:22:20.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:20.142145 systemd-modules-load[310]: Inserted module 'br_netfilter' Feb 12 20:22:20.184679 dracut-cmdline[326]: dracut-dracut-053 Feb 12 20:22:20.184679 dracut-cmdline[326]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=t Feb 12 20:22:20.184679 dracut-cmdline[326]: tyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=0a07ee1673be713cb46dc1305004c8854c4690dc8835a87e3bc71aa6c6a62e40 Feb 12 20:22:20.223961 kernel: SCSI subsystem initialized Feb 12 20:22:20.239908 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 20:22:20.239986 kernel: device-mapper: uevent: version 1.0.3 Feb 12 20:22:20.245640 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 20:22:20.251710 systemd-modules-load[310]: Inserted module 'dm_multipath' Feb 12 20:22:20.256854 systemd[1]: Finished systemd-modules-load.service. Feb 12 20:22:20.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:20.272168 systemd[1]: Starting systemd-sysctl.service... Feb 12 20:22:20.281961 kernel: audit: type=1130 audit(1707769340.263:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:20.291548 systemd[1]: Finished systemd-sysctl.service. Feb 12 20:22:20.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:20.306948 kernel: audit: type=1130 audit(1707769340.289:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:20.382965 kernel: Loading iSCSI transport class v2.0-870. Feb 12 20:22:20.396963 kernel: iscsi: registered transport (tcp) Feb 12 20:22:20.421868 kernel: iscsi: registered transport (qla4xxx) Feb 12 20:22:20.421969 kernel: QLogic iSCSI HBA Driver Feb 12 20:22:20.581857 systemd-resolved[311]: Defaulting to hostname 'linux'. Feb 12 20:22:20.586290 kernel: random: crng init done Feb 12 20:22:20.588376 systemd[1]: Started systemd-resolved.service. Feb 12 20:22:20.592254 systemd[1]: Reached target nss-lookup.target. Feb 12 20:22:20.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:20.610999 kernel: audit: type=1130 audit(1707769340.590:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:20.621702 systemd[1]: Finished dracut-cmdline.service. Feb 12 20:22:20.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:20.628248 systemd[1]: Starting dracut-pre-udev.service... Feb 12 20:22:20.636839 kernel: audit: type=1130 audit(1707769340.624:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:20.697000 kernel: raid6: neonx8 gen() 6392 MB/s Feb 12 20:22:20.714977 kernel: raid6: neonx8 xor() 4508 MB/s Feb 12 20:22:20.732977 kernel: raid6: neonx4 gen() 6572 MB/s Feb 12 20:22:20.750974 kernel: raid6: neonx4 xor() 4608 MB/s Feb 12 20:22:20.768976 kernel: raid6: neonx2 gen() 5772 MB/s Feb 12 20:22:20.786975 kernel: raid6: neonx2 xor() 4301 MB/s Feb 12 20:22:20.804976 kernel: raid6: neonx1 gen() 4473 MB/s Feb 12 20:22:20.822972 kernel: raid6: neonx1 xor() 3535 MB/s Feb 12 20:22:20.840976 kernel: raid6: int64x8 gen() 3413 MB/s Feb 12 20:22:20.858974 kernel: raid6: int64x8 xor() 2036 MB/s Feb 12 20:22:20.876972 kernel: raid6: int64x4 gen() 3774 MB/s Feb 12 20:22:20.894969 kernel: raid6: int64x4 xor() 2156 MB/s Feb 12 20:22:20.912967 kernel: raid6: int64x2 gen() 3610 MB/s Feb 12 20:22:20.930962 kernel: raid6: int64x2 xor() 1923 MB/s Feb 12 20:22:20.948957 kernel: raid6: int64x1 gen() 2762 MB/s Feb 12 20:22:20.968558 kernel: raid6: int64x1 xor() 1410 MB/s Feb 12 20:22:20.968588 kernel: raid6: using algorithm neonx4 gen() 6572 MB/s Feb 12 20:22:20.968612 kernel: raid6: .... xor() 4608 MB/s, rmw enabled Feb 12 20:22:20.970377 kernel: raid6: using neon recovery algorithm Feb 12 20:22:20.988959 kernel: xor: measuring software checksum speed Feb 12 20:22:20.991956 kernel: 8regs : 9399 MB/sec Feb 12 20:22:20.993954 kernel: 32regs : 11167 MB/sec Feb 12 20:22:20.998444 kernel: arm64_neon : 9524 MB/sec Feb 12 20:22:20.998491 kernel: xor: using function: 32regs (11167 MB/sec) Feb 12 20:22:21.091983 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 12 20:22:21.109447 systemd[1]: Finished dracut-pre-udev.service. Feb 12 20:22:21.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:21.116339 systemd[1]: Starting systemd-udevd.service... Feb 12 20:22:21.129053 kernel: audit: type=1130 audit(1707769341.109:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:21.129092 kernel: audit: type=1334 audit(1707769341.113:9): prog-id=7 op=LOAD Feb 12 20:22:21.129116 kernel: audit: type=1334 audit(1707769341.113:10): prog-id=8 op=LOAD Feb 12 20:22:21.113000 audit: BPF prog-id=7 op=LOAD Feb 12 20:22:21.113000 audit: BPF prog-id=8 op=LOAD Feb 12 20:22:21.159471 systemd-udevd[507]: Using default interface naming scheme 'v252'. Feb 12 20:22:21.171068 systemd[1]: Started systemd-udevd.service. Feb 12 20:22:21.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:21.184831 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 20:22:21.221029 dracut-pre-trigger[519]: rd.md=0: removing MD RAID activation Feb 12 20:22:21.295592 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 20:22:21.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:21.303092 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 20:22:21.409455 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 20:22:21.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:21.545128 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Feb 12 20:22:21.545198 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Feb 12 20:22:21.554630 kernel: ena 0000:00:05.0: ENA device version: 0.10 Feb 12 20:22:21.554948 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Feb 12 20:22:21.563957 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:1a:08:d6:6a:ad Feb 12 20:22:21.578318 (udev-worker)[557]: Network interface NamePolicy= disabled on kernel command line. Feb 12 20:22:21.598665 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Feb 12 20:22:21.598737 kernel: nvme nvme0: pci function 0000:00:04.0 Feb 12 20:22:21.609975 kernel: nvme nvme0: 2/0/0 default/read/poll queues Feb 12 20:22:21.616742 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 12 20:22:21.616831 kernel: GPT:9289727 != 16777215 Feb 12 20:22:21.616871 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 12 20:22:21.619030 kernel: GPT:9289727 != 16777215 Feb 12 20:22:21.620354 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 20:22:21.622324 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 12 20:22:21.700956 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (561) Feb 12 20:22:21.733160 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 20:22:21.812868 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 20:22:21.827435 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 20:22:21.832389 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 20:22:21.868010 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 20:22:21.876248 systemd[1]: Starting disk-uuid.service... Feb 12 20:22:21.889905 disk-uuid[660]: Primary Header is updated. Feb 12 20:22:21.889905 disk-uuid[660]: Secondary Entries is updated. Feb 12 20:22:21.889905 disk-uuid[660]: Secondary Header is updated. Feb 12 20:22:21.901000 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 12 20:22:21.910974 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 12 20:22:22.919026 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 12 20:22:22.919116 disk-uuid[661]: The operation has completed successfully. Feb 12 20:22:23.104135 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 20:22:23.107230 systemd[1]: Finished disk-uuid.service. Feb 12 20:22:23.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:23.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:23.124165 systemd[1]: Starting verity-setup.service... Feb 12 20:22:23.161916 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 12 20:22:23.251363 systemd[1]: Found device dev-mapper-usr.device. Feb 12 20:22:23.255976 systemd[1]: Finished verity-setup.service. Feb 12 20:22:23.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:23.262822 systemd[1]: Mounting sysusr-usr.mount... Feb 12 20:22:23.352991 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 20:22:23.354481 systemd[1]: Mounted sysusr-usr.mount. Feb 12 20:22:23.355504 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 20:22:23.357803 systemd[1]: Starting ignition-setup.service... Feb 12 20:22:23.378401 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 20:22:23.401066 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Feb 12 20:22:23.401150 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 12 20:22:23.403663 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 12 20:22:23.414957 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 12 20:22:23.437087 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 20:22:23.472971 systemd[1]: Finished ignition-setup.service. Feb 12 20:22:23.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:23.478454 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 20:22:23.569971 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 20:22:23.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:23.573000 audit: BPF prog-id=9 op=LOAD Feb 12 20:22:23.576712 systemd[1]: Starting systemd-networkd.service... Feb 12 20:22:23.630354 systemd-networkd[1089]: lo: Link UP Feb 12 20:22:23.630384 systemd-networkd[1089]: lo: Gained carrier Feb 12 20:22:23.635180 systemd-networkd[1089]: Enumeration completed Feb 12 20:22:23.635751 systemd-networkd[1089]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 20:22:23.639670 systemd[1]: Started systemd-networkd.service. Feb 12 20:22:23.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:23.646834 systemd[1]: Reached target network.target. Feb 12 20:22:23.652480 systemd[1]: Starting iscsiuio.service... Feb 12 20:22:23.666069 systemd[1]: Started iscsiuio.service. Feb 12 20:22:23.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:23.667128 systemd-networkd[1089]: eth0: Link UP Feb 12 20:22:23.667138 systemd-networkd[1089]: eth0: Gained carrier Feb 12 20:22:23.685638 systemd[1]: Starting iscsid.service... Feb 12 20:22:23.697264 systemd-networkd[1089]: eth0: DHCPv4 address 172.31.19.54/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 12 20:22:23.704733 iscsid[1094]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 20:22:23.704733 iscsid[1094]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 20:22:23.704733 iscsid[1094]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 20:22:23.704733 iscsid[1094]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 20:22:23.704733 iscsid[1094]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 20:22:23.704733 iscsid[1094]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 20:22:23.736205 systemd[1]: Started iscsid.service. Feb 12 20:22:23.757215 kernel: kauditd_printk_skb: 11 callbacks suppressed Feb 12 20:22:23.757257 kernel: audit: type=1130 audit(1707769343.734:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:23.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:23.753143 systemd[1]: Starting dracut-initqueue.service... Feb 12 20:22:23.777047 systemd[1]: Finished dracut-initqueue.service. Feb 12 20:22:23.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:23.781205 systemd[1]: Reached target remote-fs-pre.target. Feb 12 20:22:23.802104 kernel: audit: type=1130 audit(1707769343.779:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:23.790554 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 20:22:23.792810 systemd[1]: Reached target remote-fs.target. Feb 12 20:22:23.796457 systemd[1]: Starting dracut-pre-mount.service... Feb 12 20:22:23.818654 systemd[1]: Finished dracut-pre-mount.service. Feb 12 20:22:23.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:23.830985 kernel: audit: type=1130 audit(1707769343.821:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:24.090976 ignition[1029]: Ignition 2.14.0 Feb 12 20:22:24.092961 ignition[1029]: Stage: fetch-offline Feb 12 20:22:24.095016 ignition[1029]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:22:24.098112 ignition[1029]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 20:22:24.112637 ignition[1029]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 20:22:24.113628 ignition[1029]: Ignition finished successfully Feb 12 20:22:24.118731 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 20:22:24.132753 kernel: audit: type=1130 audit(1707769344.119:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:24.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:24.122712 systemd[1]: Starting ignition-fetch.service... Feb 12 20:22:24.141540 ignition[1113]: Ignition 2.14.0 Feb 12 20:22:24.143510 ignition[1113]: Stage: fetch Feb 12 20:22:24.145502 ignition[1113]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:22:24.148424 ignition[1113]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 20:22:24.161881 ignition[1113]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 20:22:24.164539 ignition[1113]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 20:22:24.178960 ignition[1113]: INFO : PUT result: OK Feb 12 20:22:24.182340 ignition[1113]: DEBUG : parsed url from cmdline: "" Feb 12 20:22:24.184754 ignition[1113]: INFO : no config URL provided Feb 12 20:22:24.184754 ignition[1113]: INFO : reading system config file "/usr/lib/ignition/user.ign" Feb 12 20:22:24.184754 ignition[1113]: INFO : no config at "/usr/lib/ignition/user.ign" Feb 12 20:22:24.184754 ignition[1113]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 20:22:24.195308 ignition[1113]: INFO : PUT result: OK Feb 12 20:22:24.197373 ignition[1113]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Feb 12 20:22:24.200803 ignition[1113]: INFO : GET result: OK Feb 12 20:22:24.202932 ignition[1113]: DEBUG : parsing config with SHA512: 13f9e8f82ac82f338122f290d2ed5aa521a8e2107b0a3bde7cc284b9126d58fcb947db30153ee4e4fad7c2f23aaee3ce616ce47e50e118488779871561641975 Feb 12 20:22:24.275011 unknown[1113]: fetched base config from "system" Feb 12 20:22:24.275269 unknown[1113]: fetched base config from "system" Feb 12 20:22:24.276691 ignition[1113]: fetch: fetch complete Feb 12 20:22:24.275285 unknown[1113]: fetched user config from "aws" Feb 12 20:22:24.276704 ignition[1113]: fetch: fetch passed Feb 12 20:22:24.276792 ignition[1113]: Ignition finished successfully Feb 12 20:22:24.289101 systemd[1]: Finished ignition-fetch.service. Feb 12 20:22:24.303222 kernel: audit: type=1130 audit(1707769344.287:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:24.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:24.290691 systemd[1]: Starting ignition-kargs.service... Feb 12 20:22:24.321184 ignition[1119]: Ignition 2.14.0 Feb 12 20:22:24.323720 ignition[1119]: Stage: kargs Feb 12 20:22:24.325738 ignition[1119]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:22:24.328851 ignition[1119]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 20:22:24.339851 ignition[1119]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 20:22:24.342755 ignition[1119]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 20:22:24.346750 ignition[1119]: INFO : PUT result: OK Feb 12 20:22:24.361867 ignition[1119]: kargs: kargs passed Feb 12 20:22:24.362448 ignition[1119]: Ignition finished successfully Feb 12 20:22:24.367605 systemd[1]: Finished ignition-kargs.service. Feb 12 20:22:24.380105 kernel: audit: type=1130 audit(1707769344.368:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:24.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:24.375811 systemd[1]: Starting ignition-disks.service... Feb 12 20:22:24.396462 ignition[1125]: Ignition 2.14.0 Feb 12 20:22:24.396504 ignition[1125]: Stage: disks Feb 12 20:22:24.396861 ignition[1125]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:22:24.396955 ignition[1125]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 20:22:24.415750 ignition[1125]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 20:22:24.419200 ignition[1125]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 20:22:24.423593 ignition[1125]: INFO : PUT result: OK Feb 12 20:22:24.429996 ignition[1125]: disks: disks passed Feb 12 20:22:24.430135 ignition[1125]: Ignition finished successfully Feb 12 20:22:24.435154 systemd[1]: Finished ignition-disks.service. Feb 12 20:22:24.448494 kernel: audit: type=1130 audit(1707769344.436:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:24.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:24.439150 systemd[1]: Reached target initrd-root-device.target. Feb 12 20:22:24.448532 systemd[1]: Reached target local-fs-pre.target. Feb 12 20:22:24.450811 systemd[1]: Reached target local-fs.target. Feb 12 20:22:24.455038 systemd[1]: Reached target sysinit.target. Feb 12 20:22:24.457163 systemd[1]: Reached target basic.target. Feb 12 20:22:24.460731 systemd[1]: Starting systemd-fsck-root.service... Feb 12 20:22:24.505504 systemd-fsck[1133]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 12 20:22:24.514542 systemd[1]: Finished systemd-fsck-root.service. Feb 12 20:22:24.528176 kernel: audit: type=1130 audit(1707769344.515:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:24.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:24.518321 systemd[1]: Mounting sysroot.mount... Feb 12 20:22:24.545324 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 20:22:24.545169 systemd[1]: Mounted sysroot.mount. Feb 12 20:22:24.547882 systemd[1]: Reached target initrd-root-fs.target. Feb 12 20:22:24.563290 systemd[1]: Mounting sysroot-usr.mount... Feb 12 20:22:24.569476 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 12 20:22:24.569564 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 20:22:24.569626 systemd[1]: Reached target ignition-diskful.target. Feb 12 20:22:24.590529 systemd[1]: Mounted sysroot-usr.mount. Feb 12 20:22:24.605453 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 20:22:24.611541 systemd[1]: Starting initrd-setup-root.service... Feb 12 20:22:24.624636 initrd-setup-root[1155]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 20:22:24.637988 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1150) Feb 12 20:22:24.643695 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Feb 12 20:22:24.643766 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 12 20:22:24.643802 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 12 20:22:24.649786 initrd-setup-root[1179]: cut: /sysroot/etc/group: No such file or directory Feb 12 20:22:24.658967 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 12 20:22:24.664491 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 20:22:24.671448 initrd-setup-root[1189]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 20:22:24.680617 initrd-setup-root[1197]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 20:22:24.871147 systemd[1]: Finished initrd-setup-root.service. Feb 12 20:22:24.891269 kernel: audit: type=1130 audit(1707769344.872:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:24.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:24.876314 systemd[1]: Starting ignition-mount.service... Feb 12 20:22:24.895170 systemd[1]: Starting sysroot-boot.service... Feb 12 20:22:24.907728 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 12 20:22:24.907970 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 12 20:22:24.939638 ignition[1217]: INFO : Ignition 2.14.0 Feb 12 20:22:24.941894 ignition[1217]: INFO : Stage: mount Feb 12 20:22:24.943656 ignition[1217]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:22:24.943656 ignition[1217]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 20:22:24.975492 systemd[1]: Finished sysroot-boot.service. Feb 12 20:22:24.977481 ignition[1217]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 20:22:24.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:24.990964 kernel: audit: type=1130 audit(1707769344.980:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:24.991302 ignition[1217]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 20:22:24.995686 ignition[1217]: INFO : PUT result: OK Feb 12 20:22:25.003806 ignition[1217]: INFO : mount: mount passed Feb 12 20:22:25.006401 ignition[1217]: INFO : Ignition finished successfully Feb 12 20:22:25.011303 systemd[1]: Finished ignition-mount.service. Feb 12 20:22:25.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:25.015479 systemd[1]: Starting ignition-files.service... Feb 12 20:22:25.031724 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 20:22:25.052251 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1226) Feb 12 20:22:25.058126 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Feb 12 20:22:25.058281 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 12 20:22:25.058335 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 12 20:22:25.066980 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 12 20:22:25.072173 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 20:22:25.097444 ignition[1245]: INFO : Ignition 2.14.0 Feb 12 20:22:25.097444 ignition[1245]: INFO : Stage: files Feb 12 20:22:25.101436 ignition[1245]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:22:25.101436 ignition[1245]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 20:22:25.121792 ignition[1245]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 20:22:25.125253 ignition[1245]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 20:22:25.128872 ignition[1245]: INFO : PUT result: OK Feb 12 20:22:25.134568 ignition[1245]: DEBUG : files: compiled without relabeling support, skipping Feb 12 20:22:25.140367 ignition[1245]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 20:22:25.140367 ignition[1245]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 20:22:25.185680 ignition[1245]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 20:22:25.189158 ignition[1245]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 20:22:25.195431 unknown[1245]: wrote ssh authorized keys file for user: core Feb 12 20:22:25.199961 ignition[1245]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 20:22:25.199961 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 12 20:22:25.199961 ignition[1245]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Feb 12 20:22:25.632250 systemd-networkd[1089]: eth0: Gained IPv6LL Feb 12 20:22:25.662418 ignition[1245]: INFO : GET result: OK Feb 12 20:22:26.361592 ignition[1245]: DEBUG : file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Feb 12 20:22:26.368071 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 12 20:22:26.368071 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 12 20:22:26.368071 ignition[1245]: INFO : GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Feb 12 20:22:26.408946 ignition[1245]: INFO : GET result: OK Feb 12 20:22:26.505059 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 12 20:22:26.510046 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 12 20:22:26.510046 ignition[1245]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Feb 12 20:22:26.959602 ignition[1245]: INFO : GET result: OK Feb 12 20:22:27.240915 ignition[1245]: DEBUG : file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Feb 12 20:22:27.246779 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 12 20:22:27.260473 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Feb 12 20:22:27.264788 ignition[1245]: INFO : GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubectl: attempt #1 Feb 12 20:22:27.396559 ignition[1245]: INFO : GET result: OK Feb 12 20:22:28.058200 ignition[1245]: DEBUG : file matches expected sum of: 14be61ec35669a27acf2df0380afb85b9b42311d50ca1165718421c5f605df1119ec9ae314696a674051712e80deeaa65e62d2d62ed4d107fe99d0aaf419dafc Feb 12 20:22:28.063973 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 12 20:22:28.063973 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 12 20:22:28.072682 ignition[1245]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 20:22:28.088082 ignition[1245]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2639293240" Feb 12 20:22:28.095351 ignition[1245]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2639293240": device or resource busy Feb 12 20:22:28.095351 ignition[1245]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2639293240", trying btrfs: device or resource busy Feb 12 20:22:28.095351 ignition[1245]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2639293240" Feb 12 20:22:28.106910 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1247) Feb 12 20:22:28.108122 ignition[1245]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2639293240" Feb 12 20:22:28.134868 ignition[1245]: INFO : op(3): [started] unmounting "/mnt/oem2639293240" Feb 12 20:22:28.137695 ignition[1245]: INFO : op(3): [finished] unmounting "/mnt/oem2639293240" Feb 12 20:22:28.139947 systemd[1]: mnt-oem2639293240.mount: Deactivated successfully. Feb 12 20:22:28.144390 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 12 20:22:28.148471 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 20:22:28.148471 ignition[1245]: INFO : GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubeadm: attempt #1 Feb 12 20:22:28.214020 ignition[1245]: INFO : GET result: OK Feb 12 20:22:28.766193 ignition[1245]: DEBUG : file matches expected sum of: 45b3100984c979ba0f1c0df8f4211474c2d75ebe916e677dff5fc8e3b3697cf7a953da94e356f39684cc860dff6878b772b7514c55651c2f866d9efeef23f970 Feb 12 20:22:28.772499 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 20:22:28.772499 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 20:22:28.772499 ignition[1245]: INFO : GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubelet: attempt #1 Feb 12 20:22:28.833321 ignition[1245]: INFO : GET result: OK Feb 12 20:22:30.173177 ignition[1245]: DEBUG : file matches expected sum of: 71857ff499ae135fa478e1827a0ed8865e578a8d2b1e25876e914fd0beba03733801c0654bcd4c0567bafeb16887dafb2dbbe8d1116e6ea28dcd8366c142d348 Feb 12 20:22:30.179588 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 20:22:30.179588 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 20:22:30.179588 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 20:22:30.179588 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" Feb 12 20:22:30.179588 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 20:22:30.179588 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 12 20:22:30.179588 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 12 20:22:30.179588 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 20:22:30.179588 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 20:22:30.179588 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 20:22:30.179588 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 20:22:30.179588 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 20:22:30.179588 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 20:22:30.179588 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 20:22:30.179588 ignition[1245]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 20:22:30.255678 ignition[1245]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2830590011" Feb 12 20:22:30.258704 ignition[1245]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2830590011": device or resource busy Feb 12 20:22:30.258704 ignition[1245]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2830590011", trying btrfs: device or resource busy Feb 12 20:22:30.258704 ignition[1245]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2830590011" Feb 12 20:22:30.270957 ignition[1245]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2830590011" Feb 12 20:22:30.270957 ignition[1245]: INFO : op(6): [started] unmounting "/mnt/oem2830590011" Feb 12 20:22:30.270957 ignition[1245]: INFO : op(6): [finished] unmounting "/mnt/oem2830590011" Feb 12 20:22:30.270957 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 20:22:30.270957 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 12 20:22:30.270957 ignition[1245]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 20:22:30.278319 systemd[1]: mnt-oem2830590011.mount: Deactivated successfully. Feb 12 20:22:30.306362 ignition[1245]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3254602830" Feb 12 20:22:30.309725 ignition[1245]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3254602830": device or resource busy Feb 12 20:22:30.309725 ignition[1245]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3254602830", trying btrfs: device or resource busy Feb 12 20:22:30.309725 ignition[1245]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3254602830" Feb 12 20:22:30.337033 ignition[1245]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3254602830" Feb 12 20:22:30.337033 ignition[1245]: INFO : op(9): [started] unmounting "/mnt/oem3254602830" Feb 12 20:22:30.337033 ignition[1245]: INFO : op(9): [finished] unmounting "/mnt/oem3254602830" Feb 12 20:22:30.337033 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 12 20:22:30.337033 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 12 20:22:30.337033 ignition[1245]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 12 20:22:30.348831 systemd[1]: mnt-oem3254602830.mount: Deactivated successfully. Feb 12 20:22:30.376162 ignition[1245]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1351547701" Feb 12 20:22:30.379354 ignition[1245]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1351547701": device or resource busy Feb 12 20:22:30.379354 ignition[1245]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1351547701", trying btrfs: device or resource busy Feb 12 20:22:30.379354 ignition[1245]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1351547701" Feb 12 20:22:30.379354 ignition[1245]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1351547701" Feb 12 20:22:30.399897 ignition[1245]: INFO : op(c): [started] unmounting "/mnt/oem1351547701" Feb 12 20:22:30.399897 ignition[1245]: INFO : op(c): [finished] unmounting "/mnt/oem1351547701" Feb 12 20:22:30.399897 ignition[1245]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 12 20:22:30.399897 ignition[1245]: INFO : files: op(13): [started] processing unit "amazon-ssm-agent.service" Feb 12 20:22:30.399897 ignition[1245]: INFO : files: op(13): op(14): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 12 20:22:30.399897 ignition[1245]: INFO : files: op(13): op(14): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 12 20:22:30.399897 ignition[1245]: INFO : files: op(13): [finished] processing unit "amazon-ssm-agent.service" Feb 12 20:22:30.399897 ignition[1245]: INFO : files: op(15): [started] processing unit "nvidia.service" Feb 12 20:22:30.399897 ignition[1245]: INFO : files: op(15): [finished] processing unit "nvidia.service" Feb 12 20:22:30.399897 ignition[1245]: INFO : files: op(16): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 12 20:22:30.399897 ignition[1245]: INFO : files: op(16): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 12 20:22:30.399897 ignition[1245]: INFO : files: op(17): [started] processing unit "prepare-cni-plugins.service" Feb 12 20:22:30.399897 ignition[1245]: INFO : files: op(17): op(18): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 20:22:30.399897 ignition[1245]: INFO : files: op(17): op(18): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 20:22:30.399897 ignition[1245]: INFO : files: op(17): [finished] processing unit "prepare-cni-plugins.service" Feb 12 20:22:30.399897 ignition[1245]: INFO : files: op(19): [started] processing unit "prepare-critools.service" Feb 12 20:22:30.399897 ignition[1245]: INFO : files: op(19): op(1a): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 20:22:30.399897 ignition[1245]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 20:22:30.399897 ignition[1245]: INFO : files: op(19): [finished] processing unit "prepare-critools.service" Feb 12 20:22:30.399897 ignition[1245]: INFO : files: op(1b): [started] processing unit "prepare-helm.service" Feb 12 20:22:30.475030 ignition[1245]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 20:22:30.475030 ignition[1245]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 20:22:30.475030 ignition[1245]: INFO : files: op(1b): [finished] processing unit "prepare-helm.service" Feb 12 20:22:30.475030 ignition[1245]: INFO : files: op(1d): [started] setting preset to enabled for "amazon-ssm-agent.service" Feb 12 20:22:30.475030 ignition[1245]: INFO : files: op(1d): [finished] setting preset to enabled for "amazon-ssm-agent.service" Feb 12 20:22:30.475030 ignition[1245]: INFO : files: op(1e): [started] setting preset to enabled for "nvidia.service" Feb 12 20:22:30.475030 ignition[1245]: INFO : files: op(1e): [finished] setting preset to enabled for "nvidia.service" Feb 12 20:22:30.475030 ignition[1245]: INFO : files: op(1f): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 20:22:30.475030 ignition[1245]: INFO : files: op(1f): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 20:22:30.475030 ignition[1245]: INFO : files: op(20): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 20:22:30.475030 ignition[1245]: INFO : files: op(20): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 20:22:30.475030 ignition[1245]: INFO : files: op(21): [started] setting preset to enabled for "prepare-critools.service" Feb 12 20:22:30.475030 ignition[1245]: INFO : files: op(21): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 20:22:30.475030 ignition[1245]: INFO : files: op(22): [started] setting preset to enabled for "prepare-helm.service" Feb 12 20:22:30.475030 ignition[1245]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-helm.service" Feb 12 20:22:30.534840 ignition[1245]: INFO : files: createResultFile: createFiles: op(23): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 20:22:30.539462 ignition[1245]: INFO : files: createResultFile: createFiles: op(23): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 20:22:30.543834 ignition[1245]: INFO : files: files passed Feb 12 20:22:30.545955 ignition[1245]: INFO : Ignition finished successfully Feb 12 20:22:30.550184 systemd[1]: Finished ignition-files.service. Feb 12 20:22:30.569341 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:22:30.569379 kernel: audit: type=1130 audit(1707769350.548:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.572405 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 20:22:30.579264 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 20:22:30.587439 systemd[1]: Starting ignition-quench.service... Feb 12 20:22:30.594295 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 20:22:30.596706 systemd[1]: Finished ignition-quench.service. Feb 12 20:22:30.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.618984 initrd-setup-root-after-ignition[1270]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 20:22:30.623535 kernel: audit: type=1130 audit(1707769350.603:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.623573 kernel: audit: type=1131 audit(1707769350.603:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.623902 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 20:22:30.628886 systemd[1]: Reached target ignition-complete.target. Feb 12 20:22:30.640508 kernel: audit: type=1130 audit(1707769350.627:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.641884 systemd[1]: Starting initrd-parse-etc.service... Feb 12 20:22:30.670764 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 20:22:30.673191 systemd[1]: Finished initrd-parse-etc.service. Feb 12 20:22:30.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.677289 systemd[1]: Reached target initrd-fs.target. Feb 12 20:22:30.707979 kernel: audit: type=1130 audit(1707769350.675:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.708025 kernel: audit: type=1131 audit(1707769350.675:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.694860 systemd[1]: Reached target initrd.target. Feb 12 20:22:30.696777 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 20:22:30.698304 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 20:22:30.724406 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 20:22:30.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.737054 systemd[1]: Starting initrd-cleanup.service... Feb 12 20:22:30.745976 kernel: audit: type=1130 audit(1707769350.722:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.756295 systemd[1]: Stopped target nss-lookup.target. Feb 12 20:22:30.760287 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 20:22:30.779155 kernel: audit: type=1131 audit(1707769350.767:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.764735 systemd[1]: Stopped target timers.target. Feb 12 20:22:30.766858 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 20:22:30.767191 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 20:22:30.777205 systemd[1]: Stopped target initrd.target. Feb 12 20:22:30.779618 systemd[1]: Stopped target basic.target. Feb 12 20:22:30.790863 systemd[1]: Stopped target ignition-complete.target. Feb 12 20:22:30.795544 systemd[1]: Stopped target ignition-diskful.target. Feb 12 20:22:30.800178 systemd[1]: Stopped target initrd-root-device.target. Feb 12 20:22:30.804833 systemd[1]: Stopped target remote-fs.target. Feb 12 20:22:30.809048 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 20:22:30.813534 systemd[1]: Stopped target sysinit.target. Feb 12 20:22:30.817671 systemd[1]: Stopped target local-fs.target. Feb 12 20:22:30.821766 systemd[1]: Stopped target local-fs-pre.target. Feb 12 20:22:30.826176 systemd[1]: Stopped target swap.target. Feb 12 20:22:30.829976 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 20:22:30.830430 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 20:22:30.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.844317 systemd[1]: Stopped target cryptsetup.target. Feb 12 20:22:30.846262 kernel: audit: type=1131 audit(1707769350.834:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.849020 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 20:22:30.852217 systemd[1]: Stopped dracut-initqueue.service. Feb 12 20:22:30.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.857155 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 20:22:30.857405 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 20:22:30.867268 kernel: audit: type=1131 audit(1707769350.854:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.873438 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 20:22:30.876610 systemd[1]: Stopped ignition-files.service. Feb 12 20:22:30.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.884870 systemd[1]: Stopping ignition-mount.service... Feb 12 20:22:30.900182 ignition[1283]: INFO : Ignition 2.14.0 Feb 12 20:22:30.900182 ignition[1283]: INFO : Stage: umount Feb 12 20:22:30.900182 ignition[1283]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:22:30.900182 ignition[1283]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 12 20:22:30.921710 systemd[1]: Stopping sysroot-boot.service... Feb 12 20:22:30.928271 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 20:22:30.929302 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 20:22:30.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.935664 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 20:22:30.936732 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 20:22:30.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.950530 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 20:22:30.950946 systemd[1]: Finished initrd-cleanup.service. Feb 12 20:22:30.955537 ignition[1283]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 12 20:22:30.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.962959 ignition[1283]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 12 20:22:30.966601 ignition[1283]: INFO : PUT result: OK Feb 12 20:22:30.972598 ignition[1283]: INFO : umount: umount passed Feb 12 20:22:30.974617 ignition[1283]: INFO : Ignition finished successfully Feb 12 20:22:30.977453 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 20:22:30.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.977650 systemd[1]: Stopped ignition-mount.service. Feb 12 20:22:30.980298 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 20:22:30.980397 systemd[1]: Stopped ignition-disks.service. Feb 12 20:22:30.983519 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 20:22:30.983624 systemd[1]: Stopped ignition-kargs.service. Feb 12 20:22:30.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.998087 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 12 20:22:30.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:30.998184 systemd[1]: Stopped ignition-fetch.service. Feb 12 20:22:31.000287 systemd[1]: Stopped target network.target. Feb 12 20:22:31.008237 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 20:22:31.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:31.008356 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 20:22:31.010852 systemd[1]: Stopped target paths.target. Feb 12 20:22:31.012827 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 20:22:31.013017 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 20:22:31.026977 systemd[1]: Stopped target slices.target. Feb 12 20:22:31.028912 systemd[1]: Stopped target sockets.target. Feb 12 20:22:31.031077 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 20:22:31.031139 systemd[1]: Closed iscsid.socket. Feb 12 20:22:31.033068 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 20:22:31.033125 systemd[1]: Closed iscsiuio.socket. Feb 12 20:22:31.037290 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 20:22:31.037392 systemd[1]: Stopped ignition-setup.service. Feb 12 20:22:31.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:31.056325 systemd[1]: Stopping systemd-networkd.service... Feb 12 20:22:31.058451 systemd[1]: Stopping systemd-resolved.service... Feb 12 20:22:31.070101 systemd-networkd[1089]: eth0: DHCPv6 lease lost Feb 12 20:22:31.080321 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 20:22:31.083242 systemd[1]: Stopped systemd-networkd.service. Feb 12 20:22:31.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:31.089025 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 20:22:31.093000 audit: BPF prog-id=9 op=UNLOAD Feb 12 20:22:31.089113 systemd[1]: Closed systemd-networkd.socket. Feb 12 20:22:31.092676 systemd[1]: Stopping network-cleanup.service... Feb 12 20:22:31.101966 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 20:22:31.109375 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 20:22:31.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:31.114211 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 20:22:31.117021 systemd[1]: Stopped systemd-sysctl.service. Feb 12 20:22:31.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:31.121483 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 20:22:31.124552 systemd[1]: Stopped systemd-modules-load.service. Feb 12 20:22:31.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:31.129695 systemd[1]: Stopping systemd-udevd.service... Feb 12 20:22:31.134370 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 20:22:31.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:31.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:31.134584 systemd[1]: Stopped systemd-resolved.service. Feb 12 20:22:31.137595 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 20:22:31.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:31.152000 audit: BPF prog-id=6 op=UNLOAD Feb 12 20:22:31.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:31.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:31.137991 systemd[1]: Stopped sysroot-boot.service. Feb 12 20:22:31.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:31.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:31.170000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:31.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:31.141754 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 20:22:31.141903 systemd[1]: Stopped initrd-setup-root.service. Feb 12 20:22:31.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:31.152347 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 20:22:31.152694 systemd[1]: Stopped systemd-udevd.service. Feb 12 20:22:31.155862 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 20:22:31.156083 systemd[1]: Stopped network-cleanup.service. Feb 12 20:22:31.158476 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 20:22:31.160097 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 20:22:31.162784 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 20:22:31.162860 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 20:22:31.165274 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 20:22:31.165372 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 20:22:31.167722 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 20:22:31.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:31.167812 systemd[1]: Stopped dracut-cmdline.service. Feb 12 20:22:31.170216 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 20:22:31.170307 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 20:22:31.173804 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 20:22:31.181074 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 12 20:22:31.181225 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 12 20:22:31.186480 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 20:22:31.187865 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 20:22:31.191505 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 20:22:31.191607 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 20:22:31.245321 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 20:22:31.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:31.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:31.245520 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 20:22:31.247789 systemd[1]: Reached target initrd-switch-root.target. Feb 12 20:22:31.258358 systemd[1]: Starting initrd-switch-root.service... Feb 12 20:22:31.272295 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 20:22:31.272659 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 20:22:31.272790 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 12 20:22:31.294792 systemd[1]: Switching root. Feb 12 20:22:31.326016 iscsid[1094]: iscsid shutting down. Feb 12 20:22:31.327965 systemd-journald[309]: Received SIGTERM from PID 1 (systemd). Feb 12 20:22:31.328072 systemd-journald[309]: Journal stopped Feb 12 20:22:36.583394 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 20:22:36.583526 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 20:22:36.583571 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 20:22:36.583612 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 20:22:36.583652 kernel: SELinux: policy capability open_perms=1 Feb 12 20:22:36.583683 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 20:22:36.583714 kernel: SELinux: policy capability always_check_network=0 Feb 12 20:22:36.583753 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 20:22:36.583796 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 20:22:36.583826 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 20:22:36.583854 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 20:22:36.583889 systemd[1]: Successfully loaded SELinux policy in 108.372ms. Feb 12 20:22:36.589083 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 20.349ms. Feb 12 20:22:36.589152 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 20:22:36.589196 systemd[1]: Detected virtualization amazon. Feb 12 20:22:36.589292 systemd[1]: Detected architecture arm64. Feb 12 20:22:36.589329 systemd[1]: Detected first boot. Feb 12 20:22:36.589363 systemd[1]: Initializing machine ID from VM UUID. Feb 12 20:22:36.589396 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 20:22:36.589432 systemd[1]: Populated /etc with preset unit settings. Feb 12 20:22:36.589466 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:22:36.589502 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:22:36.589558 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:22:36.589609 kernel: kauditd_printk_skb: 47 callbacks suppressed Feb 12 20:22:36.589649 kernel: audit: type=1334 audit(1707769356.117:83): prog-id=12 op=LOAD Feb 12 20:22:36.589680 kernel: audit: type=1334 audit(1707769356.117:84): prog-id=3 op=UNLOAD Feb 12 20:22:36.589710 kernel: audit: type=1334 audit(1707769356.117:85): prog-id=13 op=LOAD Feb 12 20:22:36.589749 kernel: audit: type=1334 audit(1707769356.117:86): prog-id=14 op=LOAD Feb 12 20:22:36.589777 kernel: audit: type=1334 audit(1707769356.117:87): prog-id=4 op=UNLOAD Feb 12 20:22:36.589808 kernel: audit: type=1334 audit(1707769356.117:88): prog-id=5 op=UNLOAD Feb 12 20:22:36.589837 kernel: audit: type=1334 audit(1707769356.125:89): prog-id=15 op=LOAD Feb 12 20:22:36.589871 kernel: audit: type=1334 audit(1707769356.125:90): prog-id=12 op=UNLOAD Feb 12 20:22:36.589900 kernel: audit: type=1334 audit(1707769356.127:91): prog-id=16 op=LOAD Feb 12 20:22:36.593011 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 20:22:36.593070 kernel: audit: type=1334 audit(1707769356.129:92): prog-id=17 op=LOAD Feb 12 20:22:36.593104 systemd[1]: Stopped iscsiuio.service. Feb 12 20:22:36.593179 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 20:22:36.593218 systemd[1]: Stopped iscsid.service. Feb 12 20:22:36.593252 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 20:22:36.593285 systemd[1]: Stopped initrd-switch-root.service. Feb 12 20:22:36.593323 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 20:22:36.593357 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 20:22:36.593390 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 20:22:36.593423 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 12 20:22:36.593454 systemd[1]: Created slice system-getty.slice. Feb 12 20:22:36.593484 systemd[1]: Created slice system-modprobe.slice. Feb 12 20:22:36.593533 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 20:22:36.593575 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 20:22:36.593606 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 20:22:36.593636 systemd[1]: Created slice user.slice. Feb 12 20:22:36.593669 systemd[1]: Started systemd-ask-password-console.path. Feb 12 20:22:36.593700 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 20:22:36.593735 systemd[1]: Set up automount boot.automount. Feb 12 20:22:36.593767 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 20:22:36.593798 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 20:22:36.593830 systemd[1]: Stopped target initrd-fs.target. Feb 12 20:22:36.593865 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 20:22:36.593895 systemd[1]: Reached target integritysetup.target. Feb 12 20:22:36.593965 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 20:22:36.594001 systemd[1]: Reached target remote-fs.target. Feb 12 20:22:36.594032 systemd[1]: Reached target slices.target. Feb 12 20:22:36.594061 systemd[1]: Reached target swap.target. Feb 12 20:22:36.594091 systemd[1]: Reached target torcx.target. Feb 12 20:22:36.594121 systemd[1]: Reached target veritysetup.target. Feb 12 20:22:36.594151 systemd[1]: Listening on systemd-coredump.socket. Feb 12 20:22:36.594185 systemd[1]: Listening on systemd-initctl.socket. Feb 12 20:22:36.594217 systemd[1]: Listening on systemd-networkd.socket. Feb 12 20:22:36.594248 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 20:22:36.594278 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 20:22:36.594307 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 20:22:36.594339 systemd[1]: Mounting dev-hugepages.mount... Feb 12 20:22:36.594374 systemd[1]: Mounting dev-mqueue.mount... Feb 12 20:22:36.594406 systemd[1]: Mounting media.mount... Feb 12 20:22:36.594439 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 20:22:36.594471 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 20:22:36.594506 systemd[1]: Mounting tmp.mount... Feb 12 20:22:36.594541 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 20:22:36.594573 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 20:22:36.594605 systemd[1]: Starting kmod-static-nodes.service... Feb 12 20:22:36.594635 systemd[1]: Starting modprobe@configfs.service... Feb 12 20:22:36.594665 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 20:22:36.594698 systemd[1]: Starting modprobe@drm.service... Feb 12 20:22:36.594728 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 20:22:36.594765 systemd[1]: Starting modprobe@fuse.service... Feb 12 20:22:36.594800 systemd[1]: Starting modprobe@loop.service... Feb 12 20:22:36.594834 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 20:22:36.594866 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 20:22:36.594896 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 20:22:36.594950 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 20:22:36.594987 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 20:22:36.595018 systemd[1]: Stopped systemd-journald.service. Feb 12 20:22:36.595048 systemd[1]: Starting systemd-journald.service... Feb 12 20:22:36.595080 systemd[1]: Starting systemd-modules-load.service... Feb 12 20:22:36.595116 systemd[1]: Starting systemd-network-generator.service... Feb 12 20:22:36.595149 systemd[1]: Starting systemd-remount-fs.service... Feb 12 20:22:36.595182 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 20:22:36.595215 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 20:22:36.595246 systemd[1]: Stopped verity-setup.service. Feb 12 20:22:36.595276 systemd[1]: Mounted dev-hugepages.mount. Feb 12 20:22:36.595305 systemd[1]: Mounted dev-mqueue.mount. Feb 12 20:22:36.595335 systemd[1]: Mounted media.mount. Feb 12 20:22:36.595364 kernel: fuse: init (API version 7.34) Feb 12 20:22:36.595398 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 20:22:36.595431 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 20:22:36.595467 systemd[1]: Mounted tmp.mount. Feb 12 20:22:36.595500 systemd[1]: Finished kmod-static-nodes.service. Feb 12 20:22:36.595545 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 20:22:36.599156 systemd[1]: Finished modprobe@configfs.service. Feb 12 20:22:36.599214 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 20:22:36.599246 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 20:22:36.599280 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 20:22:36.599312 systemd[1]: Finished modprobe@drm.service. Feb 12 20:22:36.599351 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 20:22:36.599383 kernel: loop: module loaded Feb 12 20:22:36.599414 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 20:22:36.599447 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 20:22:36.599479 systemd[1]: Finished modprobe@fuse.service. Feb 12 20:22:36.599510 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 20:22:36.599540 systemd[1]: Finished modprobe@loop.service. Feb 12 20:22:36.599579 systemd-journald[1399]: Journal started Feb 12 20:22:36.599689 systemd-journald[1399]: Runtime Journal (/run/log/journal/ec2af99e6cdbb6bbee454fd509f2ad97) is 8.0M, max 75.4M, 67.4M free. Feb 12 20:22:31.880000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 20:22:32.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 20:22:32.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 20:22:32.034000 audit: BPF prog-id=10 op=LOAD Feb 12 20:22:32.034000 audit: BPF prog-id=10 op=UNLOAD Feb 12 20:22:32.034000 audit: BPF prog-id=11 op=LOAD Feb 12 20:22:32.034000 audit: BPF prog-id=11 op=UNLOAD Feb 12 20:22:32.200000 audit[1316]: AVC avc: denied { associate } for pid=1316 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 20:22:32.200000 audit[1316]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458ac a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1299 pid=1316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:32.200000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 20:22:32.205000 audit[1316]: AVC avc: denied { associate } for pid=1316 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 20:22:32.205000 audit[1316]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145985 a2=1ed a3=0 items=2 ppid=1299 pid=1316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:32.205000 audit: CWD cwd="/" Feb 12 20:22:32.205000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:22:32.205000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:22:32.205000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 20:22:36.117000 audit: BPF prog-id=12 op=LOAD Feb 12 20:22:36.117000 audit: BPF prog-id=3 op=UNLOAD Feb 12 20:22:36.117000 audit: BPF prog-id=13 op=LOAD Feb 12 20:22:36.117000 audit: BPF prog-id=14 op=LOAD Feb 12 20:22:36.606587 systemd[1]: Started systemd-journald.service. Feb 12 20:22:36.117000 audit: BPF prog-id=4 op=UNLOAD Feb 12 20:22:36.117000 audit: BPF prog-id=5 op=UNLOAD Feb 12 20:22:36.125000 audit: BPF prog-id=15 op=LOAD Feb 12 20:22:36.125000 audit: BPF prog-id=12 op=UNLOAD Feb 12 20:22:36.127000 audit: BPF prog-id=16 op=LOAD Feb 12 20:22:36.129000 audit: BPF prog-id=17 op=LOAD Feb 12 20:22:36.129000 audit: BPF prog-id=13 op=UNLOAD Feb 12 20:22:36.129000 audit: BPF prog-id=14 op=UNLOAD Feb 12 20:22:36.134000 audit: BPF prog-id=18 op=LOAD Feb 12 20:22:36.134000 audit: BPF prog-id=15 op=UNLOAD Feb 12 20:22:36.137000 audit: BPF prog-id=19 op=LOAD Feb 12 20:22:36.140000 audit: BPF prog-id=20 op=LOAD Feb 12 20:22:36.140000 audit: BPF prog-id=16 op=UNLOAD Feb 12 20:22:36.140000 audit: BPF prog-id=17 op=UNLOAD Feb 12 20:22:36.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.151000 audit: BPF prog-id=18 op=UNLOAD Feb 12 20:22:36.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.447000 audit: BPF prog-id=21 op=LOAD Feb 12 20:22:36.447000 audit: BPF prog-id=22 op=LOAD Feb 12 20:22:36.448000 audit: BPF prog-id=23 op=LOAD Feb 12 20:22:36.448000 audit: BPF prog-id=19 op=UNLOAD Feb 12 20:22:36.448000 audit: BPF prog-id=20 op=UNLOAD Feb 12 20:22:36.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.579000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 20:22:36.579000 audit[1399]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffdfa377a0 a2=4000 a3=1 items=0 ppid=1 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:36.579000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 20:22:36.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.588000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:32.198986 /usr/lib/systemd/system-generators/torcx-generator[1316]: time="2024-02-12T20:22:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:22:36.115441 systemd[1]: Queued start job for default target multi-user.target. Feb 12 20:22:36.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:32.199720 /usr/lib/systemd/system-generators/torcx-generator[1316]: time="2024-02-12T20:22:32Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 20:22:36.142104 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 20:22:32.199772 /usr/lib/systemd/system-generators/torcx-generator[1316]: time="2024-02-12T20:22:32Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 20:22:36.607528 systemd[1]: Finished systemd-modules-load.service. Feb 12 20:22:32.199840 /usr/lib/systemd/system-generators/torcx-generator[1316]: time="2024-02-12T20:22:32Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 20:22:36.613429 systemd[1]: Finished systemd-network-generator.service. Feb 12 20:22:36.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:32.199866 /usr/lib/systemd/system-generators/torcx-generator[1316]: time="2024-02-12T20:22:32Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 20:22:36.616799 systemd[1]: Finished systemd-remount-fs.service. Feb 12 20:22:32.199966 /usr/lib/systemd/system-generators/torcx-generator[1316]: time="2024-02-12T20:22:32Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 20:22:36.620129 systemd[1]: Reached target network-pre.target. Feb 12 20:22:32.199999 /usr/lib/systemd/system-generators/torcx-generator[1316]: time="2024-02-12T20:22:32Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 20:22:32.200403 /usr/lib/systemd/system-generators/torcx-generator[1316]: time="2024-02-12T20:22:32Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 20:22:32.200484 /usr/lib/systemd/system-generators/torcx-generator[1316]: time="2024-02-12T20:22:32Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 20:22:32.200520 /usr/lib/systemd/system-generators/torcx-generator[1316]: time="2024-02-12T20:22:32Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 20:22:32.201495 /usr/lib/systemd/system-generators/torcx-generator[1316]: time="2024-02-12T20:22:32Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 20:22:32.201582 /usr/lib/systemd/system-generators/torcx-generator[1316]: time="2024-02-12T20:22:32Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 20:22:32.201629 /usr/lib/systemd/system-generators/torcx-generator[1316]: time="2024-02-12T20:22:32Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 20:22:32.201669 /usr/lib/systemd/system-generators/torcx-generator[1316]: time="2024-02-12T20:22:32Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 20:22:36.626646 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 20:22:32.201715 /usr/lib/systemd/system-generators/torcx-generator[1316]: time="2024-02-12T20:22:32Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 20:22:32.201753 /usr/lib/systemd/system-generators/torcx-generator[1316]: time="2024-02-12T20:22:32Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 20:22:35.219776 /usr/lib/systemd/system-generators/torcx-generator[1316]: time="2024-02-12T20:22:35Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:22:35.220376 /usr/lib/systemd/system-generators/torcx-generator[1316]: time="2024-02-12T20:22:35Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:22:35.220639 /usr/lib/systemd/system-generators/torcx-generator[1316]: time="2024-02-12T20:22:35Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:22:35.221129 /usr/lib/systemd/system-generators/torcx-generator[1316]: time="2024-02-12T20:22:35Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:22:35.221237 /usr/lib/systemd/system-generators/torcx-generator[1316]: time="2024-02-12T20:22:35Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 20:22:35.221384 /usr/lib/systemd/system-generators/torcx-generator[1316]: time="2024-02-12T20:22:35Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 20:22:36.639724 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 20:22:36.642174 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 20:22:36.646039 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 20:22:36.651213 systemd[1]: Starting systemd-journal-flush.service... Feb 12 20:22:36.654335 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 20:22:36.657215 systemd[1]: Starting systemd-random-seed.service... Feb 12 20:22:36.659954 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 20:22:36.662581 systemd[1]: Starting systemd-sysctl.service... Feb 12 20:22:36.671655 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 20:22:36.676462 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 20:22:36.699432 systemd-journald[1399]: Time spent on flushing to /var/log/journal/ec2af99e6cdbb6bbee454fd509f2ad97 is 55.725ms for 1179 entries. Feb 12 20:22:36.699432 systemd-journald[1399]: System Journal (/var/log/journal/ec2af99e6cdbb6bbee454fd509f2ad97) is 8.0M, max 195.6M, 187.6M free. Feb 12 20:22:36.769730 systemd-journald[1399]: Received client request to flush runtime journal. Feb 12 20:22:36.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.719212 systemd[1]: Finished systemd-random-seed.service. Feb 12 20:22:36.724167 systemd[1]: Reached target first-boot-complete.target. Feb 12 20:22:36.752053 systemd[1]: Finished systemd-sysctl.service. Feb 12 20:22:36.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.772416 systemd[1]: Finished systemd-journal-flush.service. Feb 12 20:22:36.787384 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 20:22:36.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.795320 systemd[1]: Starting systemd-sysusers.service... Feb 12 20:22:36.874202 systemd[1]: Finished systemd-sysusers.service. Feb 12 20:22:36.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.881999 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 20:22:36.905395 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 20:22:36.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:36.912749 systemd[1]: Starting systemd-udev-settle.service... Feb 12 20:22:36.933269 udevadm[1437]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 12 20:22:36.959542 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 20:22:36.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:37.769563 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 20:22:37.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:37.774000 audit: BPF prog-id=24 op=LOAD Feb 12 20:22:37.774000 audit: BPF prog-id=25 op=LOAD Feb 12 20:22:37.774000 audit: BPF prog-id=7 op=UNLOAD Feb 12 20:22:37.774000 audit: BPF prog-id=8 op=UNLOAD Feb 12 20:22:37.776668 systemd[1]: Starting systemd-udevd.service... Feb 12 20:22:37.816557 systemd-udevd[1438]: Using default interface naming scheme 'v252'. Feb 12 20:22:37.876154 systemd[1]: Started systemd-udevd.service. Feb 12 20:22:37.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:37.892000 audit: BPF prog-id=26 op=LOAD Feb 12 20:22:37.894524 systemd[1]: Starting systemd-networkd.service... Feb 12 20:22:37.905000 audit: BPF prog-id=27 op=LOAD Feb 12 20:22:37.905000 audit: BPF prog-id=28 op=LOAD Feb 12 20:22:37.905000 audit: BPF prog-id=29 op=LOAD Feb 12 20:22:37.908125 systemd[1]: Starting systemd-userdbd.service... Feb 12 20:22:37.973732 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 20:22:37.985440 (udev-worker)[1439]: Network interface NamePolicy= disabled on kernel command line. Feb 12 20:22:38.003054 systemd[1]: Started systemd-userdbd.service. Feb 12 20:22:38.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:38.133085 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1440) Feb 12 20:22:38.158499 systemd-networkd[1451]: lo: Link UP Feb 12 20:22:38.158535 systemd-networkd[1451]: lo: Gained carrier Feb 12 20:22:38.160258 systemd-networkd[1451]: Enumeration completed Feb 12 20:22:38.160441 systemd[1]: Started systemd-networkd.service. Feb 12 20:22:38.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:38.167123 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 20:22:38.171953 systemd-networkd[1451]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 20:22:38.180198 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:22:38.181766 systemd-networkd[1451]: eth0: Link UP Feb 12 20:22:38.182093 systemd-networkd[1451]: eth0: Gained carrier Feb 12 20:22:38.193199 systemd-networkd[1451]: eth0: DHCPv4 address 172.31.19.54/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 12 20:22:38.365689 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 20:22:38.369136 systemd[1]: Finished systemd-udev-settle.service. Feb 12 20:22:38.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:38.385871 systemd[1]: Starting lvm2-activation-early.service... Feb 12 20:22:38.409993 lvm[1558]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 20:22:38.447646 systemd[1]: Finished lvm2-activation-early.service. Feb 12 20:22:38.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:38.450517 systemd[1]: Reached target cryptsetup.target. Feb 12 20:22:38.465573 systemd[1]: Starting lvm2-activation.service... Feb 12 20:22:38.473908 lvm[1559]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 20:22:38.512685 systemd[1]: Finished lvm2-activation.service. Feb 12 20:22:38.515397 systemd[1]: Reached target local-fs-pre.target. Feb 12 20:22:38.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:38.518251 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 20:22:38.518293 systemd[1]: Reached target local-fs.target. Feb 12 20:22:38.520532 systemd[1]: Reached target machines.target. Feb 12 20:22:38.524403 systemd[1]: Starting ldconfig.service... Feb 12 20:22:38.526569 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 20:22:38.526703 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 20:22:38.529223 systemd[1]: Starting systemd-boot-update.service... Feb 12 20:22:38.536467 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 20:22:38.544508 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 20:22:38.551248 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 20:22:38.551338 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 20:22:38.553863 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 20:22:38.569510 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1561 (bootctl) Feb 12 20:22:38.571897 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 20:22:38.597725 systemd-tmpfiles[1564]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 20:22:38.599361 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 20:22:38.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:38.606234 systemd-tmpfiles[1564]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 20:22:38.609422 systemd-tmpfiles[1564]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 20:22:38.682866 systemd-fsck[1570]: fsck.fat 4.2 (2021-01-31) Feb 12 20:22:38.682866 systemd-fsck[1570]: /dev/nvme0n1p1: 236 files, 113719/258078 clusters Feb 12 20:22:38.687095 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 20:22:38.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:38.694596 systemd[1]: Mounting boot.mount... Feb 12 20:22:38.722149 systemd[1]: Mounted boot.mount. Feb 12 20:22:38.746437 systemd[1]: Finished systemd-boot-update.service. Feb 12 20:22:38.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:38.940005 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 20:22:38.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:38.945312 systemd[1]: Starting audit-rules.service... Feb 12 20:22:38.951560 systemd[1]: Starting clean-ca-certificates.service... Feb 12 20:22:38.957820 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 20:22:38.962000 audit: BPF prog-id=30 op=LOAD Feb 12 20:22:38.965327 systemd[1]: Starting systemd-resolved.service... Feb 12 20:22:38.969000 audit: BPF prog-id=31 op=LOAD Feb 12 20:22:38.972179 systemd[1]: Starting systemd-timesyncd.service... Feb 12 20:22:38.978020 systemd[1]: Starting systemd-update-utmp.service... Feb 12 20:22:39.000000 audit[1590]: SYSTEM_BOOT pid=1590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 20:22:39.006987 systemd[1]: Finished systemd-update-utmp.service. Feb 12 20:22:39.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:39.015455 systemd[1]: Finished clean-ca-certificates.service. Feb 12 20:22:39.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:39.019777 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 20:22:39.049689 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 20:22:39.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:39.135000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 20:22:39.135000 audit[1604]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc04fe4d0 a2=420 a3=0 items=0 ppid=1584 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:39.135000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 20:22:39.137086 augenrules[1604]: No rules Feb 12 20:22:39.138397 systemd[1]: Finished audit-rules.service. Feb 12 20:22:39.185688 systemd[1]: Started systemd-timesyncd.service. Feb 12 20:22:39.189136 systemd[1]: Reached target time-set.target. Feb 12 20:22:39.192258 systemd-resolved[1588]: Positive Trust Anchors: Feb 12 20:22:39.192307 systemd-resolved[1588]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 20:22:39.192361 systemd-resolved[1588]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 20:22:39.213534 systemd-resolved[1588]: Defaulting to hostname 'linux'. Feb 12 20:22:39.221337 systemd[1]: Started systemd-resolved.service. Feb 12 20:22:39.223731 systemd[1]: Reached target network.target. Feb 12 20:22:39.225841 systemd[1]: Reached target nss-lookup.target. Feb 12 20:22:39.274745 ldconfig[1560]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 20:22:38.833907 systemd-resolved[1588]: Clock change detected. Flushing caches. Feb 12 20:22:39.423923 systemd-journald[1399]: Time jumped backwards, rotating. Feb 12 20:22:38.834179 systemd-timesyncd[1589]: Contacted time server 5.161.111.190:123 (0.flatcar.pool.ntp.org). Feb 12 20:22:38.834413 systemd-timesyncd[1589]: Initial clock synchronization to Mon 2024-02-12 20:22:38.833816 UTC. Feb 12 20:22:38.849967 systemd[1]: Finished ldconfig.service. Feb 12 20:22:38.854883 systemd[1]: Starting systemd-update-done.service... Feb 12 20:22:38.870820 systemd[1]: Finished systemd-update-done.service. Feb 12 20:22:39.426042 jq[1617]: false Feb 12 20:22:38.873709 systemd[1]: Reached target sysinit.target. Feb 12 20:22:38.876475 systemd[1]: Started motdgen.path. Feb 12 20:22:38.878263 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 20:22:39.428467 extend-filesystems[1618]: Found nvme0n1 Feb 12 20:22:39.428467 extend-filesystems[1618]: Found nvme0n1p1 Feb 12 20:22:39.428467 extend-filesystems[1618]: Found nvme0n1p2 Feb 12 20:22:39.428467 extend-filesystems[1618]: Found nvme0n1p3 Feb 12 20:22:39.428467 extend-filesystems[1618]: Found usr Feb 12 20:22:39.428467 extend-filesystems[1618]: Found nvme0n1p4 Feb 12 20:22:39.428467 extend-filesystems[1618]: Found nvme0n1p6 Feb 12 20:22:39.428467 extend-filesystems[1618]: Found nvme0n1p7 Feb 12 20:22:39.428467 extend-filesystems[1618]: Found nvme0n1p9 Feb 12 20:22:39.428467 extend-filesystems[1618]: Checking size of /dev/nvme0n1p9 Feb 12 20:22:39.428467 extend-filesystems[1618]: Resized partition /dev/nvme0n1p9 Feb 12 20:22:38.881412 systemd[1]: Started logrotate.timer. Feb 12 20:22:39.490554 extend-filesystems[1687]: resize2fs 1.46.5 (30-Dec-2021) Feb 12 20:22:38.883548 systemd[1]: Started mdadm.timer. Feb 12 20:22:38.885326 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 20:22:38.887518 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 20:22:38.887565 systemd[1]: Reached target paths.target. Feb 12 20:22:38.889447 systemd[1]: Reached target timers.target. Feb 12 20:22:38.891844 systemd[1]: Listening on dbus.socket. Feb 12 20:22:39.502235 jq[1631]: true Feb 12 20:22:38.895416 systemd[1]: Starting docker.socket... Feb 12 20:22:38.902599 systemd[1]: Listening on sshd.socket. Feb 12 20:22:39.503060 tar[1634]: ./ Feb 12 20:22:39.503060 tar[1634]: ./loopback Feb 12 20:22:38.906233 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 20:22:39.537114 tar[1635]: crictl Feb 12 20:22:39.559217 tar[1634]: ./bandwidth Feb 12 20:22:39.530348 dbus-daemon[1616]: [system] SELinux support is enabled Feb 12 20:22:38.907203 systemd[1]: Listening on docker.socket. Feb 12 20:22:39.563254 tar[1637]: linux-arm64/helm Feb 12 20:22:38.909513 systemd[1]: Reached target sockets.target. Feb 12 20:22:39.563972 env[1651]: time="2024-02-12T20:22:39.490567583Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 20:22:38.911789 systemd[1]: Reached target basic.target. Feb 12 20:22:39.568770 jq[1654]: true Feb 12 20:22:38.913714 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 20:22:39.569455 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Feb 12 20:22:38.913764 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 20:22:39.594718 update_engine[1630]: I0212 20:22:39.570042 1630 main.cc:92] Flatcar Update Engine starting Feb 12 20:22:39.594718 update_engine[1630]: I0212 20:22:39.585494 1630 update_check_scheduler.cc:74] Next update check in 7m45s Feb 12 20:22:39.571466 dbus-daemon[1616]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.3' (uid=244 pid=1451 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Feb 12 20:22:38.927038 systemd[1]: Starting containerd.service... Feb 12 20:22:38.932003 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 12 20:22:38.936795 systemd[1]: Starting dbus.service... Feb 12 20:22:38.940580 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 20:22:38.944932 systemd[1]: Starting extend-filesystems.service... Feb 12 20:22:38.947072 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 20:22:38.950403 systemd[1]: Starting motdgen.service... Feb 12 20:22:38.954429 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 20:22:38.958711 systemd[1]: Starting prepare-critools.service... Feb 12 20:22:38.963455 systemd[1]: Starting prepare-helm.service... Feb 12 20:22:38.967918 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 20:22:38.973904 systemd[1]: Starting sshd-keygen.service... Feb 12 20:22:38.981896 systemd[1]: Starting systemd-logind.service... Feb 12 20:22:38.984033 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 20:22:38.984170 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 20:22:38.985719 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 20:22:38.987971 systemd[1]: Starting update-engine.service... Feb 12 20:22:38.992394 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 20:22:39.021135 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 20:22:39.021588 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 20:22:39.049540 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 20:22:39.049891 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 20:22:39.093072 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 20:22:39.093475 systemd[1]: Finished motdgen.service. Feb 12 20:22:39.123474 systemd-networkd[1451]: eth0: Gained IPv6LL Feb 12 20:22:39.127857 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 20:22:39.132444 systemd[1]: Reached target network-online.target. Feb 12 20:22:39.138436 systemd[1]: Started amazon-ssm-agent.service. Feb 12 20:22:39.145077 systemd[1]: Started nvidia.service. Feb 12 20:22:39.264756 systemd-logind[1628]: Watching system buttons on /dev/input/event0 (Power Button) Feb 12 20:22:39.278185 systemd-logind[1628]: New seat seat0. Feb 12 20:22:39.530701 systemd[1]: Started dbus.service. Feb 12 20:22:39.537327 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 20:22:39.537372 systemd[1]: Reached target system-config.target. Feb 12 20:22:39.541642 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 20:22:39.541682 systemd[1]: Reached target user-config.target. Feb 12 20:22:39.571951 systemd[1]: Started systemd-logind.service. Feb 12 20:22:39.599931 systemd[1]: Starting systemd-hostnamed.service... Feb 12 20:22:39.603955 systemd[1]: Started update-engine.service. Feb 12 20:22:39.611203 systemd[1]: Started locksmithd.service. Feb 12 20:22:39.658184 amazon-ssm-agent[1667]: 2024/02/12 20:22:39 Failed to load instance info from vault. RegistrationKey does not exist. Feb 12 20:22:39.660303 amazon-ssm-agent[1667]: Initializing new seelog logger Feb 12 20:22:39.661310 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Feb 12 20:22:39.663243 amazon-ssm-agent[1667]: New Seelog Logger Creation Complete Feb 12 20:22:39.686797 bash[1689]: Updated "/home/core/.ssh/authorized_keys" Feb 12 20:22:39.665569 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 20:22:39.687143 amazon-ssm-agent[1667]: 2024/02/12 20:22:39 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Feb 12 20:22:39.687143 amazon-ssm-agent[1667]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Feb 12 20:22:39.690497 extend-filesystems[1687]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Feb 12 20:22:39.690497 extend-filesystems[1687]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 12 20:22:39.690497 extend-filesystems[1687]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Feb 12 20:22:39.716061 extend-filesystems[1618]: Resized filesystem in /dev/nvme0n1p9 Feb 12 20:22:39.691542 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 20:22:39.691861 systemd[1]: Finished extend-filesystems.service. Feb 12 20:22:39.739806 amazon-ssm-agent[1667]: 2024/02/12 20:22:39 processing appconfig overrides Feb 12 20:22:39.755957 systemd[1]: Created slice system-sshd.slice. Feb 12 20:22:39.790514 env[1651]: time="2024-02-12T20:22:39.775256580Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 20:22:39.791800 env[1651]: time="2024-02-12T20:22:39.791751865Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:22:39.799790 env[1651]: time="2024-02-12T20:22:39.799707961Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 20:22:39.799790 env[1651]: time="2024-02-12T20:22:39.799781857Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:22:39.800237 env[1651]: time="2024-02-12T20:22:39.800173165Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 20:22:39.800237 env[1651]: time="2024-02-12T20:22:39.800226793Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 20:22:39.800451 env[1651]: time="2024-02-12T20:22:39.800264137Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 20:22:39.800451 env[1651]: time="2024-02-12T20:22:39.800316997Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 20:22:39.800561 env[1651]: time="2024-02-12T20:22:39.800500309Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:22:39.801042 env[1651]: time="2024-02-12T20:22:39.800983513Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:22:39.801425 env[1651]: time="2024-02-12T20:22:39.801367153Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 20:22:39.801425 env[1651]: time="2024-02-12T20:22:39.801417313Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 20:22:39.801595 env[1651]: time="2024-02-12T20:22:39.801554317Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 20:22:39.801595 env[1651]: time="2024-02-12T20:22:39.801580801Z" level=info msg="metadata content store policy set" policy=shared Feb 12 20:22:39.811479 env[1651]: time="2024-02-12T20:22:39.811391917Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 20:22:39.811672 env[1651]: time="2024-02-12T20:22:39.811483477Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 20:22:39.811672 env[1651]: time="2024-02-12T20:22:39.811518637Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 20:22:39.811672 env[1651]: time="2024-02-12T20:22:39.811591597Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 20:22:39.811672 env[1651]: time="2024-02-12T20:22:39.811628845Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 20:22:39.811672 env[1651]: time="2024-02-12T20:22:39.811663465Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 20:22:39.812149 env[1651]: time="2024-02-12T20:22:39.811694809Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 20:22:39.812258 env[1651]: time="2024-02-12T20:22:39.812198713Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 20:22:39.812410 env[1651]: time="2024-02-12T20:22:39.812254801Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 20:22:39.812410 env[1651]: time="2024-02-12T20:22:39.812321125Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 20:22:39.812410 env[1651]: time="2024-02-12T20:22:39.812353165Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 20:22:39.812410 env[1651]: time="2024-02-12T20:22:39.812384413Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 20:22:39.812759 env[1651]: time="2024-02-12T20:22:39.812607193Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 20:22:39.812883 env[1651]: time="2024-02-12T20:22:39.812770453Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 20:22:39.813173 env[1651]: time="2024-02-12T20:22:39.813124441Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 20:22:39.813255 env[1651]: time="2024-02-12T20:22:39.813186301Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 20:22:39.813255 env[1651]: time="2024-02-12T20:22:39.813221329Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 20:22:39.813505 env[1651]: time="2024-02-12T20:22:39.813460249Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 20:22:39.813585 env[1651]: time="2024-02-12T20:22:39.813508453Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 20:22:39.813585 env[1651]: time="2024-02-12T20:22:39.813546121Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 20:22:39.813585 env[1651]: time="2024-02-12T20:22:39.813575413Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 20:22:39.813746 env[1651]: time="2024-02-12T20:22:39.813605581Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 20:22:39.813746 env[1651]: time="2024-02-12T20:22:39.813635125Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 20:22:39.813746 env[1651]: time="2024-02-12T20:22:39.813664141Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 20:22:39.813746 env[1651]: time="2024-02-12T20:22:39.813693013Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 20:22:39.813746 env[1651]: time="2024-02-12T20:22:39.813725593Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 20:22:39.814089 env[1651]: time="2024-02-12T20:22:39.813999121Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 20:22:39.814089 env[1651]: time="2024-02-12T20:22:39.814035505Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 20:22:39.814089 env[1651]: time="2024-02-12T20:22:39.814066273Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 20:22:39.814250 env[1651]: time="2024-02-12T20:22:39.814099345Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 20:22:39.814250 env[1651]: time="2024-02-12T20:22:39.814131493Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 20:22:39.814250 env[1651]: time="2024-02-12T20:22:39.814158421Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 20:22:39.814250 env[1651]: time="2024-02-12T20:22:39.814192033Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 20:22:39.814521 env[1651]: time="2024-02-12T20:22:39.814255069Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 20:22:39.814736 env[1651]: time="2024-02-12T20:22:39.814626697Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 20:22:39.815836 env[1651]: time="2024-02-12T20:22:39.814742821Z" level=info msg="Connect containerd service" Feb 12 20:22:39.815836 env[1651]: time="2024-02-12T20:22:39.814809793Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 20:22:39.828855 env[1651]: time="2024-02-12T20:22:39.828772837Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 20:22:39.829936 env[1651]: time="2024-02-12T20:22:39.829870897Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 20:22:39.830380 env[1651]: time="2024-02-12T20:22:39.830329981Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 20:22:39.830501 env[1651]: time="2024-02-12T20:22:39.830466409Z" level=info msg="containerd successfully booted in 0.444655s" Feb 12 20:22:39.863533 env[1651]: time="2024-02-12T20:22:39.863438173Z" level=info msg="Start subscribing containerd event" Feb 12 20:22:39.863763 env[1651]: time="2024-02-12T20:22:39.863553373Z" level=info msg="Start recovering state" Feb 12 20:22:39.863763 env[1651]: time="2024-02-12T20:22:39.863690725Z" level=info msg="Start event monitor" Feb 12 20:22:39.863763 env[1651]: time="2024-02-12T20:22:39.863731837Z" level=info msg="Start snapshots syncer" Feb 12 20:22:39.863934 env[1651]: time="2024-02-12T20:22:39.863765881Z" level=info msg="Start cni network conf syncer for default" Feb 12 20:22:39.863934 env[1651]: time="2024-02-12T20:22:39.863789953Z" level=info msg="Start streaming server" Feb 12 20:22:39.967353 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 20:22:39.968491 systemd[1]: Started containerd.service. Feb 12 20:22:39.972911 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 20:22:39.978111 systemd[1]: nvidia.service: Deactivated successfully. Feb 12 20:22:40.014117 tar[1634]: ./ptp Feb 12 20:22:40.019592 dbus-daemon[1616]: [system] Successfully activated service 'org.freedesktop.hostname1' Feb 12 20:22:40.019853 systemd[1]: Started systemd-hostnamed.service. Feb 12 20:22:40.024886 dbus-daemon[1616]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1705 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Feb 12 20:22:40.029485 systemd[1]: Starting polkit.service... Feb 12 20:22:40.065772 polkitd[1748]: Started polkitd version 121 Feb 12 20:22:40.089983 polkitd[1748]: Loading rules from directory /etc/polkit-1/rules.d Feb 12 20:22:40.090111 polkitd[1748]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 12 20:22:40.098367 polkitd[1748]: Finished loading, compiling and executing 2 rules Feb 12 20:22:40.099825 dbus-daemon[1616]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Feb 12 20:22:40.100142 systemd[1]: Started polkit.service. Feb 12 20:22:40.100845 polkitd[1748]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 12 20:22:40.133071 systemd-hostnamed[1705]: Hostname set to (transient) Feb 12 20:22:40.133206 systemd-resolved[1588]: System hostname changed to 'ip-172-31-19-54'. Feb 12 20:22:40.404593 tar[1634]: ./vlan Feb 12 20:22:40.517433 coreos-metadata[1615]: Feb 12 20:22:40.515 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Feb 12 20:22:40.530794 coreos-metadata[1615]: Feb 12 20:22:40.530 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Feb 12 20:22:40.534124 coreos-metadata[1615]: Feb 12 20:22:40.533 INFO Fetch successful Feb 12 20:22:40.534582 coreos-metadata[1615]: Feb 12 20:22:40.534 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Feb 12 20:22:40.540037 coreos-metadata[1615]: Feb 12 20:22:40.539 INFO Fetch successful Feb 12 20:22:40.545746 unknown[1615]: wrote ssh authorized keys file for user: core Feb 12 20:22:40.572250 update-ssh-keys[1802]: Updated "/home/core/.ssh/authorized_keys" Feb 12 20:22:40.573000 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 12 20:22:40.696616 tar[1634]: ./host-device Feb 12 20:22:40.820888 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO Create new startup processor Feb 12 20:22:40.822540 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [LongRunningPluginsManager] registered plugins: {} Feb 12 20:22:40.822645 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO Initializing bookkeeping folders Feb 12 20:22:40.822645 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO removing the completed state files Feb 12 20:22:40.822645 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO Initializing bookkeeping folders for long running plugins Feb 12 20:22:40.822785 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Feb 12 20:22:40.822785 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO Initializing healthcheck folders for long running plugins Feb 12 20:22:40.822785 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO Initializing locations for inventory plugin Feb 12 20:22:40.822785 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO Initializing default location for custom inventory Feb 12 20:22:40.822785 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO Initializing default location for file inventory Feb 12 20:22:40.823041 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO Initializing default location for role inventory Feb 12 20:22:40.823041 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO Init the cloudwatchlogs publisher Feb 12 20:22:40.823041 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [instanceID=i-0403af992871e1ba9] Successfully loaded platform independent plugin aws:runPowerShellScript Feb 12 20:22:40.823041 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [instanceID=i-0403af992871e1ba9] Successfully loaded platform independent plugin aws:updateSsmAgent Feb 12 20:22:40.823041 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [instanceID=i-0403af992871e1ba9] Successfully loaded platform independent plugin aws:downloadContent Feb 12 20:22:40.823041 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [instanceID=i-0403af992871e1ba9] Successfully loaded platform independent plugin aws:softwareInventory Feb 12 20:22:40.823041 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [instanceID=i-0403af992871e1ba9] Successfully loaded platform independent plugin aws:configureDocker Feb 12 20:22:40.823416 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [instanceID=i-0403af992871e1ba9] Successfully loaded platform independent plugin aws:runDockerAction Feb 12 20:22:40.823416 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [instanceID=i-0403af992871e1ba9] Successfully loaded platform independent plugin aws:refreshAssociation Feb 12 20:22:40.823416 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [instanceID=i-0403af992871e1ba9] Successfully loaded platform independent plugin aws:configurePackage Feb 12 20:22:40.823416 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [instanceID=i-0403af992871e1ba9] Successfully loaded platform independent plugin aws:runDocument Feb 12 20:22:40.823416 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [instanceID=i-0403af992871e1ba9] Successfully loaded platform dependent plugin aws:runShellScript Feb 12 20:22:40.823416 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Feb 12 20:22:40.823416 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO OS: linux, Arch: arm64 Feb 12 20:22:40.850380 amazon-ssm-agent[1667]: datastore file /var/lib/amazon/ssm/i-0403af992871e1ba9/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Feb 12 20:22:40.924375 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [MessagingDeliveryService] Starting document processing engine... Feb 12 20:22:40.930255 tar[1634]: ./tuning Feb 12 20:22:41.019369 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [MessagingDeliveryService] [EngineProcessor] Starting Feb 12 20:22:41.069904 tar[1634]: ./vrf Feb 12 20:22:41.113631 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Feb 12 20:22:41.208161 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [MessagingDeliveryService] Starting message polling Feb 12 20:22:41.210202 tar[1634]: ./sbr Feb 12 20:22:41.302936 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [MessagingDeliveryService] Starting send replies to MDS Feb 12 20:22:41.308408 tar[1634]: ./tap Feb 12 20:22:41.397794 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [instanceID=i-0403af992871e1ba9] Starting association polling Feb 12 20:22:41.434374 tar[1634]: ./dhcp Feb 12 20:22:41.492928 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Feb 12 20:22:41.528346 systemd[1]: Finished prepare-critools.service. Feb 12 20:22:41.588334 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [MessagingDeliveryService] [Association] Launching response handler Feb 12 20:22:41.650470 tar[1637]: linux-arm64/LICENSE Feb 12 20:22:41.651866 tar[1637]: linux-arm64/README.md Feb 12 20:22:41.660772 systemd[1]: Finished prepare-helm.service. Feb 12 20:22:41.683815 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Feb 12 20:22:41.701504 tar[1634]: ./static Feb 12 20:22:41.747591 tar[1634]: ./firewall Feb 12 20:22:41.779513 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [MessageGatewayService] Starting session document processing engine... Feb 12 20:22:41.818070 tar[1634]: ./macvlan Feb 12 20:22:41.875464 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [MessageGatewayService] [EngineProcessor] Starting Feb 12 20:22:41.882713 tar[1634]: ./dummy Feb 12 20:22:41.945807 tar[1634]: ./bridge Feb 12 20:22:41.971503 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Feb 12 20:22:42.016580 tar[1634]: ./ipvlan Feb 12 20:22:42.067788 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0403af992871e1ba9, requestId: c78bb1c8-7568-4d2d-b405-7aec6c8485ae Feb 12 20:22:42.079666 tar[1634]: ./portmap Feb 12 20:22:42.139140 tar[1634]: ./host-local Feb 12 20:22:42.164266 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Feb 12 20:22:42.213002 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 20:22:42.261026 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Feb 12 20:22:42.270788 locksmithd[1706]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 20:22:42.357907 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [OfflineService] Starting document processing engine... Feb 12 20:22:42.455023 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [OfflineService] [EngineProcessor] Starting Feb 12 20:22:42.552418 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [OfflineService] [EngineProcessor] Initial processing Feb 12 20:22:42.650016 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [OfflineService] Starting message polling Feb 12 20:22:42.747735 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [OfflineService] Starting send replies to MDS Feb 12 20:22:42.845560 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [MessageGatewayService] listening reply. Feb 12 20:22:42.943704 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [LongRunningPluginsManager] starting long running plugin manager Feb 12 20:22:43.042536 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Feb 12 20:22:43.140903 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Feb 12 20:22:43.239639 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [HealthCheck] HealthCheck reporting agent health. Feb 12 20:22:43.338613 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [StartupProcessor] Executing startup processor tasks Feb 12 20:22:43.437586 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Feb 12 20:22:43.536794 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Feb 12 20:22:43.636357 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.2 Feb 12 20:22:43.736066 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0403af992871e1ba9?role=subscribe&stream=input Feb 12 20:22:43.770224 sshd_keygen[1647]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 20:22:43.805430 systemd[1]: Finished sshd-keygen.service. Feb 12 20:22:43.810568 systemd[1]: Starting issuegen.service... Feb 12 20:22:43.814473 systemd[1]: Started sshd@0-172.31.19.54:22-147.75.109.163:33632.service. Feb 12 20:22:43.824129 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 20:22:43.824495 systemd[1]: Finished issuegen.service. Feb 12 20:22:43.829774 systemd[1]: Starting systemd-user-sessions.service... Feb 12 20:22:43.835931 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0403af992871e1ba9?role=subscribe&stream=input Feb 12 20:22:43.844919 systemd[1]: Finished systemd-user-sessions.service. Feb 12 20:22:43.849694 systemd[1]: Started getty@tty1.service. Feb 12 20:22:43.854369 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 20:22:43.858030 systemd[1]: Reached target getty.target. Feb 12 20:22:43.860544 systemd[1]: Reached target multi-user.target. Feb 12 20:22:43.875303 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 20:22:43.891014 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 20:22:43.891407 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 20:22:43.894088 systemd[1]: Startup finished in 1.159s (kernel) + 12.176s (initrd) + 12.585s (userspace) = 25.921s. Feb 12 20:22:43.936020 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [MessageGatewayService] Starting receiving message from control channel Feb 12 20:22:44.016285 sshd[1837]: Accepted publickey for core from 147.75.109.163 port 33632 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:22:44.020546 sshd[1837]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:22:44.036889 systemd[1]: Created slice user-500.slice. Feb 12 20:22:44.037623 amazon-ssm-agent[1667]: 2024-02-12 20:22:40 INFO [MessageGatewayService] [EngineProcessor] Initial processing Feb 12 20:22:44.040113 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 20:22:44.047472 systemd-logind[1628]: New session 1 of user core. Feb 12 20:22:44.056983 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 20:22:44.060008 systemd[1]: Starting user@500.service... Feb 12 20:22:44.067517 (systemd)[1846]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:22:44.240478 systemd[1846]: Queued start job for default target default.target. Feb 12 20:22:44.242891 systemd[1846]: Reached target paths.target. Feb 12 20:22:44.243122 systemd[1846]: Reached target sockets.target. Feb 12 20:22:44.243310 systemd[1846]: Reached target timers.target. Feb 12 20:22:44.243446 systemd[1846]: Reached target basic.target. Feb 12 20:22:44.243662 systemd[1846]: Reached target default.target. Feb 12 20:22:44.243755 systemd[1]: Started user@500.service. Feb 12 20:22:44.245398 systemd[1846]: Startup finished in 166ms. Feb 12 20:22:44.245592 systemd[1]: Started session-1.scope. Feb 12 20:22:44.395394 systemd[1]: Started sshd@1-172.31.19.54:22-147.75.109.163:33642.service. Feb 12 20:22:44.578889 sshd[1855]: Accepted publickey for core from 147.75.109.163 port 33642 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:22:44.581253 sshd[1855]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:22:44.589375 systemd-logind[1628]: New session 2 of user core. Feb 12 20:22:44.589853 systemd[1]: Started session-2.scope. Feb 12 20:22:44.722659 sshd[1855]: pam_unix(sshd:session): session closed for user core Feb 12 20:22:44.727967 systemd-logind[1628]: Session 2 logged out. Waiting for processes to exit. Feb 12 20:22:44.728576 systemd[1]: sshd@1-172.31.19.54:22-147.75.109.163:33642.service: Deactivated successfully. Feb 12 20:22:44.729874 systemd[1]: session-2.scope: Deactivated successfully. Feb 12 20:22:44.731418 systemd-logind[1628]: Removed session 2. Feb 12 20:22:44.748657 systemd[1]: Started sshd@2-172.31.19.54:22-147.75.109.163:56762.service. Feb 12 20:22:44.921445 sshd[1861]: Accepted publickey for core from 147.75.109.163 port 56762 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:22:44.924332 sshd[1861]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:22:44.932517 systemd[1]: Started session-3.scope. Feb 12 20:22:44.934241 systemd-logind[1628]: New session 3 of user core. Feb 12 20:22:45.051726 sshd[1861]: pam_unix(sshd:session): session closed for user core Feb 12 20:22:45.055940 systemd[1]: sshd@2-172.31.19.54:22-147.75.109.163:56762.service: Deactivated successfully. Feb 12 20:22:45.057179 systemd[1]: session-3.scope: Deactivated successfully. Feb 12 20:22:45.058484 systemd-logind[1628]: Session 3 logged out. Waiting for processes to exit. Feb 12 20:22:45.060748 systemd-logind[1628]: Removed session 3. Feb 12 20:22:45.080944 systemd[1]: Started sshd@3-172.31.19.54:22-147.75.109.163:56778.service. Feb 12 20:22:45.255944 sshd[1867]: Accepted publickey for core from 147.75.109.163 port 56778 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:22:45.257793 sshd[1867]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:22:45.267195 systemd[1]: Started session-4.scope. Feb 12 20:22:45.268162 systemd-logind[1628]: New session 4 of user core. Feb 12 20:22:45.405802 sshd[1867]: pam_unix(sshd:session): session closed for user core Feb 12 20:22:45.410615 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 20:22:45.411745 systemd[1]: sshd@3-172.31.19.54:22-147.75.109.163:56778.service: Deactivated successfully. Feb 12 20:22:45.415222 systemd-logind[1628]: Session 4 logged out. Waiting for processes to exit. Feb 12 20:22:45.416671 systemd-logind[1628]: Removed session 4. Feb 12 20:22:45.434384 systemd[1]: Started sshd@4-172.31.19.54:22-147.75.109.163:56786.service. Feb 12 20:22:45.606759 sshd[1873]: Accepted publickey for core from 147.75.109.163 port 56786 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:22:45.609797 sshd[1873]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:22:45.617616 systemd-logind[1628]: New session 5 of user core. Feb 12 20:22:45.618493 systemd[1]: Started session-5.scope. Feb 12 20:22:45.736987 sudo[1876]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 20:22:45.738079 sudo[1876]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:22:45.755520 dbus-daemon[1616]: avc: received setenforce notice (enforcing=1) Feb 12 20:22:45.757253 sudo[1876]: pam_unix(sudo:session): session closed for user root Feb 12 20:22:45.781368 sshd[1873]: pam_unix(sshd:session): session closed for user core Feb 12 20:22:45.786428 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 20:22:45.787683 systemd[1]: sshd@4-172.31.19.54:22-147.75.109.163:56786.service: Deactivated successfully. Feb 12 20:22:45.789494 systemd-logind[1628]: Session 5 logged out. Waiting for processes to exit. Feb 12 20:22:45.791499 systemd-logind[1628]: Removed session 5. Feb 12 20:22:45.811731 systemd[1]: Started sshd@5-172.31.19.54:22-147.75.109.163:56802.service. Feb 12 20:22:45.983951 sshd[1880]: Accepted publickey for core from 147.75.109.163 port 56802 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:22:45.986967 sshd[1880]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:22:45.995242 systemd[1]: Started session-6.scope. Feb 12 20:22:45.996262 systemd-logind[1628]: New session 6 of user core. Feb 12 20:22:46.103633 sudo[1884]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 20:22:46.104703 sudo[1884]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:22:46.110572 sudo[1884]: pam_unix(sudo:session): session closed for user root Feb 12 20:22:46.119836 sudo[1883]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 20:22:46.120897 sudo[1883]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:22:46.138394 systemd[1]: Stopping audit-rules.service... Feb 12 20:22:46.139000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 20:22:46.140902 auditctl[1887]: No rules Feb 12 20:22:46.142359 kernel: kauditd_printk_skb: 79 callbacks suppressed Feb 12 20:22:46.142425 kernel: audit: type=1305 audit(1707769366.139:168): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 20:22:46.143017 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 20:22:46.143401 systemd[1]: Stopped audit-rules.service. Feb 12 20:22:46.139000 audit[1887]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffaf50540 a2=420 a3=0 items=0 ppid=1 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:46.146954 systemd[1]: Starting audit-rules.service... Feb 12 20:22:46.158755 kernel: audit: type=1300 audit(1707769366.139:168): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffaf50540 a2=420 a3=0 items=0 ppid=1 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:46.139000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 20:22:46.162562 kernel: audit: type=1327 audit(1707769366.139:168): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 20:22:46.162665 kernel: audit: type=1131 audit(1707769366.142:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:46.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:46.187936 augenrules[1904]: No rules Feb 12 20:22:46.189578 systemd[1]: Finished audit-rules.service. Feb 12 20:22:46.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:46.190952 sudo[1883]: pam_unix(sudo:session): session closed for user root Feb 12 20:22:46.189000 audit[1883]: USER_END pid=1883 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:22:46.208566 kernel: audit: type=1130 audit(1707769366.188:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:46.208666 kernel: audit: type=1106 audit(1707769366.189:171): pid=1883 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:22:46.189000 audit[1883]: CRED_DISP pid=1883 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:22:46.216849 kernel: audit: type=1104 audit(1707769366.189:172): pid=1883 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:22:46.221477 sshd[1880]: pam_unix(sshd:session): session closed for user core Feb 12 20:22:46.222000 audit[1880]: USER_END pid=1880 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:22:46.222000 audit[1880]: CRED_DISP pid=1880 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:22:46.235429 systemd[1]: sshd@5-172.31.19.54:22-147.75.109.163:56802.service: Deactivated successfully. Feb 12 20:22:46.236692 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 20:22:46.244498 kernel: audit: type=1106 audit(1707769366.222:173): pid=1880 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:22:46.244659 kernel: audit: type=1104 audit(1707769366.222:174): pid=1880 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:22:46.245883 systemd-logind[1628]: Session 6 logged out. Waiting for processes to exit. Feb 12 20:22:46.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.19.54:22-147.75.109.163:56802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:46.255677 kernel: audit: type=1131 audit(1707769366.234:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.19.54:22-147.75.109.163:56802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:46.253501 systemd[1]: Started sshd@6-172.31.19.54:22-147.75.109.163:56810.service. Feb 12 20:22:46.260007 systemd-logind[1628]: Removed session 6. Feb 12 20:22:46.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.19.54:22-147.75.109.163:56810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:46.431000 audit[1910]: USER_ACCT pid=1910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:22:46.433623 sshd[1910]: Accepted publickey for core from 147.75.109.163 port 56810 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:22:46.434000 audit[1910]: CRED_ACQ pid=1910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:22:46.434000 audit[1910]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffec398460 a2=3 a3=1 items=0 ppid=1 pid=1910 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:46.434000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:22:46.436744 sshd[1910]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:22:46.445958 systemd[1]: Started session-7.scope. Feb 12 20:22:46.446786 systemd-logind[1628]: New session 7 of user core. Feb 12 20:22:46.454000 audit[1910]: USER_START pid=1910 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:22:46.457000 audit[1912]: CRED_ACQ pid=1912 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:22:46.554000 audit[1913]: USER_ACCT pid=1913 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:22:46.555881 sudo[1913]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 20:22:46.554000 audit[1913]: CRED_REFR pid=1913 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:22:46.556488 sudo[1913]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:22:46.558000 audit[1913]: USER_START pid=1913 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:22:47.482726 systemd[1]: Starting docker.service... Feb 12 20:22:47.557094 env[1928]: time="2024-02-12T20:22:47.556998895Z" level=info msg="Starting up" Feb 12 20:22:47.559649 env[1928]: time="2024-02-12T20:22:47.559602715Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 20:22:47.559822 env[1928]: time="2024-02-12T20:22:47.559793143Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 20:22:47.559956 env[1928]: time="2024-02-12T20:22:47.559923571Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 20:22:47.560061 env[1928]: time="2024-02-12T20:22:47.560034943Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 20:22:47.564102 env[1928]: time="2024-02-12T20:22:47.564017491Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 20:22:47.564102 env[1928]: time="2024-02-12T20:22:47.564075859Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 20:22:47.564401 env[1928]: time="2024-02-12T20:22:47.564119527Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 20:22:47.564401 env[1928]: time="2024-02-12T20:22:47.564145543Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 20:22:47.574091 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1037716855-merged.mount: Deactivated successfully. Feb 12 20:22:47.797562 env[1928]: time="2024-02-12T20:22:47.797367188Z" level=info msg="Loading containers: start." Feb 12 20:22:47.870000 audit[1959]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1959 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:22:47.870000 audit[1959]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffebb696e0 a2=0 a3=1 items=0 ppid=1928 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:47.870000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 12 20:22:47.875000 audit[1961]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1961 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:22:47.875000 audit[1961]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffc6066b20 a2=0 a3=1 items=0 ppid=1928 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:47.875000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 12 20:22:47.879000 audit[1963]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1963 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:22:47.879000 audit[1963]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe857da90 a2=0 a3=1 items=0 ppid=1928 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:47.879000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 20:22:47.884000 audit[1965]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1965 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:22:47.884000 audit[1965]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffff314ada0 a2=0 a3=1 items=0 ppid=1928 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:47.884000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 20:22:47.889000 audit[1967]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1967 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:22:47.889000 audit[1967]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcbdc4560 a2=0 a3=1 items=0 ppid=1928 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:47.889000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 12 20:22:47.921000 audit[1972]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1972 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:22:47.921000 audit[1972]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff445df80 a2=0 a3=1 items=0 ppid=1928 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:47.921000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 12 20:22:47.934000 audit[1974]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1974 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:22:47.934000 audit[1974]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc39ec0c0 a2=0 a3=1 items=0 ppid=1928 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:47.934000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 12 20:22:47.937000 audit[1976]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1976 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:22:47.937000 audit[1976]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=fffff3b51b80 a2=0 a3=1 items=0 ppid=1928 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:47.937000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 12 20:22:47.941000 audit[1978]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1978 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:22:47.941000 audit[1978]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=fffff9a13890 a2=0 a3=1 items=0 ppid=1928 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:47.941000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:22:47.956000 audit[1982]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1982 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:22:47.956000 audit[1982]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffc084d090 a2=0 a3=1 items=0 ppid=1928 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:47.956000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:22:47.957000 audit[1983]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1983 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:22:47.957000 audit[1983]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffdf833b00 a2=0 a3=1 items=0 ppid=1928 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:47.957000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:22:47.969321 kernel: Initializing XFRM netlink socket Feb 12 20:22:48.011090 env[1928]: time="2024-02-12T20:22:48.011045741Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 12 20:22:48.013346 (udev-worker)[1939]: Network interface NamePolicy= disabled on kernel command line. Feb 12 20:22:48.048000 audit[1991]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1991 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:22:48.048000 audit[1991]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffe29d03c0 a2=0 a3=1 items=0 ppid=1928 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:48.048000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 12 20:22:48.063000 audit[1994]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1994 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:22:48.063000 audit[1994]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffce7240d0 a2=0 a3=1 items=0 ppid=1928 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:48.063000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 12 20:22:48.071000 audit[1997]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1997 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:22:48.071000 audit[1997]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffc9780ae0 a2=0 a3=1 items=0 ppid=1928 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:48.071000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 12 20:22:48.075000 audit[1999]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1999 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:22:48.075000 audit[1999]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffc3362bf0 a2=0 a3=1 items=0 ppid=1928 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:48.075000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 12 20:22:48.079000 audit[2001]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2001 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:22:48.079000 audit[2001]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=fffffd1795e0 a2=0 a3=1 items=0 ppid=1928 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:48.079000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 12 20:22:48.083000 audit[2003]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2003 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:22:48.083000 audit[2003]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffcf374f40 a2=0 a3=1 items=0 ppid=1928 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:48.083000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 12 20:22:48.088000 audit[2005]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2005 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:22:48.088000 audit[2005]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffec57bb20 a2=0 a3=1 items=0 ppid=1928 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:48.088000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 12 20:22:48.101000 audit[2008]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2008 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:22:48.101000 audit[2008]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffcc32b680 a2=0 a3=1 items=0 ppid=1928 pid=2008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:48.101000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 12 20:22:48.106000 audit[2010]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2010 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:22:48.106000 audit[2010]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffd0927410 a2=0 a3=1 items=0 ppid=1928 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:48.106000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 20:22:48.111000 audit[2012]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2012 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:22:48.111000 audit[2012]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffc4987360 a2=0 a3=1 items=0 ppid=1928 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:48.111000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 20:22:48.116000 audit[2014]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2014 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:22:48.116000 audit[2014]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdb429250 a2=0 a3=1 items=0 ppid=1928 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:48.116000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 12 20:22:48.118401 systemd-networkd[1451]: docker0: Link UP Feb 12 20:22:48.133000 audit[2018]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2018 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:22:48.133000 audit[2018]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc62d2690 a2=0 a3=1 items=0 ppid=1928 pid=2018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:48.133000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:22:48.135000 audit[2019]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2019 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:22:48.135000 audit[2019]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffff1d5b400 a2=0 a3=1 items=0 ppid=1928 pid=2019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:22:48.135000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:22:48.137498 env[1928]: time="2024-02-12T20:22:48.137458278Z" level=info msg="Loading containers: done." Feb 12 20:22:48.160570 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1931362812-merged.mount: Deactivated successfully. Feb 12 20:22:48.169327 env[1928]: time="2024-02-12T20:22:48.169258554Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 12 20:22:48.169948 env[1928]: time="2024-02-12T20:22:48.169897746Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 12 20:22:48.170319 env[1928]: time="2024-02-12T20:22:48.170292690Z" level=info msg="Daemon has completed initialization" Feb 12 20:22:48.197929 systemd[1]: Started docker.service. Feb 12 20:22:48.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:48.206911 env[1928]: time="2024-02-12T20:22:48.206841438Z" level=info msg="API listen on /run/docker.sock" Feb 12 20:22:48.249694 systemd[1]: Reloading. Feb 12 20:22:48.412420 /usr/lib/systemd/system-generators/torcx-generator[2067]: time="2024-02-12T20:22:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:22:48.415739 /usr/lib/systemd/system-generators/torcx-generator[2067]: time="2024-02-12T20:22:48Z" level=info msg="torcx already run" Feb 12 20:22:48.572955 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:22:48.573608 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:22:48.618488 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:22:48.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.774000 audit: BPF prog-id=40 op=LOAD Feb 12 20:22:48.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.775000 audit: BPF prog-id=41 op=LOAD Feb 12 20:22:48.775000 audit: BPF prog-id=24 op=UNLOAD Feb 12 20:22:48.776000 audit: BPF prog-id=25 op=UNLOAD Feb 12 20:22:48.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.778000 audit: BPF prog-id=42 op=LOAD Feb 12 20:22:48.779000 audit: BPF prog-id=27 op=UNLOAD Feb 12 20:22:48.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.780000 audit: BPF prog-id=43 op=LOAD Feb 12 20:22:48.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.780000 audit: BPF prog-id=44 op=LOAD Feb 12 20:22:48.781000 audit: BPF prog-id=28 op=UNLOAD Feb 12 20:22:48.781000 audit: BPF prog-id=29 op=UNLOAD Feb 12 20:22:48.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.783000 audit: BPF prog-id=45 op=LOAD Feb 12 20:22:48.783000 audit: BPF prog-id=26 op=UNLOAD Feb 12 20:22:48.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.791000 audit: BPF prog-id=46 op=LOAD Feb 12 20:22:48.791000 audit: BPF prog-id=21 op=UNLOAD Feb 12 20:22:48.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.792000 audit: BPF prog-id=47 op=LOAD Feb 12 20:22:48.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.793000 audit: BPF prog-id=48 op=LOAD Feb 12 20:22:48.793000 audit: BPF prog-id=22 op=UNLOAD Feb 12 20:22:48.793000 audit: BPF prog-id=23 op=UNLOAD Feb 12 20:22:48.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.795000 audit: BPF prog-id=49 op=LOAD Feb 12 20:22:48.795000 audit: BPF prog-id=31 op=UNLOAD Feb 12 20:22:48.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.798000 audit: BPF prog-id=50 op=LOAD Feb 12 20:22:48.799000 audit: BPF prog-id=35 op=UNLOAD Feb 12 20:22:48.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.799000 audit: BPF prog-id=51 op=LOAD Feb 12 20:22:48.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.799000 audit: BPF prog-id=52 op=LOAD Feb 12 20:22:48.799000 audit: BPF prog-id=36 op=UNLOAD Feb 12 20:22:48.799000 audit: BPF prog-id=37 op=UNLOAD Feb 12 20:22:48.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.800000 audit: BPF prog-id=53 op=LOAD Feb 12 20:22:48.800000 audit: BPF prog-id=38 op=UNLOAD Feb 12 20:22:48.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.802000 audit: BPF prog-id=54 op=LOAD Feb 12 20:22:48.802000 audit: BPF prog-id=32 op=UNLOAD Feb 12 20:22:48.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.803000 audit: BPF prog-id=55 op=LOAD Feb 12 20:22:48.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.803000 audit: BPF prog-id=56 op=LOAD Feb 12 20:22:48.803000 audit: BPF prog-id=33 op=UNLOAD Feb 12 20:22:48.803000 audit: BPF prog-id=34 op=UNLOAD Feb 12 20:22:48.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:22:48.810000 audit: BPF prog-id=57 op=LOAD Feb 12 20:22:48.810000 audit: BPF prog-id=30 op=UNLOAD Feb 12 20:22:48.850203 systemd[1]: Started kubelet.service. Feb 12 20:22:48.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:48.988702 kubelet[2122]: E0212 20:22:48.988591 2122 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 20:22:48.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 20:22:48.993156 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 20:22:48.993510 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 20:22:49.384624 env[1651]: time="2024-02-12T20:22:49.384559028Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\"" Feb 12 20:22:50.037004 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1758109217.mount: Deactivated successfully. Feb 12 20:22:53.281062 env[1651]: time="2024-02-12T20:22:53.281000292Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:22:53.284545 env[1651]: time="2024-02-12T20:22:53.284495568Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d19178cf7413f0942a116deaaea447983d297afb5dc7f62456c43839e7aaecfa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:22:53.288076 env[1651]: time="2024-02-12T20:22:53.288004140Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:22:53.291917 env[1651]: time="2024-02-12T20:22:53.291869304Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:cfcebda74d6e665b68931d3589ee69fde81cd503ff3169888e4502af65579d98,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:22:53.293368 env[1651]: time="2024-02-12T20:22:53.293323836Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\" returns image reference \"sha256:d19178cf7413f0942a116deaaea447983d297afb5dc7f62456c43839e7aaecfa\"" Feb 12 20:22:53.309748 env[1651]: time="2024-02-12T20:22:53.309700332Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\"" Feb 12 20:22:56.515354 env[1651]: time="2024-02-12T20:22:56.515215048Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:22:56.518794 env[1651]: time="2024-02-12T20:22:56.518691004Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6b9759f115be4c68b4a500b8c1d7bbeaf16e8e887b01eaf79c135b7b267baf95,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:22:56.523466 env[1651]: time="2024-02-12T20:22:56.522409996Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:22:56.526583 env[1651]: time="2024-02-12T20:22:56.526515112Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fa168ebca1f6dbfe86ef0a690e007531c1f53569274fc7dc2774fe228b6ce8c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:22:56.529350 env[1651]: time="2024-02-12T20:22:56.528847936Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\" returns image reference \"sha256:6b9759f115be4c68b4a500b8c1d7bbeaf16e8e887b01eaf79c135b7b267baf95\"" Feb 12 20:22:56.546677 env[1651]: time="2024-02-12T20:22:56.546606160Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\"" Feb 12 20:22:58.476217 amazon-ssm-agent[1667]: 2024-02-12 20:22:58 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Feb 12 20:22:58.476803 env[1651]: time="2024-02-12T20:22:58.476303057Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:22:58.481228 env[1651]: time="2024-02-12T20:22:58.481165613Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:745369ed75bfc0dd1319e4c64383b4ef2cb163cec6630fa288ad3fb6bf6624eb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:22:58.484474 env[1651]: time="2024-02-12T20:22:58.484416281Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:22:58.489333 env[1651]: time="2024-02-12T20:22:58.489263189Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09294de61e63987f181077cbc2f5c82463878af9cd8ecc6110c54150c9ae3143,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:22:58.491193 env[1651]: time="2024-02-12T20:22:58.491135993Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\" returns image reference \"sha256:745369ed75bfc0dd1319e4c64383b4ef2cb163cec6630fa288ad3fb6bf6624eb\"" Feb 12 20:22:58.509170 env[1651]: time="2024-02-12T20:22:58.509113938Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 12 20:22:59.116050 kernel: kauditd_printk_skb: 292 callbacks suppressed Feb 12 20:22:59.116229 kernel: audit: type=1130 audit(1707769379.102:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:59.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:59.103582 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 12 20:22:59.103882 systemd[1]: Stopped kubelet.service. Feb 12 20:22:59.109154 systemd[1]: Started kubelet.service. Feb 12 20:22:59.128416 kernel: audit: type=1131 audit(1707769379.102:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:59.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:59.139844 kernel: audit: type=1130 audit(1707769379.108:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:59.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:22:59.267423 kubelet[2157]: E0212 20:22:59.267332 2157 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 20:22:59.276381 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 20:22:59.276736 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 20:22:59.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 20:22:59.285319 kernel: audit: type=1131 audit(1707769379.275:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 20:22:59.832103 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1571593901.mount: Deactivated successfully. Feb 12 20:23:00.660849 env[1651]: time="2024-02-12T20:23:00.660750632Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:00.664306 env[1651]: time="2024-02-12T20:23:00.664235672Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f17f9528c5073692925255c3de3f310109480873912e8b5ddc171ae1e64324ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:00.668527 env[1651]: time="2024-02-12T20:23:00.668481728Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:00.672515 env[1651]: time="2024-02-12T20:23:00.672470348Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:00.673843 env[1651]: time="2024-02-12T20:23:00.673788092Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:f17f9528c5073692925255c3de3f310109480873912e8b5ddc171ae1e64324ef\"" Feb 12 20:23:00.692188 env[1651]: time="2024-02-12T20:23:00.692116784Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 12 20:23:01.272354 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3490254748.mount: Deactivated successfully. Feb 12 20:23:01.282627 env[1651]: time="2024-02-12T20:23:01.282550891Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:01.285580 env[1651]: time="2024-02-12T20:23:01.285520591Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:01.288613 env[1651]: time="2024-02-12T20:23:01.288532279Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:01.291396 env[1651]: time="2024-02-12T20:23:01.291348067Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:01.292466 env[1651]: time="2024-02-12T20:23:01.292422919Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Feb 12 20:23:01.308571 env[1651]: time="2024-02-12T20:23:01.308514283Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Feb 12 20:23:02.517668 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1817990801.mount: Deactivated successfully. Feb 12 20:23:05.809432 env[1651]: time="2024-02-12T20:23:05.809351030Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:05.888591 env[1651]: time="2024-02-12T20:23:05.888521306Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24bc64e911039ecf00e263be2161797c758b7d82403ca5516ab64047a477f737,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:05.965871 env[1651]: time="2024-02-12T20:23:05.965816463Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:06.011012 env[1651]: time="2024-02-12T20:23:06.010409771Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:06.011178 env[1651]: time="2024-02-12T20:23:06.011072807Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:24bc64e911039ecf00e263be2161797c758b7d82403ca5516ab64047a477f737\"" Feb 12 20:23:06.028289 env[1651]: time="2024-02-12T20:23:06.028219043Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 12 20:23:06.660441 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1514123251.mount: Deactivated successfully. Feb 12 20:23:07.476573 env[1651]: time="2024-02-12T20:23:07.476516798Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:07.479567 env[1651]: time="2024-02-12T20:23:07.479497994Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:07.483123 env[1651]: time="2024-02-12T20:23:07.483074690Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:07.487478 env[1651]: time="2024-02-12T20:23:07.487417694Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:07.488588 env[1651]: time="2024-02-12T20:23:07.488535242Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\"" Feb 12 20:23:09.528119 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 12 20:23:09.528510 systemd[1]: Stopped kubelet.service. Feb 12 20:23:09.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:23:09.553069 kernel: audit: type=1130 audit(1707769389.527:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:23:09.553211 kernel: audit: type=1131 audit(1707769389.527:423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:23:09.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:23:09.544872 systemd[1]: Started kubelet.service. Feb 12 20:23:09.570354 kernel: audit: type=1130 audit(1707769389.543:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:23:09.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:23:09.663454 kubelet[2239]: E0212 20:23:09.663394 2239 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 20:23:09.667379 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 20:23:09.667729 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 20:23:09.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 20:23:09.677329 kernel: audit: type=1131 audit(1707769389.666:425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 20:23:10.143886 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 12 20:23:10.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:23:10.154304 kernel: audit: type=1131 audit(1707769390.143:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:23:10.168000 audit: BPF prog-id=52 op=UNLOAD Feb 12 20:23:10.168000 audit: BPF prog-id=51 op=UNLOAD Feb 12 20:23:10.174847 kernel: audit: type=1334 audit(1707769390.168:427): prog-id=52 op=UNLOAD Feb 12 20:23:10.174917 kernel: audit: type=1334 audit(1707769390.168:428): prog-id=51 op=UNLOAD Feb 12 20:23:10.168000 audit: BPF prog-id=50 op=UNLOAD Feb 12 20:23:10.177835 kernel: audit: type=1334 audit(1707769390.168:429): prog-id=50 op=UNLOAD Feb 12 20:23:15.283431 systemd[1]: Stopped kubelet.service. Feb 12 20:23:15.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:23:15.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:23:15.299973 kernel: audit: type=1130 audit(1707769395.283:430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:23:15.300100 kernel: audit: type=1131 audit(1707769395.283:431): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:23:15.316427 systemd[1]: Reloading. Feb 12 20:23:15.456348 /usr/lib/systemd/system-generators/torcx-generator[2282]: time="2024-02-12T20:23:15Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:23:15.456410 /usr/lib/systemd/system-generators/torcx-generator[2282]: time="2024-02-12T20:23:15Z" level=info msg="torcx already run" Feb 12 20:23:15.582855 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:23:15.583157 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:23:15.626346 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:23:15.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.789932 kernel: audit: type=1400 audit(1707769395.775:432): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.790012 kernel: audit: type=1400 audit(1707769395.775:433): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.790070 kernel: audit: type=1400 audit(1707769395.775:434): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.804820 kernel: audit: type=1400 audit(1707769395.775:435): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.804898 kernel: audit: type=1400 audit(1707769395.775:436): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.819578 kernel: audit: type=1400 audit(1707769395.775:437): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.819667 kernel: audit: type=1400 audit(1707769395.775:438): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.829064 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 20:23:15.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.782000 audit: BPF prog-id=58 op=LOAD Feb 12 20:23:15.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.789000 audit: BPF prog-id=59 op=LOAD Feb 12 20:23:15.789000 audit: BPF prog-id=40 op=UNLOAD Feb 12 20:23:15.790000 audit: BPF prog-id=41 op=UNLOAD Feb 12 20:23:15.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.797000 audit: BPF prog-id=60 op=LOAD Feb 12 20:23:15.797000 audit: BPF prog-id=42 op=UNLOAD Feb 12 20:23:15.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.804000 audit: BPF prog-id=61 op=LOAD Feb 12 20:23:15.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.812000 audit: BPF prog-id=62 op=LOAD Feb 12 20:23:15.812000 audit: BPF prog-id=43 op=UNLOAD Feb 12 20:23:15.812000 audit: BPF prog-id=44 op=UNLOAD Feb 12 20:23:15.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.819000 audit: BPF prog-id=63 op=LOAD Feb 12 20:23:15.819000 audit: BPF prog-id=45 op=UNLOAD Feb 12 20:23:15.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.833000 audit: BPF prog-id=64 op=LOAD Feb 12 20:23:15.833000 audit: BPF prog-id=46 op=UNLOAD Feb 12 20:23:15.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.833000 audit: BPF prog-id=65 op=LOAD Feb 12 20:23:15.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.834000 audit: BPF prog-id=66 op=LOAD Feb 12 20:23:15.834000 audit: BPF prog-id=47 op=UNLOAD Feb 12 20:23:15.834000 audit: BPF prog-id=48 op=UNLOAD Feb 12 20:23:15.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.834000 audit: BPF prog-id=67 op=LOAD Feb 12 20:23:15.835000 audit: BPF prog-id=49 op=UNLOAD Feb 12 20:23:15.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.840000 audit: BPF prog-id=68 op=LOAD Feb 12 20:23:15.840000 audit: BPF prog-id=53 op=UNLOAD Feb 12 20:23:15.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.843000 audit: BPF prog-id=69 op=LOAD Feb 12 20:23:15.843000 audit: BPF prog-id=54 op=UNLOAD Feb 12 20:23:15.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.843000 audit: BPF prog-id=70 op=LOAD Feb 12 20:23:15.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.843000 audit: BPF prog-id=71 op=LOAD Feb 12 20:23:15.843000 audit: BPF prog-id=55 op=UNLOAD Feb 12 20:23:15.843000 audit: BPF prog-id=56 op=UNLOAD Feb 12 20:23:15.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:15.850000 audit: BPF prog-id=72 op=LOAD Feb 12 20:23:15.850000 audit: BPF prog-id=57 op=UNLOAD Feb 12 20:23:15.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:23:15.882170 systemd[1]: Started kubelet.service. Feb 12 20:23:15.977431 kubelet[2327]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:23:15.977431 kubelet[2327]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 20:23:15.977958 kubelet[2327]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:23:15.977958 kubelet[2327]: I0212 20:23:15.977546 2327 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 20:23:16.967560 kubelet[2327]: I0212 20:23:16.967499 2327 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 12 20:23:16.967560 kubelet[2327]: I0212 20:23:16.967549 2327 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 20:23:16.967929 kubelet[2327]: I0212 20:23:16.967901 2327 server.go:837] "Client rotation is on, will bootstrap in background" Feb 12 20:23:16.975407 kubelet[2327]: E0212 20:23:16.975371 2327 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.19.54:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.19.54:6443: connect: connection refused Feb 12 20:23:16.975679 kubelet[2327]: I0212 20:23:16.975654 2327 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 20:23:16.978147 kubelet[2327]: W0212 20:23:16.978114 2327 machine.go:65] Cannot read vendor id correctly, set empty. Feb 12 20:23:16.979251 kubelet[2327]: I0212 20:23:16.979205 2327 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 20:23:16.979736 kubelet[2327]: I0212 20:23:16.979709 2327 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 20:23:16.979860 kubelet[2327]: I0212 20:23:16.979832 2327 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 20:23:16.980031 kubelet[2327]: I0212 20:23:16.979883 2327 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 20:23:16.980031 kubelet[2327]: I0212 20:23:16.979908 2327 container_manager_linux.go:302] "Creating device plugin manager" Feb 12 20:23:16.980153 kubelet[2327]: I0212 20:23:16.980083 2327 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:23:16.985625 kubelet[2327]: I0212 20:23:16.985592 2327 kubelet.go:405] "Attempting to sync node with API server" Feb 12 20:23:16.986352 kubelet[2327]: I0212 20:23:16.986327 2327 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 20:23:16.986510 kubelet[2327]: W0212 20:23:16.986444 2327 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.19.54:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-19-54&limit=500&resourceVersion=0": dial tcp 172.31.19.54:6443: connect: connection refused Feb 12 20:23:16.986582 kubelet[2327]: E0212 20:23:16.986525 2327 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.19.54:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-19-54&limit=500&resourceVersion=0": dial tcp 172.31.19.54:6443: connect: connection refused Feb 12 20:23:16.986719 kubelet[2327]: I0212 20:23:16.986695 2327 kubelet.go:309] "Adding apiserver pod source" Feb 12 20:23:16.986847 kubelet[2327]: I0212 20:23:16.986824 2327 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 20:23:16.988065 kubelet[2327]: W0212 20:23:16.988006 2327 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.19.54:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.19.54:6443: connect: connection refused Feb 12 20:23:16.988291 kubelet[2327]: E0212 20:23:16.988247 2327 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.19.54:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.19.54:6443: connect: connection refused Feb 12 20:23:16.988548 kubelet[2327]: I0212 20:23:16.988522 2327 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 20:23:16.989145 kubelet[2327]: W0212 20:23:16.989119 2327 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 20:23:16.990192 kubelet[2327]: I0212 20:23:16.990157 2327 server.go:1168] "Started kubelet" Feb 12 20:23:16.993000 audit[2327]: AVC avc: denied { mac_admin } for pid=2327 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:16.993000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:23:16.993000 audit[2327]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ec25d0 a1=40009bd2c0 a2=4000ec25a0 a3=25 items=0 ppid=1 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:16.993000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:23:16.995404 kubelet[2327]: I0212 20:23:16.995359 2327 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 20:23:16.994000 audit[2327]: AVC avc: denied { mac_admin } for pid=2327 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:16.994000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:23:16.994000 audit[2327]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40009b1ac0 a1=40009bd2d8 a2=4000ec2660 a3=25 items=0 ppid=1 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:16.994000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:23:16.996062 kubelet[2327]: I0212 20:23:16.996034 2327 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 20:23:16.996618 kubelet[2327]: I0212 20:23:16.996584 2327 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 20:23:17.001355 kubelet[2327]: E0212 20:23:17.001316 2327 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 20:23:17.001559 kubelet[2327]: E0212 20:23:17.001537 2327 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 20:23:17.001957 kubelet[2327]: I0212 20:23:17.001935 2327 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 20:23:17.003174 kubelet[2327]: I0212 20:23:17.003145 2327 server.go:461] "Adding debug handlers to kubelet server" Feb 12 20:23:17.005169 kubelet[2327]: I0212 20:23:17.005133 2327 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 20:23:17.007615 kubelet[2327]: I0212 20:23:17.005500 2327 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 12 20:23:17.007932 kubelet[2327]: I0212 20:23:17.005529 2327 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 12 20:23:17.008107 kubelet[2327]: E0212 20:23:17.006539 2327 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-19-54.17b33737e9e1179b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-19-54", UID:"ip-172-31-19-54", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-19-54"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 23, 16, 990121883, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 23, 16, 990121883, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://172.31.19.54:6443/api/v1/namespaces/default/events": dial tcp 172.31.19.54:6443: connect: connection refused'(may retry after sleeping) Feb 12 20:23:17.010067 kubelet[2327]: E0212 20:23:17.010033 2327 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.19.54:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-19-54?timeout=10s\": dial tcp 172.31.19.54:6443: connect: connection refused" interval="200ms" Feb 12 20:23:17.013000 audit[2338]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:17.013000 audit[2338]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffa4c18f0 a2=0 a3=1 items=0 ppid=2327 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:17.013000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 20:23:17.014000 audit[2339]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:17.014000 audit[2339]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff259afc0 a2=0 a3=1 items=0 ppid=2327 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:17.014000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 20:23:17.019000 audit[2341]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:17.019000 audit[2341]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffed9eaa80 a2=0 a3=1 items=0 ppid=2327 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:17.019000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:23:17.023000 audit[2343]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:17.023000 audit[2343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc0715cb0 a2=0 a3=1 items=0 ppid=2327 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:17.023000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:23:17.031835 kubelet[2327]: W0212 20:23:17.031763 2327 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.19.54:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.19.54:6443: connect: connection refused Feb 12 20:23:17.032148 kubelet[2327]: E0212 20:23:17.032126 2327 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.19.54:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.19.54:6443: connect: connection refused Feb 12 20:23:17.042000 audit[2349]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2349 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:17.042000 audit[2349]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff1603e70 a2=0 a3=1 items=0 ppid=2327 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:17.042000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 20:23:17.044111 kubelet[2327]: I0212 20:23:17.044068 2327 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 20:23:17.044000 audit[2350]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:17.044000 audit[2350]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc66cb800 a2=0 a3=1 items=0 ppid=2327 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:17.044000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 20:23:17.048332 kubelet[2327]: I0212 20:23:17.048294 2327 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 20:23:17.048522 kubelet[2327]: I0212 20:23:17.048502 2327 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 12 20:23:17.048669 kubelet[2327]: I0212 20:23:17.048648 2327 kubelet.go:2257] "Starting kubelet main sync loop" Feb 12 20:23:17.048903 kubelet[2327]: E0212 20:23:17.048882 2327 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 20:23:17.049000 audit[2352]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2352 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:17.049000 audit[2352]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc93e81b0 a2=0 a3=1 items=0 ppid=2327 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:17.049000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 20:23:17.055000 audit[2353]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:17.055000 audit[2353]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffefde96a0 a2=0 a3=1 items=0 ppid=2327 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:17.055000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 20:23:17.059000 audit[2354]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:17.059000 audit[2354]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffd8670290 a2=0 a3=1 items=0 ppid=2327 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:17.059000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 20:23:17.064000 audit[2355]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=2355 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:17.064000 audit[2355]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc94ad830 a2=0 a3=1 items=0 ppid=2327 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:17.064000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 20:23:17.066977 kubelet[2327]: W0212 20:23:17.066904 2327 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.19.54:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.19.54:6443: connect: connection refused Feb 12 20:23:17.067195 kubelet[2327]: E0212 20:23:17.067172 2327 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.19.54:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.19.54:6443: connect: connection refused Feb 12 20:23:17.067000 audit[2356]: NETFILTER_CFG table=filter:36 family=10 entries=2 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:17.067000 audit[2356]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc22c1c80 a2=0 a3=1 items=0 ppid=2327 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:17.067000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 20:23:17.070000 audit[2357]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=2357 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:17.070000 audit[2357]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd44f20e0 a2=0 a3=1 items=0 ppid=2327 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:17.070000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 20:23:17.076817 kubelet[2327]: I0212 20:23:17.076782 2327 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 20:23:17.077040 kubelet[2327]: I0212 20:23:17.077017 2327 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 20:23:17.077161 kubelet[2327]: I0212 20:23:17.077141 2327 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:23:17.081575 kubelet[2327]: I0212 20:23:17.081544 2327 policy_none.go:49] "None policy: Start" Feb 12 20:23:17.082940 kubelet[2327]: I0212 20:23:17.082912 2327 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 20:23:17.083107 kubelet[2327]: I0212 20:23:17.083087 2327 state_mem.go:35] "Initializing new in-memory state store" Feb 12 20:23:17.092023 systemd[1]: Created slice kubepods.slice. Feb 12 20:23:17.101082 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 20:23:17.107842 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 20:23:17.113037 kubelet[2327]: I0212 20:23:17.112876 2327 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-19-54" Feb 12 20:23:17.113471 kubelet[2327]: E0212 20:23:17.113437 2327 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.19.54:6443/api/v1/nodes\": dial tcp 172.31.19.54:6443: connect: connection refused" node="ip-172-31-19-54" Feb 12 20:23:17.119712 kubelet[2327]: I0212 20:23:17.119661 2327 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 20:23:17.118000 audit[2327]: AVC avc: denied { mac_admin } for pid=2327 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:17.118000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:23:17.118000 audit[2327]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000fb1560 a1=4000fc93e0 a2=4000fb1530 a3=25 items=0 ppid=1 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:17.118000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:23:17.120205 kubelet[2327]: I0212 20:23:17.119772 2327 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 20:23:17.120205 kubelet[2327]: I0212 20:23:17.120053 2327 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 20:23:17.122234 kubelet[2327]: E0212 20:23:17.122203 2327 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-19-54\" not found" Feb 12 20:23:17.149883 kubelet[2327]: I0212 20:23:17.149838 2327 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:23:17.152197 kubelet[2327]: I0212 20:23:17.152142 2327 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:23:17.154503 kubelet[2327]: I0212 20:23:17.154459 2327 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:23:17.165674 systemd[1]: Created slice kubepods-burstable-pod6ae380b9f58b2f3bdcc9865a3d87ab2d.slice. Feb 12 20:23:17.186942 systemd[1]: Created slice kubepods-burstable-pod4f175323180a275fb7b08ae316705d28.slice. Feb 12 20:23:17.194495 systemd[1]: Created slice kubepods-burstable-pod0ac7e1193fcbd3e71e50e4d25a6adb04.slice. Feb 12 20:23:17.209031 kubelet[2327]: I0212 20:23:17.208994 2327 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0ac7e1193fcbd3e71e50e4d25a6adb04-kubeconfig\") pod \"kube-scheduler-ip-172-31-19-54\" (UID: \"0ac7e1193fcbd3e71e50e4d25a6adb04\") " pod="kube-system/kube-scheduler-ip-172-31-19-54" Feb 12 20:23:17.209255 kubelet[2327]: I0212 20:23:17.209233 2327 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6ae380b9f58b2f3bdcc9865a3d87ab2d-ca-certs\") pod \"kube-apiserver-ip-172-31-19-54\" (UID: \"6ae380b9f58b2f3bdcc9865a3d87ab2d\") " pod="kube-system/kube-apiserver-ip-172-31-19-54" Feb 12 20:23:17.209429 kubelet[2327]: I0212 20:23:17.209407 2327 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6ae380b9f58b2f3bdcc9865a3d87ab2d-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-19-54\" (UID: \"6ae380b9f58b2f3bdcc9865a3d87ab2d\") " pod="kube-system/kube-apiserver-ip-172-31-19-54" Feb 12 20:23:17.209607 kubelet[2327]: I0212 20:23:17.209586 2327 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4f175323180a275fb7b08ae316705d28-ca-certs\") pod \"kube-controller-manager-ip-172-31-19-54\" (UID: \"4f175323180a275fb7b08ae316705d28\") " pod="kube-system/kube-controller-manager-ip-172-31-19-54" Feb 12 20:23:17.209776 kubelet[2327]: I0212 20:23:17.209755 2327 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4f175323180a275fb7b08ae316705d28-k8s-certs\") pod \"kube-controller-manager-ip-172-31-19-54\" (UID: \"4f175323180a275fb7b08ae316705d28\") " pod="kube-system/kube-controller-manager-ip-172-31-19-54" Feb 12 20:23:17.209939 kubelet[2327]: I0212 20:23:17.209919 2327 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6ae380b9f58b2f3bdcc9865a3d87ab2d-k8s-certs\") pod \"kube-apiserver-ip-172-31-19-54\" (UID: \"6ae380b9f58b2f3bdcc9865a3d87ab2d\") " pod="kube-system/kube-apiserver-ip-172-31-19-54" Feb 12 20:23:17.210090 kubelet[2327]: I0212 20:23:17.210070 2327 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4f175323180a275fb7b08ae316705d28-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-19-54\" (UID: \"4f175323180a275fb7b08ae316705d28\") " pod="kube-system/kube-controller-manager-ip-172-31-19-54" Feb 12 20:23:17.210252 kubelet[2327]: I0212 20:23:17.210231 2327 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4f175323180a275fb7b08ae316705d28-kubeconfig\") pod \"kube-controller-manager-ip-172-31-19-54\" (UID: \"4f175323180a275fb7b08ae316705d28\") " pod="kube-system/kube-controller-manager-ip-172-31-19-54" Feb 12 20:23:17.210420 kubelet[2327]: I0212 20:23:17.210397 2327 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4f175323180a275fb7b08ae316705d28-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-19-54\" (UID: \"4f175323180a275fb7b08ae316705d28\") " pod="kube-system/kube-controller-manager-ip-172-31-19-54" Feb 12 20:23:17.210845 kubelet[2327]: E0212 20:23:17.210819 2327 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.19.54:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-19-54?timeout=10s\": dial tcp 172.31.19.54:6443: connect: connection refused" interval="400ms" Feb 12 20:23:17.315601 kubelet[2327]: I0212 20:23:17.315487 2327 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-19-54" Feb 12 20:23:17.316510 kubelet[2327]: E0212 20:23:17.316482 2327 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.19.54:6443/api/v1/nodes\": dial tcp 172.31.19.54:6443: connect: connection refused" node="ip-172-31-19-54" Feb 12 20:23:17.486645 env[1651]: time="2024-02-12T20:23:17.486090083Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-19-54,Uid:6ae380b9f58b2f3bdcc9865a3d87ab2d,Namespace:kube-system,Attempt:0,}" Feb 12 20:23:17.492691 env[1651]: time="2024-02-12T20:23:17.492623674Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-19-54,Uid:4f175323180a275fb7b08ae316705d28,Namespace:kube-system,Attempt:0,}" Feb 12 20:23:17.501496 env[1651]: time="2024-02-12T20:23:17.501433496Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-19-54,Uid:0ac7e1193fcbd3e71e50e4d25a6adb04,Namespace:kube-system,Attempt:0,}" Feb 12 20:23:17.611791 kubelet[2327]: E0212 20:23:17.611639 2327 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.19.54:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-19-54?timeout=10s\": dial tcp 172.31.19.54:6443: connect: connection refused" interval="800ms" Feb 12 20:23:17.719124 kubelet[2327]: I0212 20:23:17.719084 2327 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-19-54" Feb 12 20:23:17.719596 kubelet[2327]: E0212 20:23:17.719569 2327 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.19.54:6443/api/v1/nodes\": dial tcp 172.31.19.54:6443: connect: connection refused" node="ip-172-31-19-54" Feb 12 20:23:18.077983 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount30075444.mount: Deactivated successfully. Feb 12 20:23:18.089288 env[1651]: time="2024-02-12T20:23:18.089150511Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:18.090843 env[1651]: time="2024-02-12T20:23:18.090776935Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:18.096493 env[1651]: time="2024-02-12T20:23:18.096422051Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:18.098499 env[1651]: time="2024-02-12T20:23:18.098446165Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:18.100855 env[1651]: time="2024-02-12T20:23:18.100800316Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:18.102791 env[1651]: time="2024-02-12T20:23:18.102739952Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:18.104236 env[1651]: time="2024-02-12T20:23:18.104164093Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:18.109922 env[1651]: time="2024-02-12T20:23:18.109871701Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:18.116556 env[1651]: time="2024-02-12T20:23:18.116506269Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:18.119332 env[1651]: time="2024-02-12T20:23:18.119249216Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:18.120809 env[1651]: time="2024-02-12T20:23:18.120738957Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:18.122305 env[1651]: time="2024-02-12T20:23:18.122231975Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:18.162114 kubelet[2327]: W0212 20:23:18.162018 2327 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.19.54:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.19.54:6443: connect: connection refused Feb 12 20:23:18.162114 kubelet[2327]: E0212 20:23:18.162081 2327 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.19.54:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.19.54:6443: connect: connection refused Feb 12 20:23:18.168404 env[1651]: time="2024-02-12T20:23:18.168233672Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:23:18.174176 env[1651]: time="2024-02-12T20:23:18.168617679Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:23:18.174176 env[1651]: time="2024-02-12T20:23:18.168683519Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:23:18.174176 env[1651]: time="2024-02-12T20:23:18.169069411Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/376b453d655e1052827b14b566d20dcaf8d0601d9aaadc2243f897043429642e pid=2366 runtime=io.containerd.runc.v2 Feb 12 20:23:18.209517 systemd[1]: Started cri-containerd-376b453d655e1052827b14b566d20dcaf8d0601d9aaadc2243f897043429642e.scope. Feb 12 20:23:18.239107 env[1651]: time="2024-02-12T20:23:18.238748773Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:23:18.239107 env[1651]: time="2024-02-12T20:23:18.238801771Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:23:18.239107 env[1651]: time="2024-02-12T20:23:18.238827754Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:23:18.239107 env[1651]: time="2024-02-12T20:23:18.238650434Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:23:18.239107 env[1651]: time="2024-02-12T20:23:18.238736160Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:23:18.239107 env[1651]: time="2024-02-12T20:23:18.238763451Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:23:18.241320 env[1651]: time="2024-02-12T20:23:18.239218506Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3ac5fa9a36efd963c16378fe02bb11ae08dce216a0e9d7b2608455bdcc9159d0 pid=2397 runtime=io.containerd.runc.v2 Feb 12 20:23:18.241320 env[1651]: time="2024-02-12T20:23:18.240800142Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/282e210a4807228453ff2a2916ee8836f1534c6697aec5d666e769c0d8d358ce pid=2393 runtime=io.containerd.runc.v2 Feb 12 20:23:18.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.252000 audit: BPF prog-id=73 op=LOAD Feb 12 20:23:18.253000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.253000 audit[2377]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2366 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337366234353364363535653130353238323762313462353636643230 Feb 12 20:23:18.253000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.253000 audit[2377]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2366 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337366234353364363535653130353238323762313462353636643230 Feb 12 20:23:18.253000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.253000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.253000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.253000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.253000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.253000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.253000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.253000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.253000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.253000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.253000 audit: BPF prog-id=74 op=LOAD Feb 12 20:23:18.253000 audit[2377]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2366 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337366234353364363535653130353238323762313462353636643230 Feb 12 20:23:18.253000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.253000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.253000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.253000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.253000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.253000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.253000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.253000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.253000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.253000 audit: BPF prog-id=75 op=LOAD Feb 12 20:23:18.253000 audit[2377]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2366 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337366234353364363535653130353238323762313462353636643230 Feb 12 20:23:18.254000 audit: BPF prog-id=75 op=UNLOAD Feb 12 20:23:18.254000 audit: BPF prog-id=74 op=UNLOAD Feb 12 20:23:18.254000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.254000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.254000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.254000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.254000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.254000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.254000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.254000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.254000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.254000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.254000 audit: BPF prog-id=76 op=LOAD Feb 12 20:23:18.254000 audit[2377]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2366 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337366234353364363535653130353238323762313462353636643230 Feb 12 20:23:18.262852 kubelet[2327]: W0212 20:23:18.261774 2327 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.19.54:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.19.54:6443: connect: connection refused Feb 12 20:23:18.262852 kubelet[2327]: E0212 20:23:18.261833 2327 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.19.54:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.19.54:6443: connect: connection refused Feb 12 20:23:18.284406 systemd[1]: Started cri-containerd-3ac5fa9a36efd963c16378fe02bb11ae08dce216a0e9d7b2608455bdcc9159d0.scope. Feb 12 20:23:18.305814 systemd[1]: Started cri-containerd-282e210a4807228453ff2a2916ee8836f1534c6697aec5d666e769c0d8d358ce.scope. Feb 12 20:23:18.314317 kubelet[2327]: W0212 20:23:18.310310 2327 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.19.54:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-19-54&limit=500&resourceVersion=0": dial tcp 172.31.19.54:6443: connect: connection refused Feb 12 20:23:18.314317 kubelet[2327]: E0212 20:23:18.310429 2327 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.19.54:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-19-54&limit=500&resourceVersion=0": dial tcp 172.31.19.54:6443: connect: connection refused Feb 12 20:23:18.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.332000 audit: BPF prog-id=77 op=LOAD Feb 12 20:23:18.339880 kubelet[2327]: W0212 20:23:18.339765 2327 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.19.54:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.19.54:6443: connect: connection refused Feb 12 20:23:18.339880 kubelet[2327]: E0212 20:23:18.339848 2327 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.19.54:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.19.54:6443: connect: connection refused Feb 12 20:23:18.339000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.339000 audit[2425]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2397 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361633566613961333665666439363363313633373866653032626231 Feb 12 20:23:18.340000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.340000 audit[2425]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2397 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361633566613961333665666439363363313633373866653032626231 Feb 12 20:23:18.340000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.340000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.340000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.340000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.340000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.340000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.340000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.340000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.340000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.340000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.340000 audit: BPF prog-id=78 op=LOAD Feb 12 20:23:18.340000 audit[2425]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2397 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361633566613961333665666439363363313633373866653032626231 Feb 12 20:23:18.340000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.340000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.340000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.340000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.340000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.340000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.340000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.340000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.340000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.340000 audit: BPF prog-id=79 op=LOAD Feb 12 20:23:18.340000 audit[2425]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2397 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361633566613961333665666439363363313633373866653032626231 Feb 12 20:23:18.341000 audit: BPF prog-id=79 op=UNLOAD Feb 12 20:23:18.341000 audit: BPF prog-id=78 op=UNLOAD Feb 12 20:23:18.341000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.341000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.341000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.341000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.341000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.341000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.341000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.341000 audit[2425]: AVC avc: denied { perfmon } for pid=2425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.341000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.341000 audit[2425]: AVC avc: denied { bpf } for pid=2425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.341000 audit: BPF prog-id=80 op=LOAD Feb 12 20:23:18.341000 audit[2425]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2397 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361633566613961333665666439363363313633373866653032626231 Feb 12 20:23:18.347287 env[1651]: time="2024-02-12T20:23:18.345150344Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-19-54,Uid:6ae380b9f58b2f3bdcc9865a3d87ab2d,Namespace:kube-system,Attempt:0,} returns sandbox id \"376b453d655e1052827b14b566d20dcaf8d0601d9aaadc2243f897043429642e\"" Feb 12 20:23:18.358302 env[1651]: time="2024-02-12T20:23:18.356481382Z" level=info msg="CreateContainer within sandbox \"376b453d655e1052827b14b566d20dcaf8d0601d9aaadc2243f897043429642e\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 12 20:23:18.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.372000 audit: BPF prog-id=81 op=LOAD Feb 12 20:23:18.374000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.374000 audit[2432]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2393 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238326532313061343830373232383435336666326132393136656538 Feb 12 20:23:18.374000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.374000 audit[2432]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2393 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238326532313061343830373232383435336666326132393136656538 Feb 12 20:23:18.374000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.374000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.374000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.374000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.374000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.374000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.374000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.374000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.374000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.374000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.374000 audit: BPF prog-id=82 op=LOAD Feb 12 20:23:18.374000 audit[2432]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2393 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238326532313061343830373232383435336666326132393136656538 Feb 12 20:23:18.375000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.375000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.375000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.375000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.375000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.375000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.375000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.375000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.375000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.375000 audit: BPF prog-id=83 op=LOAD Feb 12 20:23:18.375000 audit[2432]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2393 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238326532313061343830373232383435336666326132393136656538 Feb 12 20:23:18.375000 audit: BPF prog-id=83 op=UNLOAD Feb 12 20:23:18.375000 audit: BPF prog-id=82 op=UNLOAD Feb 12 20:23:18.375000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.375000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.375000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.375000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.375000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.375000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.375000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.375000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.375000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.375000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.375000 audit: BPF prog-id=84 op=LOAD Feb 12 20:23:18.375000 audit[2432]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2393 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238326532313061343830373232383435336666326132393136656538 Feb 12 20:23:18.389088 env[1651]: time="2024-02-12T20:23:18.389003762Z" level=info msg="CreateContainer within sandbox \"376b453d655e1052827b14b566d20dcaf8d0601d9aaadc2243f897043429642e\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"808812eb303ef8bc5379d15be4c75bc8a0fb95eedd8ae610a4d9bd0b4b2e4c25\"" Feb 12 20:23:18.390135 env[1651]: time="2024-02-12T20:23:18.390070935Z" level=info msg="StartContainer for \"808812eb303ef8bc5379d15be4c75bc8a0fb95eedd8ae610a4d9bd0b4b2e4c25\"" Feb 12 20:23:18.413564 kubelet[2327]: E0212 20:23:18.413481 2327 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.19.54:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-19-54?timeout=10s\": dial tcp 172.31.19.54:6443: connect: connection refused" interval="1.6s" Feb 12 20:23:18.441899 env[1651]: time="2024-02-12T20:23:18.441838878Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-19-54,Uid:0ac7e1193fcbd3e71e50e4d25a6adb04,Namespace:kube-system,Attempt:0,} returns sandbox id \"3ac5fa9a36efd963c16378fe02bb11ae08dce216a0e9d7b2608455bdcc9159d0\"" Feb 12 20:23:18.457931 env[1651]: time="2024-02-12T20:23:18.457863480Z" level=info msg="CreateContainer within sandbox \"3ac5fa9a36efd963c16378fe02bb11ae08dce216a0e9d7b2608455bdcc9159d0\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 12 20:23:18.475611 systemd[1]: Started cri-containerd-808812eb303ef8bc5379d15be4c75bc8a0fb95eedd8ae610a4d9bd0b4b2e4c25.scope. Feb 12 20:23:18.487008 env[1651]: time="2024-02-12T20:23:18.486948490Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-19-54,Uid:4f175323180a275fb7b08ae316705d28,Namespace:kube-system,Attempt:0,} returns sandbox id \"282e210a4807228453ff2a2916ee8836f1534c6697aec5d666e769c0d8d358ce\"" Feb 12 20:23:18.491609 env[1651]: time="2024-02-12T20:23:18.491511120Z" level=info msg="CreateContainer within sandbox \"3ac5fa9a36efd963c16378fe02bb11ae08dce216a0e9d7b2608455bdcc9159d0\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"d0982d300617c2d6f87557976a09072bf4081f03503814b08315dc40ed8d89bd\"" Feb 12 20:23:18.494498 env[1651]: time="2024-02-12T20:23:18.494429215Z" level=info msg="CreateContainer within sandbox \"282e210a4807228453ff2a2916ee8836f1534c6697aec5d666e769c0d8d358ce\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 12 20:23:18.497598 env[1651]: time="2024-02-12T20:23:18.497527078Z" level=info msg="StartContainer for \"d0982d300617c2d6f87557976a09072bf4081f03503814b08315dc40ed8d89bd\"" Feb 12 20:23:18.522379 env[1651]: time="2024-02-12T20:23:18.522010299Z" level=info msg="CreateContainer within sandbox \"282e210a4807228453ff2a2916ee8836f1534c6697aec5d666e769c0d8d358ce\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"800bb18dc6e8a58fbf74f3b3aa14623c26ce6765dca4123967772ea98ca7ac8e\"" Feb 12 20:23:18.525801 env[1651]: time="2024-02-12T20:23:18.525748483Z" level=info msg="StartContainer for \"800bb18dc6e8a58fbf74f3b3aa14623c26ce6765dca4123967772ea98ca7ac8e\"" Feb 12 20:23:18.526324 kubelet[2327]: I0212 20:23:18.526242 2327 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-19-54" Feb 12 20:23:18.526992 kubelet[2327]: E0212 20:23:18.526923 2327 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.19.54:6443/api/v1/nodes\": dial tcp 172.31.19.54:6443: connect: connection refused" node="ip-172-31-19-54" Feb 12 20:23:18.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.534000 audit: BPF prog-id=85 op=LOAD Feb 12 20:23:18.535000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.535000 audit[2471]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000149b38 a2=10 a3=0 items=0 ppid=2366 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383831326562333033656638626335333739643135626534633735 Feb 12 20:23:18.535000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.535000 audit[2471]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001495a0 a2=3c a3=0 items=0 ppid=2366 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383831326562333033656638626335333739643135626534633735 Feb 12 20:23:18.536000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.536000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.536000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.536000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.536000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.536000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.536000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.536000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.536000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.536000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.536000 audit: BPF prog-id=86 op=LOAD Feb 12 20:23:18.536000 audit[2471]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001498e0 a2=78 a3=0 items=0 ppid=2366 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383831326562333033656638626335333739643135626534633735 Feb 12 20:23:18.538000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.538000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.538000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.538000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.538000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.538000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.538000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.538000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.538000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.538000 audit: BPF prog-id=87 op=LOAD Feb 12 20:23:18.538000 audit[2471]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000149670 a2=78 a3=0 items=0 ppid=2366 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383831326562333033656638626335333739643135626534633735 Feb 12 20:23:18.542000 audit: BPF prog-id=87 op=UNLOAD Feb 12 20:23:18.542000 audit: BPF prog-id=86 op=UNLOAD Feb 12 20:23:18.542000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.542000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.542000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.542000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.542000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.542000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.542000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.542000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.542000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.542000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.542000 audit: BPF prog-id=88 op=LOAD Feb 12 20:23:18.542000 audit[2471]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000149b40 a2=78 a3=0 items=0 ppid=2366 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383831326562333033656638626335333739643135626534633735 Feb 12 20:23:18.565819 systemd[1]: Started cri-containerd-d0982d300617c2d6f87557976a09072bf4081f03503814b08315dc40ed8d89bd.scope. Feb 12 20:23:18.596468 systemd[1]: Started cri-containerd-800bb18dc6e8a58fbf74f3b3aa14623c26ce6765dca4123967772ea98ca7ac8e.scope. Feb 12 20:23:18.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.629000 audit: BPF prog-id=89 op=LOAD Feb 12 20:23:18.630000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.630000 audit[2514]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2397 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430393832643330303631376332643666383735353739373661303930 Feb 12 20:23:18.630000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.630000 audit[2514]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2397 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430393832643330303631376332643666383735353739373661303930 Feb 12 20:23:18.631000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.631000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.631000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.631000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.631000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.631000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.631000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.631000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.631000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.631000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.631000 audit: BPF prog-id=90 op=LOAD Feb 12 20:23:18.631000 audit[2514]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2397 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430393832643330303631376332643666383735353739373661303930 Feb 12 20:23:18.631000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.631000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.631000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.631000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.631000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.631000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.631000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.631000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.631000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.631000 audit: BPF prog-id=91 op=LOAD Feb 12 20:23:18.631000 audit[2514]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2397 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430393832643330303631376332643666383735353739373661303930 Feb 12 20:23:18.640000 audit: BPF prog-id=91 op=UNLOAD Feb 12 20:23:18.640000 audit: BPF prog-id=90 op=UNLOAD Feb 12 20:23:18.644328 env[1651]: time="2024-02-12T20:23:18.642594058Z" level=info msg="StartContainer for \"808812eb303ef8bc5379d15be4c75bc8a0fb95eedd8ae610a4d9bd0b4b2e4c25\" returns successfully" Feb 12 20:23:18.641000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.641000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.641000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.641000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.641000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.641000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.641000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.641000 audit[2514]: AVC avc: denied { perfmon } for pid=2514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.641000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.641000 audit[2514]: AVC avc: denied { bpf } for pid=2514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.641000 audit: BPF prog-id=92 op=LOAD Feb 12 20:23:18.641000 audit[2514]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2397 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430393832643330303631376332643666383735353739373661303930 Feb 12 20:23:18.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.680000 audit: BPF prog-id=93 op=LOAD Feb 12 20:23:18.681000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.681000 audit[2528]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2393 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830306262313864633665386135386662663734663362336161313436 Feb 12 20:23:18.682000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.682000 audit[2528]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2393 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830306262313864633665386135386662663734663362336161313436 Feb 12 20:23:18.682000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.682000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.682000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.682000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.682000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.682000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.682000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.682000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.682000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.682000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.682000 audit: BPF prog-id=94 op=LOAD Feb 12 20:23:18.682000 audit[2528]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2393 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830306262313864633665386135386662663734663362336161313436 Feb 12 20:23:18.683000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.683000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.683000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.683000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.683000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.683000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.683000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.683000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.683000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.683000 audit: BPF prog-id=95 op=LOAD Feb 12 20:23:18.683000 audit[2528]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2393 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830306262313864633665386135386662663734663362336161313436 Feb 12 20:23:18.685000 audit: BPF prog-id=95 op=UNLOAD Feb 12 20:23:18.685000 audit: BPF prog-id=94 op=UNLOAD Feb 12 20:23:18.685000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.685000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.685000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.685000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.685000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.685000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.685000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.685000 audit[2528]: AVC avc: denied { perfmon } for pid=2528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.685000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.685000 audit[2528]: AVC avc: denied { bpf } for pid=2528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:18.685000 audit: BPF prog-id=96 op=LOAD Feb 12 20:23:18.685000 audit[2528]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2393 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:18.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830306262313864633665386135386662663734663362336161313436 Feb 12 20:23:18.724230 env[1651]: time="2024-02-12T20:23:18.724164778Z" level=info msg="StartContainer for \"d0982d300617c2d6f87557976a09072bf4081f03503814b08315dc40ed8d89bd\" returns successfully" Feb 12 20:23:18.755669 env[1651]: time="2024-02-12T20:23:18.755605704Z" level=info msg="StartContainer for \"800bb18dc6e8a58fbf74f3b3aa14623c26ce6765dca4123967772ea98ca7ac8e\" returns successfully" Feb 12 20:23:20.128827 kubelet[2327]: I0212 20:23:20.128774 2327 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-19-54" Feb 12 20:23:21.715000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:23:21.718861 kernel: kauditd_printk_skb: 557 callbacks suppressed Feb 12 20:23:21.719022 kernel: audit: type=1400 audit(1707769401.715:727): avc: denied { watch } for pid=2497 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:23:21.715000 audit[2497]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4003d445a0 a2=fc6 a3=0 items=0 ppid=2366 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 key=(null) Feb 12 20:23:21.742846 kernel: audit: type=1300 audit(1707769401.715:727): arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4003d445a0 a2=fc6 a3=0 items=0 ppid=2366 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 key=(null) Feb 12 20:23:21.715000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:23:21.756728 kernel: audit: type=1327 audit(1707769401.715:727): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:23:21.715000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:23:21.769572 kernel: audit: type=1400 audit(1707769401.715:728): avc: denied { watch } for pid=2497 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:23:21.715000 audit[2497]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=40044c20c0 a2=fc6 a3=0 items=0 ppid=2366 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 key=(null) Feb 12 20:23:21.785073 kernel: audit: type=1300 audit(1707769401.715:728): arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=40044c20c0 a2=fc6 a3=0 items=0 ppid=2366 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 key=(null) Feb 12 20:23:21.715000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:23:21.807384 kernel: audit: type=1327 audit(1707769401.715:728): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:23:21.715000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:23:21.818018 kernel: audit: type=1400 audit(1707769401.715:729): avc: denied { watch } for pid=2497 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:23:21.715000 audit[2497]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=400396a0c0 a2=fc6 a3=0 items=0 ppid=2366 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 key=(null) Feb 12 20:23:21.833006 kernel: audit: type=1300 audit(1707769401.715:729): arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=400396a0c0 a2=fc6 a3=0 items=0 ppid=2366 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 key=(null) Feb 12 20:23:21.715000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:23:21.847419 kernel: audit: type=1327 audit(1707769401.715:729): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:23:21.847547 kernel: audit: type=1400 audit(1707769401.729:730): avc: denied { watch } for pid=2497 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:23:21.729000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:23:21.729000 audit[2497]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=49 a1=4007ffa870 a2=fc6 a3=0 items=0 ppid=2366 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 key=(null) Feb 12 20:23:21.729000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:23:21.939000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:23:21.939000 audit[2497]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=65 a1=4003d3db00 a2=fc6 a3=0 items=0 ppid=2366 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 key=(null) Feb 12 20:23:21.939000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:23:21.939000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:23:21.939000 audit[2497]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=65 a1=4004cc8f30 a2=fc6 a3=0 items=0 ppid=2366 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 key=(null) Feb 12 20:23:21.939000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:23:21.990812 kubelet[2327]: I0212 20:23:21.990695 2327 apiserver.go:52] "Watching apiserver" Feb 12 20:23:22.108915 kubelet[2327]: I0212 20:23:22.108875 2327 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 12 20:23:22.147595 kubelet[2327]: I0212 20:23:22.147536 2327 reconciler.go:41] "Reconciler: start to sync state" Feb 12 20:23:22.245694 kubelet[2327]: I0212 20:23:22.245573 2327 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-19-54" Feb 12 20:23:22.247371 kubelet[2327]: E0212 20:23:22.247331 2327 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-19-54\" not found" node="ip-172-31-19-54" Feb 12 20:23:23.722000 audit[2551]: AVC avc: denied { watch } for pid=2551 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:23:23.722000 audit[2551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4001174000 a2=fc6 a3=0 items=0 ppid=2393 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 key=(null) Feb 12 20:23:23.722000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:23:23.724000 audit[2551]: AVC avc: denied { watch } for pid=2551 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:23:23.724000 audit[2551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400116a040 a2=fc6 a3=0 items=0 ppid=2393 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 key=(null) Feb 12 20:23:23.724000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:23:24.846000 audit[2551]: AVC avc: denied { watch } for pid=2551 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 20:23:24.846000 audit[2551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000bd8b00 a2=fc6 a3=0 items=0 ppid=2393 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 key=(null) Feb 12 20:23:24.846000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:23:24.979019 update_engine[1630]: I0212 20:23:24.978472 1630 update_attempter.cc:509] Updating boot flags... Feb 12 20:23:25.574467 systemd[1]: Reloading. Feb 12 20:23:25.806247 /usr/lib/systemd/system-generators/torcx-generator[2708]: time="2024-02-12T20:23:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:23:25.809398 /usr/lib/systemd/system-generators/torcx-generator[2708]: time="2024-02-12T20:23:25Z" level=info msg="torcx already run" Feb 12 20:23:26.022560 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:23:26.022600 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:23:26.069734 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:23:26.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.278000 audit: BPF prog-id=97 op=LOAD Feb 12 20:23:26.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.279000 audit: BPF prog-id=98 op=LOAD Feb 12 20:23:26.279000 audit: BPF prog-id=58 op=UNLOAD Feb 12 20:23:26.279000 audit: BPF prog-id=59 op=UNLOAD Feb 12 20:23:26.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.281000 audit: BPF prog-id=99 op=LOAD Feb 12 20:23:26.281000 audit: BPF prog-id=60 op=UNLOAD Feb 12 20:23:26.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.282000 audit: BPF prog-id=100 op=LOAD Feb 12 20:23:26.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.282000 audit: BPF prog-id=101 op=LOAD Feb 12 20:23:26.282000 audit: BPF prog-id=61 op=UNLOAD Feb 12 20:23:26.282000 audit: BPF prog-id=62 op=UNLOAD Feb 12 20:23:26.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.283000 audit: BPF prog-id=102 op=LOAD Feb 12 20:23:26.283000 audit: BPF prog-id=63 op=UNLOAD Feb 12 20:23:26.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.289000 audit: BPF prog-id=103 op=LOAD Feb 12 20:23:26.289000 audit: BPF prog-id=73 op=UNLOAD Feb 12 20:23:26.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.292000 audit: BPF prog-id=104 op=LOAD Feb 12 20:23:26.292000 audit: BPF prog-id=64 op=UNLOAD Feb 12 20:23:26.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.293000 audit: BPF prog-id=105 op=LOAD Feb 12 20:23:26.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.293000 audit: BPF prog-id=106 op=LOAD Feb 12 20:23:26.293000 audit: BPF prog-id=65 op=UNLOAD Feb 12 20:23:26.293000 audit: BPF prog-id=66 op=UNLOAD Feb 12 20:23:26.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.294000 audit: BPF prog-id=107 op=LOAD Feb 12 20:23:26.294000 audit: BPF prog-id=67 op=UNLOAD Feb 12 20:23:26.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.301000 audit: BPF prog-id=108 op=LOAD Feb 12 20:23:26.301000 audit: BPF prog-id=81 op=UNLOAD Feb 12 20:23:26.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.302000 audit: BPF prog-id=109 op=LOAD Feb 12 20:23:26.302000 audit: BPF prog-id=93 op=UNLOAD Feb 12 20:23:26.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.303000 audit: BPF prog-id=110 op=LOAD Feb 12 20:23:26.303000 audit: BPF prog-id=68 op=UNLOAD Feb 12 20:23:26.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.306000 audit: BPF prog-id=111 op=LOAD Feb 12 20:23:26.306000 audit: BPF prog-id=69 op=UNLOAD Feb 12 20:23:26.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.307000 audit: BPF prog-id=112 op=LOAD Feb 12 20:23:26.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.307000 audit: BPF prog-id=113 op=LOAD Feb 12 20:23:26.307000 audit: BPF prog-id=70 op=UNLOAD Feb 12 20:23:26.307000 audit: BPF prog-id=71 op=UNLOAD Feb 12 20:23:26.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.308000 audit: BPF prog-id=114 op=LOAD Feb 12 20:23:26.308000 audit: BPF prog-id=85 op=UNLOAD Feb 12 20:23:26.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.314000 audit: BPF prog-id=115 op=LOAD Feb 12 20:23:26.314000 audit: BPF prog-id=89 op=UNLOAD Feb 12 20:23:26.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.316000 audit: BPF prog-id=116 op=LOAD Feb 12 20:23:26.316000 audit: BPF prog-id=77 op=UNLOAD Feb 12 20:23:26.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.319000 audit: BPF prog-id=117 op=LOAD Feb 12 20:23:26.319000 audit: BPF prog-id=72 op=UNLOAD Feb 12 20:23:26.380855 systemd[1]: Stopping kubelet.service... Feb 12 20:23:26.398051 systemd[1]: kubelet.service: Deactivated successfully. Feb 12 20:23:26.398495 systemd[1]: Stopped kubelet.service. Feb 12 20:23:26.398585 systemd[1]: kubelet.service: Consumed 1.654s CPU time. Feb 12 20:23:26.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:23:26.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:23:26.402772 systemd[1]: Started kubelet.service. Feb 12 20:23:26.543920 kubelet[2764]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:23:26.543920 kubelet[2764]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 20:23:26.543920 kubelet[2764]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:23:26.544563 kubelet[2764]: I0212 20:23:26.543961 2764 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 20:23:26.554967 kubelet[2764]: I0212 20:23:26.554916 2764 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 12 20:23:26.554967 kubelet[2764]: I0212 20:23:26.554960 2764 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 20:23:26.555443 kubelet[2764]: I0212 20:23:26.555406 2764 server.go:837] "Client rotation is on, will bootstrap in background" Feb 12 20:23:26.558478 kubelet[2764]: I0212 20:23:26.558403 2764 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 12 20:23:26.566941 kubelet[2764]: I0212 20:23:26.566870 2764 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 20:23:26.571246 kubelet[2764]: W0212 20:23:26.571205 2764 machine.go:65] Cannot read vendor id correctly, set empty. Feb 12 20:23:26.573293 kubelet[2764]: I0212 20:23:26.573227 2764 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 20:23:26.573697 kubelet[2764]: I0212 20:23:26.573671 2764 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 20:23:26.573835 kubelet[2764]: I0212 20:23:26.573809 2764 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 20:23:26.573977 kubelet[2764]: I0212 20:23:26.573853 2764 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 20:23:26.573977 kubelet[2764]: I0212 20:23:26.573879 2764 container_manager_linux.go:302] "Creating device plugin manager" Feb 12 20:23:26.573977 kubelet[2764]: I0212 20:23:26.573931 2764 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:23:26.579846 kubelet[2764]: I0212 20:23:26.579801 2764 kubelet.go:405] "Attempting to sync node with API server" Feb 12 20:23:26.588146 kubelet[2764]: I0212 20:23:26.583853 2764 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 20:23:26.588146 kubelet[2764]: I0212 20:23:26.583950 2764 kubelet.go:309] "Adding apiserver pod source" Feb 12 20:23:26.588146 kubelet[2764]: I0212 20:23:26.583983 2764 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 20:23:26.604325 kubelet[2764]: I0212 20:23:26.603823 2764 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 20:23:26.606645 kubelet[2764]: I0212 20:23:26.606595 2764 server.go:1168] "Started kubelet" Feb 12 20:23:26.623582 kubelet[2764]: I0212 20:23:26.623539 2764 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 20:23:26.625328 kubelet[2764]: I0212 20:23:26.625296 2764 server.go:461] "Adding debug handlers to kubelet server" Feb 12 20:23:26.629098 kubelet[2764]: I0212 20:23:26.629063 2764 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 20:23:26.630000 audit[2764]: AVC avc: denied { mac_admin } for pid=2764 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.630000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:23:26.630000 audit[2764]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000cb7530 a1=4000d46108 a2=4000cb7500 a3=25 items=0 ppid=1 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:26.630000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:23:26.631909 kubelet[2764]: I0212 20:23:26.631842 2764 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 20:23:26.631000 audit[2764]: AVC avc: denied { mac_admin } for pid=2764 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.631000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:23:26.631000 audit[2764]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000cb53c0 a1=4000d468e8 a2=4000cb7890 a3=25 items=0 ppid=1 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:26.631000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:23:26.632457 kubelet[2764]: I0212 20:23:26.631963 2764 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 20:23:26.632457 kubelet[2764]: I0212 20:23:26.632004 2764 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 20:23:26.639815 kubelet[2764]: E0212 20:23:26.639736 2764 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 20:23:26.641664 kubelet[2764]: E0212 20:23:26.641603 2764 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 20:23:26.643084 kubelet[2764]: I0212 20:23:26.640430 2764 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 12 20:23:26.643343 kubelet[2764]: I0212 20:23:26.640521 2764 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 12 20:23:26.717540 kubelet[2764]: I0212 20:23:26.717152 2764 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 20:23:26.720461 kubelet[2764]: I0212 20:23:26.720394 2764 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 20:23:26.720461 kubelet[2764]: I0212 20:23:26.720450 2764 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 12 20:23:26.720695 kubelet[2764]: I0212 20:23:26.720486 2764 kubelet.go:2257] "Starting kubelet main sync loop" Feb 12 20:23:26.720695 kubelet[2764]: E0212 20:23:26.720589 2764 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 20:23:26.752931 kubelet[2764]: I0212 20:23:26.752850 2764 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-19-54" Feb 12 20:23:26.816489 kubelet[2764]: I0212 20:23:26.816358 2764 kubelet_node_status.go:108] "Node was previously registered" node="ip-172-31-19-54" Feb 12 20:23:26.819398 kubelet[2764]: I0212 20:23:26.819339 2764 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-19-54" Feb 12 20:23:26.820714 kubelet[2764]: E0212 20:23:26.820668 2764 kubelet.go:2281] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 12 20:23:26.845481 kubelet[2764]: I0212 20:23:26.845430 2764 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 20:23:26.845631 kubelet[2764]: I0212 20:23:26.845472 2764 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 20:23:26.845631 kubelet[2764]: I0212 20:23:26.845548 2764 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:23:26.845877 kubelet[2764]: I0212 20:23:26.845838 2764 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 12 20:23:26.845877 kubelet[2764]: I0212 20:23:26.845877 2764 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 12 20:23:26.846034 kubelet[2764]: I0212 20:23:26.845895 2764 policy_none.go:49] "None policy: Start" Feb 12 20:23:26.849650 kubelet[2764]: I0212 20:23:26.849593 2764 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 20:23:26.849650 kubelet[2764]: I0212 20:23:26.849657 2764 state_mem.go:35] "Initializing new in-memory state store" Feb 12 20:23:26.849946 kubelet[2764]: I0212 20:23:26.849909 2764 state_mem.go:75] "Updated machine memory state" Feb 12 20:23:26.858460 kubelet[2764]: I0212 20:23:26.858406 2764 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 20:23:26.858635 kubelet[2764]: I0212 20:23:26.858522 2764 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 20:23:26.868398 kernel: kauditd_printk_skb: 271 callbacks suppressed Feb 12 20:23:26.868543 kernel: audit: type=1400 audit(1707769406.857:984): avc: denied { mac_admin } for pid=2764 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.857000 audit[2764]: AVC avc: denied { mac_admin } for pid=2764 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:26.868686 kubelet[2764]: I0212 20:23:26.858846 2764 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 20:23:26.857000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:23:26.879868 kernel: audit: type=1401 audit(1707769406.857:984): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:23:26.898056 kernel: audit: type=1300 audit(1707769406.857:984): arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c51e30 a1=40012201f8 a2=4000c51e00 a3=25 items=0 ppid=1 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:26.857000 audit[2764]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c51e30 a1=40012201f8 a2=4000c51e00 a3=25 items=0 ppid=1 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:26.857000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:23:26.913580 kernel: audit: type=1327 audit(1707769406.857:984): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:23:27.021238 kubelet[2764]: I0212 20:23:27.021175 2764 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:23:27.021439 kubelet[2764]: I0212 20:23:27.021426 2764 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:23:27.022348 kubelet[2764]: I0212 20:23:27.022266 2764 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:23:27.045265 kubelet[2764]: E0212 20:23:27.045214 2764 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ip-172-31-19-54\" already exists" pod="kube-system/kube-scheduler-ip-172-31-19-54" Feb 12 20:23:27.049884 kubelet[2764]: I0212 20:23:27.049823 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6ae380b9f58b2f3bdcc9865a3d87ab2d-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-19-54\" (UID: \"6ae380b9f58b2f3bdcc9865a3d87ab2d\") " pod="kube-system/kube-apiserver-ip-172-31-19-54" Feb 12 20:23:27.050032 kubelet[2764]: I0212 20:23:27.049934 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4f175323180a275fb7b08ae316705d28-kubeconfig\") pod \"kube-controller-manager-ip-172-31-19-54\" (UID: \"4f175323180a275fb7b08ae316705d28\") " pod="kube-system/kube-controller-manager-ip-172-31-19-54" Feb 12 20:23:27.050096 kubelet[2764]: I0212 20:23:27.050073 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4f175323180a275fb7b08ae316705d28-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-19-54\" (UID: \"4f175323180a275fb7b08ae316705d28\") " pod="kube-system/kube-controller-manager-ip-172-31-19-54" Feb 12 20:23:27.050161 kubelet[2764]: I0212 20:23:27.050127 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0ac7e1193fcbd3e71e50e4d25a6adb04-kubeconfig\") pod \"kube-scheduler-ip-172-31-19-54\" (UID: \"0ac7e1193fcbd3e71e50e4d25a6adb04\") " pod="kube-system/kube-scheduler-ip-172-31-19-54" Feb 12 20:23:27.050253 kubelet[2764]: I0212 20:23:27.050214 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6ae380b9f58b2f3bdcc9865a3d87ab2d-ca-certs\") pod \"kube-apiserver-ip-172-31-19-54\" (UID: \"6ae380b9f58b2f3bdcc9865a3d87ab2d\") " pod="kube-system/kube-apiserver-ip-172-31-19-54" Feb 12 20:23:27.050353 kubelet[2764]: I0212 20:23:27.050341 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6ae380b9f58b2f3bdcc9865a3d87ab2d-k8s-certs\") pod \"kube-apiserver-ip-172-31-19-54\" (UID: \"6ae380b9f58b2f3bdcc9865a3d87ab2d\") " pod="kube-system/kube-apiserver-ip-172-31-19-54" Feb 12 20:23:27.050454 kubelet[2764]: I0212 20:23:27.050423 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4f175323180a275fb7b08ae316705d28-ca-certs\") pod \"kube-controller-manager-ip-172-31-19-54\" (UID: \"4f175323180a275fb7b08ae316705d28\") " pod="kube-system/kube-controller-manager-ip-172-31-19-54" Feb 12 20:23:27.050525 kubelet[2764]: I0212 20:23:27.050508 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4f175323180a275fb7b08ae316705d28-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-19-54\" (UID: \"4f175323180a275fb7b08ae316705d28\") " pod="kube-system/kube-controller-manager-ip-172-31-19-54" Feb 12 20:23:27.050637 kubelet[2764]: I0212 20:23:27.050605 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4f175323180a275fb7b08ae316705d28-k8s-certs\") pod \"kube-controller-manager-ip-172-31-19-54\" (UID: \"4f175323180a275fb7b08ae316705d28\") " pod="kube-system/kube-controller-manager-ip-172-31-19-54" Feb 12 20:23:27.202000 audit[2551]: AVC avc: denied { watch } for pid=2551 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:23:27.202000 audit[2551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e1c100 a2=fc6 a3=0 items=0 ppid=2393 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 key=(null) Feb 12 20:23:27.226280 kernel: audit: type=1400 audit(1707769407.202:985): avc: denied { watch } for pid=2551 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:23:27.226421 kernel: audit: type=1300 audit(1707769407.202:985): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e1c100 a2=fc6 a3=0 items=0 ppid=2393 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 key=(null) Feb 12 20:23:27.202000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:23:27.236717 kernel: audit: type=1327 audit(1707769407.202:985): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:23:27.202000 audit[2551]: AVC avc: denied { watch } for pid=2551 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:23:27.247629 kernel: audit: type=1400 audit(1707769407.202:986): avc: denied { watch } for pid=2551 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:23:27.202000 audit[2551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000e1c240 a2=fc6 a3=0 items=0 ppid=2393 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 key=(null) Feb 12 20:23:27.262231 kernel: audit: type=1300 audit(1707769407.202:986): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000e1c240 a2=fc6 a3=0 items=0 ppid=2393 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 key=(null) Feb 12 20:23:27.202000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:23:27.273126 kernel: audit: type=1327 audit(1707769407.202:986): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:23:27.208000 audit[2551]: AVC avc: denied { watch } for pid=2551 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:23:27.208000 audit[2551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e1c7a0 a2=fc6 a3=0 items=0 ppid=2393 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 key=(null) Feb 12 20:23:27.208000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:23:27.208000 audit[2551]: AVC avc: denied { watch } for pid=2551 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:23:27.208000 audit[2551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e1c820 a2=fc6 a3=0 items=0 ppid=2393 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 key=(null) Feb 12 20:23:27.208000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:23:27.626055 kubelet[2764]: I0212 20:23:27.625896 2764 apiserver.go:52] "Watching apiserver" Feb 12 20:23:27.643931 kubelet[2764]: I0212 20:23:27.643857 2764 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 12 20:23:27.663737 kubelet[2764]: I0212 20:23:27.663675 2764 reconciler.go:41] "Reconciler: start to sync state" Feb 12 20:23:27.753561 kubelet[2764]: I0212 20:23:27.753481 2764 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-19-54" podStartSLOduration=0.753397464 podCreationTimestamp="2024-02-12 20:23:27 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:23:27.738649837 +0000 UTC m=+1.324290160" watchObservedRunningTime="2024-02-12 20:23:27.753397464 +0000 UTC m=+1.339037787" Feb 12 20:23:27.805931 kubelet[2764]: E0212 20:23:27.805845 2764 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ip-172-31-19-54\" already exists" pod="kube-system/kube-controller-manager-ip-172-31-19-54" Feb 12 20:23:27.809497 kubelet[2764]: E0212 20:23:27.809444 2764 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-19-54\" already exists" pod="kube-system/kube-apiserver-ip-172-31-19-54" Feb 12 20:23:27.812082 kubelet[2764]: I0212 20:23:27.812018 2764 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-19-54" podStartSLOduration=0.811940839 podCreationTimestamp="2024-02-12 20:23:27 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:23:27.807720447 +0000 UTC m=+1.393360770" watchObservedRunningTime="2024-02-12 20:23:27.811940839 +0000 UTC m=+1.397581138" Feb 12 20:23:27.812294 kubelet[2764]: I0212 20:23:27.812214 2764 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-19-54" podStartSLOduration=3.8121768940000003 podCreationTimestamp="2024-02-12 20:23:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:23:27.754566086 +0000 UTC m=+1.340206409" watchObservedRunningTime="2024-02-12 20:23:27.812176894 +0000 UTC m=+1.397817217" Feb 12 20:23:28.502743 amazon-ssm-agent[1667]: 2024-02-12 20:23:28 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Feb 12 20:23:33.400394 sudo[1913]: pam_unix(sudo:session): session closed for user root Feb 12 20:23:33.399000 audit[1913]: USER_END pid=1913 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:23:33.402433 kernel: kauditd_printk_skb: 6 callbacks suppressed Feb 12 20:23:33.402495 kernel: audit: type=1106 audit(1707769413.399:989): pid=1913 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:23:33.401000 audit[1913]: CRED_DISP pid=1913 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:23:33.419791 kernel: audit: type=1104 audit(1707769413.401:990): pid=1913 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:23:33.427606 sshd[1910]: pam_unix(sshd:session): session closed for user core Feb 12 20:23:33.427000 audit[1910]: USER_END pid=1910 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:23:33.428000 audit[1910]: CRED_DISP pid=1910 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:23:33.450248 kernel: audit: type=1106 audit(1707769413.427:991): pid=1910 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:23:33.450384 kernel: audit: type=1104 audit(1707769413.428:992): pid=1910 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:23:33.441443 systemd[1]: sshd@6-172.31.19.54:22-147.75.109.163:56810.service: Deactivated successfully. Feb 12 20:23:33.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.19.54:22-147.75.109.163:56810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:23:33.442713 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 20:23:33.443050 systemd[1]: session-7.scope: Consumed 10.927s CPU time. Feb 12 20:23:33.444826 systemd-logind[1628]: Session 7 logged out. Waiting for processes to exit. Feb 12 20:23:33.446509 systemd-logind[1628]: Removed session 7. Feb 12 20:23:33.459742 kernel: audit: type=1131 audit(1707769413.439:993): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.19.54:22-147.75.109.163:56810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:23:38.554662 kubelet[2764]: I0212 20:23:38.554625 2764 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 12 20:23:38.556175 env[1651]: time="2024-02-12T20:23:38.556097265Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 20:23:38.556816 kubelet[2764]: I0212 20:23:38.556552 2764 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 12 20:23:38.602822 kubelet[2764]: I0212 20:23:38.602778 2764 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:23:38.614226 systemd[1]: Created slice kubepods-besteffort-podde447dbf_b546_43e7_8c17_77ca8f27f8ff.slice. Feb 12 20:23:38.633122 kubelet[2764]: I0212 20:23:38.633078 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/de447dbf-b546-43e7-8c17-77ca8f27f8ff-xtables-lock\") pod \"kube-proxy-2k2dw\" (UID: \"de447dbf-b546-43e7-8c17-77ca8f27f8ff\") " pod="kube-system/kube-proxy-2k2dw" Feb 12 20:23:38.633467 kubelet[2764]: I0212 20:23:38.633438 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/de447dbf-b546-43e7-8c17-77ca8f27f8ff-lib-modules\") pod \"kube-proxy-2k2dw\" (UID: \"de447dbf-b546-43e7-8c17-77ca8f27f8ff\") " pod="kube-system/kube-proxy-2k2dw" Feb 12 20:23:38.633678 kubelet[2764]: I0212 20:23:38.633655 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/de447dbf-b546-43e7-8c17-77ca8f27f8ff-kube-proxy\") pod \"kube-proxy-2k2dw\" (UID: \"de447dbf-b546-43e7-8c17-77ca8f27f8ff\") " pod="kube-system/kube-proxy-2k2dw" Feb 12 20:23:38.633880 kubelet[2764]: I0212 20:23:38.633857 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mkpv2\" (UniqueName: \"kubernetes.io/projected/de447dbf-b546-43e7-8c17-77ca8f27f8ff-kube-api-access-mkpv2\") pod \"kube-proxy-2k2dw\" (UID: \"de447dbf-b546-43e7-8c17-77ca8f27f8ff\") " pod="kube-system/kube-proxy-2k2dw" Feb 12 20:23:38.642506 kubelet[2764]: W0212 20:23:38.642227 2764 reflector.go:533] object-"kube-system"/"kube-proxy": failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ip-172-31-19-54" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ip-172-31-19-54' and this object Feb 12 20:23:38.642794 kubelet[2764]: E0212 20:23:38.642759 2764 reflector.go:148] object-"kube-system"/"kube-proxy": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ip-172-31-19-54" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ip-172-31-19-54' and this object Feb 12 20:23:38.642932 kubelet[2764]: W0212 20:23:38.642455 2764 reflector.go:533] object-"kube-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ip-172-31-19-54" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ip-172-31-19-54' and this object Feb 12 20:23:38.643084 kubelet[2764]: E0212 20:23:38.643063 2764 reflector.go:148] object-"kube-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ip-172-31-19-54" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ip-172-31-19-54' and this object Feb 12 20:23:38.772168 kubelet[2764]: I0212 20:23:38.772123 2764 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:23:38.782985 systemd[1]: Created slice kubepods-besteffort-pod90d5a446_2ef6_4daa_acb7_cd32d082dca2.slice. Feb 12 20:23:38.836610 kubelet[2764]: I0212 20:23:38.836473 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nq7ww\" (UniqueName: \"kubernetes.io/projected/90d5a446-2ef6-4daa-acb7-cd32d082dca2-kube-api-access-nq7ww\") pod \"tigera-operator-7ff8dc855-k2vv5\" (UID: \"90d5a446-2ef6-4daa-acb7-cd32d082dca2\") " pod="tigera-operator/tigera-operator-7ff8dc855-k2vv5" Feb 12 20:23:38.843406 kubelet[2764]: I0212 20:23:38.841653 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/90d5a446-2ef6-4daa-acb7-cd32d082dca2-var-lib-calico\") pod \"tigera-operator-7ff8dc855-k2vv5\" (UID: \"90d5a446-2ef6-4daa-acb7-cd32d082dca2\") " pod="tigera-operator/tigera-operator-7ff8dc855-k2vv5" Feb 12 20:23:39.094457 env[1651]: time="2024-02-12T20:23:39.093455709Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-k2vv5,Uid:90d5a446-2ef6-4daa-acb7-cd32d082dca2,Namespace:tigera-operator,Attempt:0,}" Feb 12 20:23:39.126237 env[1651]: time="2024-02-12T20:23:39.126064575Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:23:39.126600 env[1651]: time="2024-02-12T20:23:39.126167886Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:23:39.126785 env[1651]: time="2024-02-12T20:23:39.126555810Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:23:39.127922 env[1651]: time="2024-02-12T20:23:39.127810422Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3dd280c4249166b457c65f8c4e42a9cce351d80d3b61d36f47c03035aadd794b pid=2849 runtime=io.containerd.runc.v2 Feb 12 20:23:39.162807 systemd[1]: run-containerd-runc-k8s.io-3dd280c4249166b457c65f8c4e42a9cce351d80d3b61d36f47c03035aadd794b-runc.2lv8Je.mount: Deactivated successfully. Feb 12 20:23:39.173763 systemd[1]: Started cri-containerd-3dd280c4249166b457c65f8c4e42a9cce351d80d3b61d36f47c03035aadd794b.scope. Feb 12 20:23:39.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.211134 kernel: audit: type=1400 audit(1707769419.194:994): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.211304 kernel: audit: type=1400 audit(1707769419.194:995): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.218950 kernel: audit: type=1400 audit(1707769419.194:996): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.226667 kernel: audit: type=1400 audit(1707769419.194:997): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.234248 kernel: audit: type=1400 audit(1707769419.194:998): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.241921 kernel: audit: type=1400 audit(1707769419.194:999): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.242239 kernel: audit: type=1400 audit(1707769419.194:1000): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.250447 kernel: audit: type=1400 audit(1707769419.194:1001): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.265526 kernel: audit: type=1400 audit(1707769419.194:1002): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.273142 kernel: audit: type=1400 audit(1707769419.202:1003): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.202000 audit: BPF prog-id=118 op=LOAD Feb 12 20:23:39.210000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.210000 audit[2859]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014fb38 a2=10 a3=0 items=0 ppid=2849 pid=2859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:39.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364643238306334323439313636623435376336356638633465343261 Feb 12 20:23:39.210000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.210000 audit[2859]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014f5a0 a2=3c a3=0 items=0 ppid=2849 pid=2859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:39.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364643238306334323439313636623435376336356638633465343261 Feb 12 20:23:39.210000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.210000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.210000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.210000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.210000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.210000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.210000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.210000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.210000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.210000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.210000 audit: BPF prog-id=119 op=LOAD Feb 12 20:23:39.210000 audit[2859]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014f8e0 a2=78 a3=0 items=0 ppid=2849 pid=2859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:39.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364643238306334323439313636623435376336356638633465343261 Feb 12 20:23:39.218000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.218000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.218000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.218000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.218000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.218000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.218000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.218000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.218000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.218000 audit: BPF prog-id=120 op=LOAD Feb 12 20:23:39.218000 audit[2859]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014f670 a2=78 a3=0 items=0 ppid=2849 pid=2859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:39.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364643238306334323439313636623435376336356638633465343261 Feb 12 20:23:39.225000 audit: BPF prog-id=120 op=UNLOAD Feb 12 20:23:39.225000 audit: BPF prog-id=119 op=UNLOAD Feb 12 20:23:39.225000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.225000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.225000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.225000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.225000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.225000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.225000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.225000 audit[2859]: AVC avc: denied { perfmon } for pid=2859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.225000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.225000 audit[2859]: AVC avc: denied { bpf } for pid=2859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:39.225000 audit: BPF prog-id=121 op=LOAD Feb 12 20:23:39.225000 audit[2859]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014fb40 a2=78 a3=0 items=0 ppid=2849 pid=2859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:39.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364643238306334323439313636623435376336356638633465343261 Feb 12 20:23:39.297494 env[1651]: time="2024-02-12T20:23:39.297436812Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-k2vv5,Uid:90d5a446-2ef6-4daa-acb7-cd32d082dca2,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"3dd280c4249166b457c65f8c4e42a9cce351d80d3b61d36f47c03035aadd794b\"" Feb 12 20:23:39.303444 env[1651]: time="2024-02-12T20:23:39.303371790Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 12 20:23:39.735878 kubelet[2764]: E0212 20:23:39.735840 2764 configmap.go:199] Couldn't get configMap kube-system/kube-proxy: failed to sync configmap cache: timed out waiting for the condition Feb 12 20:23:39.736739 kubelet[2764]: E0212 20:23:39.736714 2764 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/de447dbf-b546-43e7-8c17-77ca8f27f8ff-kube-proxy podName:de447dbf-b546-43e7-8c17-77ca8f27f8ff nodeName:}" failed. No retries permitted until 2024-02-12 20:23:40.236678353 +0000 UTC m=+13.822318652 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-proxy" (UniqueName: "kubernetes.io/configmap/de447dbf-b546-43e7-8c17-77ca8f27f8ff-kube-proxy") pod "kube-proxy-2k2dw" (UID: "de447dbf-b546-43e7-8c17-77ca8f27f8ff") : failed to sync configmap cache: timed out waiting for the condition Feb 12 20:23:39.815984 kubelet[2764]: E0212 20:23:39.815950 2764 projected.go:292] Couldn't get configMap kube-system/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Feb 12 20:23:39.816231 kubelet[2764]: E0212 20:23:39.816209 2764 projected.go:198] Error preparing data for projected volume kube-api-access-mkpv2 for pod kube-system/kube-proxy-2k2dw: failed to sync configmap cache: timed out waiting for the condition Feb 12 20:23:39.816487 kubelet[2764]: E0212 20:23:39.816453 2764 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/de447dbf-b546-43e7-8c17-77ca8f27f8ff-kube-api-access-mkpv2 podName:de447dbf-b546-43e7-8c17-77ca8f27f8ff nodeName:}" failed. No retries permitted until 2024-02-12 20:23:40.316424813 +0000 UTC m=+13.902065112 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-mkpv2" (UniqueName: "kubernetes.io/projected/de447dbf-b546-43e7-8c17-77ca8f27f8ff-kube-api-access-mkpv2") pod "kube-proxy-2k2dw" (UID: "de447dbf-b546-43e7-8c17-77ca8f27f8ff") : failed to sync configmap cache: timed out waiting for the condition Feb 12 20:23:40.424956 env[1651]: time="2024-02-12T20:23:40.424903434Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2k2dw,Uid:de447dbf-b546-43e7-8c17-77ca8f27f8ff,Namespace:kube-system,Attempt:0,}" Feb 12 20:23:40.456369 env[1651]: time="2024-02-12T20:23:40.456165912Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:23:40.456541 env[1651]: time="2024-02-12T20:23:40.456411235Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:23:40.456541 env[1651]: time="2024-02-12T20:23:40.456502773Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:23:40.457176 env[1651]: time="2024-02-12T20:23:40.456946101Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cbb4e5e0706fefd2c81ac94d1f1624621381b18c259eb0782cc0e4675dc9fad2 pid=2892 runtime=io.containerd.runc.v2 Feb 12 20:23:40.490592 systemd[1]: run-containerd-runc-k8s.io-cbb4e5e0706fefd2c81ac94d1f1624621381b18c259eb0782cc0e4675dc9fad2-runc.wNkoTI.mount: Deactivated successfully. Feb 12 20:23:40.499111 systemd[1]: Started cri-containerd-cbb4e5e0706fefd2c81ac94d1f1624621381b18c259eb0782cc0e4675dc9fad2.scope. Feb 12 20:23:40.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.520000 audit: BPF prog-id=122 op=LOAD Feb 12 20:23:40.522000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.522000 audit[2903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2892 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:40.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362623465356530373036666566643263383161633934643166313632 Feb 12 20:23:40.522000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.522000 audit[2903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2892 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:40.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362623465356530373036666566643263383161633934643166313632 Feb 12 20:23:40.522000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.522000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.522000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.522000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.522000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.522000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.522000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.522000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.522000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.522000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.522000 audit: BPF prog-id=123 op=LOAD Feb 12 20:23:40.522000 audit[2903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2892 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:40.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362623465356530373036666566643263383161633934643166313632 Feb 12 20:23:40.522000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.522000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.522000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.522000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.522000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.522000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.522000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.522000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.522000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.522000 audit: BPF prog-id=124 op=LOAD Feb 12 20:23:40.522000 audit[2903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2892 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:40.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362623465356530373036666566643263383161633934643166313632 Feb 12 20:23:40.523000 audit: BPF prog-id=124 op=UNLOAD Feb 12 20:23:40.523000 audit: BPF prog-id=123 op=UNLOAD Feb 12 20:23:40.523000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.523000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.523000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.523000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.523000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.523000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.523000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.523000 audit[2903]: AVC avc: denied { perfmon } for pid=2903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.523000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.523000 audit[2903]: AVC avc: denied { bpf } for pid=2903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.523000 audit: BPF prog-id=125 op=LOAD Feb 12 20:23:40.523000 audit[2903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2892 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:40.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362623465356530373036666566643263383161633934643166313632 Feb 12 20:23:40.546611 env[1651]: time="2024-02-12T20:23:40.546555931Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2k2dw,Uid:de447dbf-b546-43e7-8c17-77ca8f27f8ff,Namespace:kube-system,Attempt:0,} returns sandbox id \"cbb4e5e0706fefd2c81ac94d1f1624621381b18c259eb0782cc0e4675dc9fad2\"" Feb 12 20:23:40.554082 env[1651]: time="2024-02-12T20:23:40.554004427Z" level=info msg="CreateContainer within sandbox \"cbb4e5e0706fefd2c81ac94d1f1624621381b18c259eb0782cc0e4675dc9fad2\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 20:23:40.581423 env[1651]: time="2024-02-12T20:23:40.581358373Z" level=info msg="CreateContainer within sandbox \"cbb4e5e0706fefd2c81ac94d1f1624621381b18c259eb0782cc0e4675dc9fad2\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"fcbf3c4e73c64192a4e079a5f497d42ab6143086aa11a914faa1c4072c91f0ef\"" Feb 12 20:23:40.582846 env[1651]: time="2024-02-12T20:23:40.582791272Z" level=info msg="StartContainer for \"fcbf3c4e73c64192a4e079a5f497d42ab6143086aa11a914faa1c4072c91f0ef\"" Feb 12 20:23:40.613433 systemd[1]: Started cri-containerd-fcbf3c4e73c64192a4e079a5f497d42ab6143086aa11a914faa1c4072c91f0ef.scope. Feb 12 20:23:40.661000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.661000 audit[2935]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2892 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:40.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663626633633465373363363431393261346530373961356634393764 Feb 12 20:23:40.661000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.661000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.661000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.661000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.661000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.661000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.661000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.661000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.661000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.661000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.661000 audit: BPF prog-id=126 op=LOAD Feb 12 20:23:40.661000 audit[2935]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2892 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:40.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663626633633465373363363431393261346530373961356634393764 Feb 12 20:23:40.661000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.661000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.661000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.661000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.661000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.661000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.661000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.661000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.661000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.661000 audit: BPF prog-id=127 op=LOAD Feb 12 20:23:40.661000 audit[2935]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2892 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:40.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663626633633465373363363431393261346530373961356634393764 Feb 12 20:23:40.662000 audit: BPF prog-id=127 op=UNLOAD Feb 12 20:23:40.662000 audit: BPF prog-id=126 op=UNLOAD Feb 12 20:23:40.662000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.662000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.662000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.662000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.662000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.662000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.662000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.662000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.662000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.662000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:40.662000 audit: BPF prog-id=128 op=LOAD Feb 12 20:23:40.662000 audit[2935]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2892 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:40.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663626633633465373363363431393261346530373961356634393764 Feb 12 20:23:40.690423 env[1651]: time="2024-02-12T20:23:40.690261084Z" level=info msg="StartContainer for \"fcbf3c4e73c64192a4e079a5f497d42ab6143086aa11a914faa1c4072c91f0ef\" returns successfully" Feb 12 20:23:40.864000 audit[2984]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2984 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:40.864000 audit[2984]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc6bfb520 a2=0 a3=ffffa668e6c0 items=0 ppid=2946 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:40.864000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 20:23:40.866000 audit[2985]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2985 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:40.866000 audit[2985]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc28561c0 a2=0 a3=ffffab8276c0 items=0 ppid=2946 pid=2985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:40.866000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 20:23:40.868000 audit[2986]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2986 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:40.868000 audit[2986]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffecf157e0 a2=0 a3=ffff9d7d06c0 items=0 ppid=2946 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:40.868000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 20:23:40.870000 audit[2987]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2987 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:40.870000 audit[2987]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffcee50a0 a2=0 a3=ffffb28e06c0 items=0 ppid=2946 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:40.870000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 20:23:40.876000 audit[2988]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2988 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:40.876000 audit[2988]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd7bb5d90 a2=0 a3=ffff9b1246c0 items=0 ppid=2946 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:40.876000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 20:23:40.878000 audit[2989]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2989 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:40.878000 audit[2989]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe6779ad0 a2=0 a3=ffff9afa56c0 items=0 ppid=2946 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:40.878000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 20:23:40.962000 audit[2990]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2990 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:40.962000 audit[2990]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffda1923b0 a2=0 a3=ffffad5ff6c0 items=0 ppid=2946 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:40.962000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 20:23:40.969000 audit[2992]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2992 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:40.969000 audit[2992]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffe466f5e0 a2=0 a3=ffff93aa66c0 items=0 ppid=2946 pid=2992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:40.969000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 20:23:40.977000 audit[2995]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2995 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:40.977000 audit[2995]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc4d29390 a2=0 a3=ffffb45fc6c0 items=0 ppid=2946 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:40.977000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 20:23:40.983000 audit[2996]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2996 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:40.983000 audit[2996]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcc5efc00 a2=0 a3=ffffb858a6c0 items=0 ppid=2946 pid=2996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:40.983000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 20:23:40.989000 audit[2998]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2998 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:40.989000 audit[2998]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdfae7290 a2=0 a3=ffffbcb6e6c0 items=0 ppid=2946 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:40.989000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 20:23:40.991000 audit[2999]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2999 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:40.991000 audit[2999]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff5eeaa80 a2=0 a3=ffff9e1e06c0 items=0 ppid=2946 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:40.991000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 20:23:40.997000 audit[3001]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=3001 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:40.997000 audit[3001]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd46a10c0 a2=0 a3=ffffa16366c0 items=0 ppid=2946 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:40.997000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 20:23:41.005000 audit[3004]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=3004 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:41.005000 audit[3004]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff5799bb0 a2=0 a3=ffffa4cfe6c0 items=0 ppid=2946 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.005000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 20:23:41.007000 audit[3005]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=3005 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:41.007000 audit[3005]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc229afb0 a2=0 a3=ffffacb976c0 items=0 ppid=2946 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.007000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 20:23:41.013000 audit[3007]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=3007 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:41.013000 audit[3007]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd6d0fe80 a2=0 a3=ffffb0ad06c0 items=0 ppid=2946 pid=3007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.013000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 20:23:41.016000 audit[3008]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=3008 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:41.016000 audit[3008]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdfb11b40 a2=0 a3=ffff8d4aa6c0 items=0 ppid=2946 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.016000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 20:23:41.021000 audit[3010]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=3010 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:41.021000 audit[3010]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc37549f0 a2=0 a3=ffffb855d6c0 items=0 ppid=2946 pid=3010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.021000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 20:23:41.030000 audit[3013]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3013 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:41.030000 audit[3013]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffa756e30 a2=0 a3=ffff94f2e6c0 items=0 ppid=2946 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.030000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 20:23:41.037000 audit[3016]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3016 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:41.037000 audit[3016]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd80d7970 a2=0 a3=ffffb2f386c0 items=0 ppid=2946 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.037000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 20:23:41.040000 audit[3017]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3017 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:41.040000 audit[3017]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd8cc92b0 a2=0 a3=ffff9c4c56c0 items=0 ppid=2946 pid=3017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.040000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 20:23:41.045000 audit[3019]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3019 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:41.045000 audit[3019]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffe5befd20 a2=0 a3=ffff83f7e6c0 items=0 ppid=2946 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.045000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:23:41.059000 audit[3022]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3022 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:41.059000 audit[3022]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcc4bd1c0 a2=0 a3=ffff812306c0 items=0 ppid=2946 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.059000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:23:41.075000 audit[3027]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3027 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:41.075000 audit[3027]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffebc454c0 a2=0 a3=ffff8671b6c0 items=0 ppid=2946 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.075000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 20:23:41.091000 audit[3029]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3029 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:23:41.091000 audit[3029]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffd7d4c110 a2=0 a3=ffff96a146c0 items=0 ppid=2946 pid=3029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.091000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 20:23:41.128000 audit[3031]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3031 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:23:41.128000 audit[3031]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffdbd914a0 a2=0 a3=ffffb957f6c0 items=0 ppid=2946 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.128000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:23:41.142000 audit[3031]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3031 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:23:41.142000 audit[3031]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffdbd914a0 a2=0 a3=ffffb957f6c0 items=0 ppid=2946 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.142000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:23:41.155000 audit[3037]: NETFILTER_CFG table=filter:65 family=2 entries=14 op=nft_register_rule pid=3037 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:23:41.155000 audit[3037]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffeb64bd60 a2=0 a3=ffffa4fb56c0 items=0 ppid=2946 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.155000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:23:41.157000 audit[3037]: NETFILTER_CFG table=nat:66 family=2 entries=12 op=nft_register_rule pid=3037 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:23:41.157000 audit[3037]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffeb64bd60 a2=0 a3=ffffa4fb56c0 items=0 ppid=2946 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.157000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:23:41.162000 audit[3038]: NETFILTER_CFG table=filter:67 family=10 entries=1 op=nft_register_chain pid=3038 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:41.162000 audit[3038]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffef1406d0 a2=0 a3=ffffac81a6c0 items=0 ppid=2946 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.162000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 20:23:41.169000 audit[3040]: NETFILTER_CFG table=filter:68 family=10 entries=2 op=nft_register_chain pid=3040 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:41.169000 audit[3040]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffdbfa23c0 a2=0 a3=ffff807b26c0 items=0 ppid=2946 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.169000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 20:23:41.179000 audit[3043]: NETFILTER_CFG table=filter:69 family=10 entries=2 op=nft_register_chain pid=3043 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:41.179000 audit[3043]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffffb017550 a2=0 a3=ffffa40ea6c0 items=0 ppid=2946 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.179000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 20:23:41.183000 audit[3044]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3044 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:41.183000 audit[3044]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd6de5570 a2=0 a3=ffffa917d6c0 items=0 ppid=2946 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.183000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 20:23:41.190000 audit[3046]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3046 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:41.190000 audit[3046]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe715f400 a2=0 a3=ffff8f00a6c0 items=0 ppid=2946 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.190000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 20:23:41.194000 audit[3047]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_chain pid=3047 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:41.194000 audit[3047]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd1072d10 a2=0 a3=ffff927816c0 items=0 ppid=2946 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.194000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 20:23:41.201000 audit[3049]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_rule pid=3049 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:41.201000 audit[3049]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffea740b50 a2=0 a3=ffff8c1566c0 items=0 ppid=2946 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.201000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 20:23:41.208000 audit[3052]: NETFILTER_CFG table=filter:74 family=10 entries=2 op=nft_register_chain pid=3052 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:41.208000 audit[3052]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffe0d396f0 a2=0 a3=ffff880aa6c0 items=0 ppid=2946 pid=3052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.208000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 20:23:41.212000 audit[3053]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3053 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:41.212000 audit[3053]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd9e6e590 a2=0 a3=ffffb765b6c0 items=0 ppid=2946 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.212000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 20:23:41.222000 audit[3055]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3055 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:41.222000 audit[3055]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc125acd0 a2=0 a3=ffffbac9b6c0 items=0 ppid=2946 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.222000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 20:23:41.226000 audit[3056]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_chain pid=3056 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:41.226000 audit[3056]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe8bb3d20 a2=0 a3=ffff7ff626c0 items=0 ppid=2946 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.226000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 20:23:41.237000 audit[3058]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3058 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:41.237000 audit[3058]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc14527c0 a2=0 a3=ffff86c856c0 items=0 ppid=2946 pid=3058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.237000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 20:23:41.247000 audit[3061]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_rule pid=3061 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:41.247000 audit[3061]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff6c55450 a2=0 a3=ffffb0c826c0 items=0 ppid=2946 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.247000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 20:23:41.254000 audit[3064]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=3064 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:41.254000 audit[3064]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffa0c5080 a2=0 a3=ffffac02e6c0 items=0 ppid=2946 pid=3064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.254000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 20:23:41.257000 audit[3065]: NETFILTER_CFG table=nat:81 family=10 entries=1 op=nft_register_chain pid=3065 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:41.257000 audit[3065]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdcea0920 a2=0 a3=ffffbdf536c0 items=0 ppid=2946 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.257000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 20:23:41.261000 audit[3067]: NETFILTER_CFG table=nat:82 family=10 entries=2 op=nft_register_chain pid=3067 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:41.261000 audit[3067]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffcc2dabe0 a2=0 a3=ffff8a2566c0 items=0 ppid=2946 pid=3067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.261000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:23:41.273000 audit[3070]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3070 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:41.273000 audit[3070]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc996dbc0 a2=0 a3=ffff846076c0 items=0 ppid=2946 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.273000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:23:41.277000 audit[3071]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3071 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:41.277000 audit[3071]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff3a7c2c0 a2=0 a3=ffffa3bd66c0 items=0 ppid=2946 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.277000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 20:23:41.284000 audit[3073]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3073 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:41.284000 audit[3073]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd9f25cf0 a2=0 a3=ffff9edf26c0 items=0 ppid=2946 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.284000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:23:41.296000 audit[3076]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3076 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:41.296000 audit[3076]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffea3254d0 a2=0 a3=ffffb7b536c0 items=0 ppid=2946 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.296000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:23:41.299000 audit[3077]: NETFILTER_CFG table=nat:87 family=10 entries=1 op=nft_register_chain pid=3077 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:41.299000 audit[3077]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffedb0ce40 a2=0 a3=ffff8e67d6c0 items=0 ppid=2946 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.299000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 20:23:41.309000 audit[3079]: NETFILTER_CFG table=nat:88 family=10 entries=2 op=nft_register_chain pid=3079 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:23:41.309000 audit[3079]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffead9b430 a2=0 a3=ffffba8a46c0 items=0 ppid=2946 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.309000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 20:23:41.318000 audit[3081]: NETFILTER_CFG table=filter:89 family=10 entries=3 op=nft_register_rule pid=3081 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 20:23:41.318000 audit[3081]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffc32b8a00 a2=0 a3=ffff9e9766c0 items=0 ppid=2946 pid=3081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.318000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:23:41.319000 audit[3081]: NETFILTER_CFG table=nat:90 family=10 entries=7 op=nft_register_chain pid=3081 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 20:23:41.319000 audit[3081]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffc32b8a00 a2=0 a3=ffff9e9766c0 items=0 ppid=2946 pid=3081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:41.319000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:23:42.270230 env[1651]: time="2024-02-12T20:23:42.270161660Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:42.273299 env[1651]: time="2024-02-12T20:23:42.273222466Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:42.276185 env[1651]: time="2024-02-12T20:23:42.276133892Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:42.279164 env[1651]: time="2024-02-12T20:23:42.279105800Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:42.281790 env[1651]: time="2024-02-12T20:23:42.281744579Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f\"" Feb 12 20:23:42.289742 env[1651]: time="2024-02-12T20:23:42.289646962Z" level=info msg="CreateContainer within sandbox \"3dd280c4249166b457c65f8c4e42a9cce351d80d3b61d36f47c03035aadd794b\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 12 20:23:42.308837 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3029454460.mount: Deactivated successfully. Feb 12 20:23:42.322305 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount655099007.mount: Deactivated successfully. Feb 12 20:23:42.330687 env[1651]: time="2024-02-12T20:23:42.330621470Z" level=info msg="CreateContainer within sandbox \"3dd280c4249166b457c65f8c4e42a9cce351d80d3b61d36f47c03035aadd794b\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"f306bdc88903c3ab952d5bc91762387d0baa6bf6da2d513a8e23e92844622140\"" Feb 12 20:23:42.334766 env[1651]: time="2024-02-12T20:23:42.332042868Z" level=info msg="StartContainer for \"f306bdc88903c3ab952d5bc91762387d0baa6bf6da2d513a8e23e92844622140\"" Feb 12 20:23:42.363491 systemd[1]: Started cri-containerd-f306bdc88903c3ab952d5bc91762387d0baa6bf6da2d513a8e23e92844622140.scope. Feb 12 20:23:42.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.408000 audit: BPF prog-id=129 op=LOAD Feb 12 20:23:42.409000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.409000 audit[3090]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2849 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:42.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633303662646338383930336333616239353264356263393137363233 Feb 12 20:23:42.409000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.409000 audit[3090]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2849 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:42.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633303662646338383930336333616239353264356263393137363233 Feb 12 20:23:42.409000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.409000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.409000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.409000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.409000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.409000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.409000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.409000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.409000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.409000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.409000 audit: BPF prog-id=130 op=LOAD Feb 12 20:23:42.409000 audit[3090]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2849 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:42.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633303662646338383930336333616239353264356263393137363233 Feb 12 20:23:42.409000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.409000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.409000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.409000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.409000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.409000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.409000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.409000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.409000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.409000 audit: BPF prog-id=131 op=LOAD Feb 12 20:23:42.409000 audit[3090]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2849 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:42.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633303662646338383930336333616239353264356263393137363233 Feb 12 20:23:42.410000 audit: BPF prog-id=131 op=UNLOAD Feb 12 20:23:42.410000 audit: BPF prog-id=130 op=UNLOAD Feb 12 20:23:42.410000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.410000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.410000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.410000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.410000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.410000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.410000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.410000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.410000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.410000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:42.410000 audit: BPF prog-id=132 op=LOAD Feb 12 20:23:42.410000 audit[3090]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2849 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:42.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633303662646338383930336333616239353264356263393137363233 Feb 12 20:23:42.441476 env[1651]: time="2024-02-12T20:23:42.441411692Z" level=info msg="StartContainer for \"f306bdc88903c3ab952d5bc91762387d0baa6bf6da2d513a8e23e92844622140\" returns successfully" Feb 12 20:23:42.828472 kubelet[2764]: I0212 20:23:42.828419 2764 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-2k2dw" podStartSLOduration=4.828339406 podCreationTimestamp="2024-02-12 20:23:38 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:23:40.828629354 +0000 UTC m=+14.414269665" watchObservedRunningTime="2024-02-12 20:23:42.828339406 +0000 UTC m=+16.413979717" Feb 12 20:23:45.489000 audit[3121]: NETFILTER_CFG table=filter:91 family=2 entries=15 op=nft_register_rule pid=3121 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:23:45.493496 kernel: kauditd_printk_skb: 363 callbacks suppressed Feb 12 20:23:45.493577 kernel: audit: type=1325 audit(1707769425.489:1107): table=filter:91 family=2 entries=15 op=nft_register_rule pid=3121 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:23:45.489000 audit[3121]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffd1c93b20 a2=0 a3=ffffa4dbb6c0 items=0 ppid=2946 pid=3121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:45.512460 kernel: audit: type=1300 audit(1707769425.489:1107): arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffd1c93b20 a2=0 a3=ffffa4dbb6c0 items=0 ppid=2946 pid=3121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:45.489000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:23:45.518394 kernel: audit: type=1327 audit(1707769425.489:1107): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:23:45.499000 audit[3121]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3121 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:23:45.499000 audit[3121]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffd1c93b20 a2=0 a3=ffffa4dbb6c0 items=0 ppid=2946 pid=3121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:45.538111 kernel: audit: type=1325 audit(1707769425.499:1108): table=nat:92 family=2 entries=12 op=nft_register_rule pid=3121 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:23:45.538245 kernel: audit: type=1300 audit(1707769425.499:1108): arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffd1c93b20 a2=0 a3=ffffa4dbb6c0 items=0 ppid=2946 pid=3121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:45.499000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:23:45.546183 kernel: audit: type=1327 audit(1707769425.499:1108): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:23:45.553000 audit[3123]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=3123 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:23:45.553000 audit[3123]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffe25457e0 a2=0 a3=ffffaf2bb6c0 items=0 ppid=2946 pid=3123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:45.572472 kernel: audit: type=1325 audit(1707769425.553:1109): table=filter:93 family=2 entries=16 op=nft_register_rule pid=3123 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:23:45.572545 kernel: audit: type=1300 audit(1707769425.553:1109): arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffe25457e0 a2=0 a3=ffffaf2bb6c0 items=0 ppid=2946 pid=3123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:45.553000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:23:45.578194 kernel: audit: type=1327 audit(1707769425.553:1109): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:23:45.553000 audit[3123]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3123 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:23:45.553000 audit[3123]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffe25457e0 a2=0 a3=ffffaf2bb6c0 items=0 ppid=2946 pid=3123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:45.553000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:23:45.586316 kernel: audit: type=1325 audit(1707769425.553:1110): table=nat:94 family=2 entries=12 op=nft_register_rule pid=3123 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:23:45.642941 kubelet[2764]: I0212 20:23:45.642856 2764 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7ff8dc855-k2vv5" podStartSLOduration=4.659962316 podCreationTimestamp="2024-02-12 20:23:38 +0000 UTC" firstStartedPulling="2024-02-12 20:23:39.299625796 +0000 UTC m=+12.885266095" lastFinishedPulling="2024-02-12 20:23:42.282438424 +0000 UTC m=+15.868078711" observedRunningTime="2024-02-12 20:23:42.82826198 +0000 UTC m=+16.413902279" watchObservedRunningTime="2024-02-12 20:23:45.642774932 +0000 UTC m=+19.228415243" Feb 12 20:23:45.643564 kubelet[2764]: I0212 20:23:45.643187 2764 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:23:45.655787 systemd[1]: Created slice kubepods-besteffort-podb5307fac_9581_4b2a_b24f_59e249ff2e5d.slice. Feb 12 20:23:45.696790 kubelet[2764]: I0212 20:23:45.696726 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fhvxr\" (UniqueName: \"kubernetes.io/projected/b5307fac-9581-4b2a-b24f-59e249ff2e5d-kube-api-access-fhvxr\") pod \"calico-typha-6fdf4c6679-h6d87\" (UID: \"b5307fac-9581-4b2a-b24f-59e249ff2e5d\") " pod="calico-system/calico-typha-6fdf4c6679-h6d87" Feb 12 20:23:45.696951 kubelet[2764]: I0212 20:23:45.696812 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b5307fac-9581-4b2a-b24f-59e249ff2e5d-tigera-ca-bundle\") pod \"calico-typha-6fdf4c6679-h6d87\" (UID: \"b5307fac-9581-4b2a-b24f-59e249ff2e5d\") " pod="calico-system/calico-typha-6fdf4c6679-h6d87" Feb 12 20:23:45.696951 kubelet[2764]: I0212 20:23:45.696862 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/b5307fac-9581-4b2a-b24f-59e249ff2e5d-typha-certs\") pod \"calico-typha-6fdf4c6679-h6d87\" (UID: \"b5307fac-9581-4b2a-b24f-59e249ff2e5d\") " pod="calico-system/calico-typha-6fdf4c6679-h6d87" Feb 12 20:23:45.851901 kubelet[2764]: I0212 20:23:45.851744 2764 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:23:45.862783 systemd[1]: Created slice kubepods-besteffort-pod17c97462_2eee_43a7_ae94_e6f12831986c.slice. Feb 12 20:23:45.898898 kubelet[2764]: I0212 20:23:45.898829 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q5656\" (UniqueName: \"kubernetes.io/projected/17c97462-2eee-43a7-ae94-e6f12831986c-kube-api-access-q5656\") pod \"calico-node-j2gwg\" (UID: \"17c97462-2eee-43a7-ae94-e6f12831986c\") " pod="calico-system/calico-node-j2gwg" Feb 12 20:23:45.899056 kubelet[2764]: I0212 20:23:45.898914 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-policysync\") pod \"calico-node-j2gwg\" (UID: \"17c97462-2eee-43a7-ae94-e6f12831986c\") " pod="calico-system/calico-node-j2gwg" Feb 12 20:23:45.899056 kubelet[2764]: I0212 20:23:45.898961 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-flexvol-driver-host\") pod \"calico-node-j2gwg\" (UID: \"17c97462-2eee-43a7-ae94-e6f12831986c\") " pod="calico-system/calico-node-j2gwg" Feb 12 20:23:45.899056 kubelet[2764]: I0212 20:23:45.899009 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/17c97462-2eee-43a7-ae94-e6f12831986c-node-certs\") pod \"calico-node-j2gwg\" (UID: \"17c97462-2eee-43a7-ae94-e6f12831986c\") " pod="calico-system/calico-node-j2gwg" Feb 12 20:23:45.899056 kubelet[2764]: I0212 20:23:45.899052 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-cni-net-dir\") pod \"calico-node-j2gwg\" (UID: \"17c97462-2eee-43a7-ae94-e6f12831986c\") " pod="calico-system/calico-node-j2gwg" Feb 12 20:23:45.899334 kubelet[2764]: I0212 20:23:45.899094 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-cni-log-dir\") pod \"calico-node-j2gwg\" (UID: \"17c97462-2eee-43a7-ae94-e6f12831986c\") " pod="calico-system/calico-node-j2gwg" Feb 12 20:23:45.899334 kubelet[2764]: I0212 20:23:45.899141 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-xtables-lock\") pod \"calico-node-j2gwg\" (UID: \"17c97462-2eee-43a7-ae94-e6f12831986c\") " pod="calico-system/calico-node-j2gwg" Feb 12 20:23:45.899334 kubelet[2764]: I0212 20:23:45.899188 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-var-run-calico\") pod \"calico-node-j2gwg\" (UID: \"17c97462-2eee-43a7-ae94-e6f12831986c\") " pod="calico-system/calico-node-j2gwg" Feb 12 20:23:45.899334 kubelet[2764]: I0212 20:23:45.899232 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-cni-bin-dir\") pod \"calico-node-j2gwg\" (UID: \"17c97462-2eee-43a7-ae94-e6f12831986c\") " pod="calico-system/calico-node-j2gwg" Feb 12 20:23:45.899334 kubelet[2764]: I0212 20:23:45.899319 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-lib-modules\") pod \"calico-node-j2gwg\" (UID: \"17c97462-2eee-43a7-ae94-e6f12831986c\") " pod="calico-system/calico-node-j2gwg" Feb 12 20:23:45.899617 kubelet[2764]: I0212 20:23:45.899367 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/17c97462-2eee-43a7-ae94-e6f12831986c-tigera-ca-bundle\") pod \"calico-node-j2gwg\" (UID: \"17c97462-2eee-43a7-ae94-e6f12831986c\") " pod="calico-system/calico-node-j2gwg" Feb 12 20:23:45.899617 kubelet[2764]: I0212 20:23:45.899416 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-var-lib-calico\") pod \"calico-node-j2gwg\" (UID: \"17c97462-2eee-43a7-ae94-e6f12831986c\") " pod="calico-system/calico-node-j2gwg" Feb 12 20:23:45.968298 env[1651]: time="2024-02-12T20:23:45.968211088Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6fdf4c6679-h6d87,Uid:b5307fac-9581-4b2a-b24f-59e249ff2e5d,Namespace:calico-system,Attempt:0,}" Feb 12 20:23:46.012353 env[1651]: time="2024-02-12T20:23:46.008449654Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:23:46.012353 env[1651]: time="2024-02-12T20:23:46.008526755Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:23:46.012353 env[1651]: time="2024-02-12T20:23:46.008572716Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:23:46.012353 env[1651]: time="2024-02-12T20:23:46.008804836Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c58440028da8acd960ef479ff1461cdd2810ff56083f5f6d722ac96d0075a00c pid=3135 runtime=io.containerd.runc.v2 Feb 12 20:23:46.021306 kubelet[2764]: E0212 20:23:46.019366 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.021306 kubelet[2764]: W0212 20:23:46.019424 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.021306 kubelet[2764]: E0212 20:23:46.019499 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.045861 kubelet[2764]: E0212 20:23:46.041942 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.045861 kubelet[2764]: W0212 20:23:46.041979 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.045861 kubelet[2764]: E0212 20:23:46.042013 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.064784 systemd[1]: Started cri-containerd-c58440028da8acd960ef479ff1461cdd2810ff56083f5f6d722ac96d0075a00c.scope. Feb 12 20:23:46.072241 kubelet[2764]: I0212 20:23:46.072166 2764 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:23:46.072685 kubelet[2764]: E0212 20:23:46.072638 2764 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5zxnw" podUID=813164be-67aa-473b-b98f-ae32d6883ffe Feb 12 20:23:46.085561 kubelet[2764]: E0212 20:23:46.085513 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.085561 kubelet[2764]: W0212 20:23:46.085548 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.085752 kubelet[2764]: E0212 20:23:46.085586 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.094917 kubelet[2764]: E0212 20:23:46.094859 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.094917 kubelet[2764]: W0212 20:23:46.094898 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.095152 kubelet[2764]: E0212 20:23:46.094938 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.099425 kubelet[2764]: E0212 20:23:46.099362 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.099425 kubelet[2764]: W0212 20:23:46.099399 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.099633 kubelet[2764]: E0212 20:23:46.099444 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.103670 kubelet[2764]: E0212 20:23:46.103532 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.103670 kubelet[2764]: W0212 20:23:46.103583 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.103881 kubelet[2764]: E0212 20:23:46.103777 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.105413 kubelet[2764]: E0212 20:23:46.104095 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.105413 kubelet[2764]: W0212 20:23:46.104123 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.105413 kubelet[2764]: E0212 20:23:46.104159 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.105413 kubelet[2764]: E0212 20:23:46.105003 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.105413 kubelet[2764]: W0212 20:23:46.105023 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.105413 kubelet[2764]: E0212 20:23:46.105053 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.105800 kubelet[2764]: E0212 20:23:46.105555 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.105800 kubelet[2764]: W0212 20:23:46.105573 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.105800 kubelet[2764]: E0212 20:23:46.105600 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.106076 kubelet[2764]: E0212 20:23:46.106036 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.106076 kubelet[2764]: W0212 20:23:46.106073 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.106218 kubelet[2764]: E0212 20:23:46.106101 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.106606 kubelet[2764]: E0212 20:23:46.106567 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.106606 kubelet[2764]: W0212 20:23:46.106598 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.106775 kubelet[2764]: E0212 20:23:46.106630 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.107025 kubelet[2764]: E0212 20:23:46.106986 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.107025 kubelet[2764]: W0212 20:23:46.107015 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.107170 kubelet[2764]: E0212 20:23:46.107043 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.109509 kubelet[2764]: E0212 20:23:46.109455 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.109509 kubelet[2764]: W0212 20:23:46.109496 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.109735 kubelet[2764]: E0212 20:23:46.109534 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.111435 kubelet[2764]: E0212 20:23:46.111382 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.111435 kubelet[2764]: W0212 20:23:46.111423 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.111662 kubelet[2764]: E0212 20:23:46.111461 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.111934 kubelet[2764]: E0212 20:23:46.111894 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.111934 kubelet[2764]: W0212 20:23:46.111924 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.112065 kubelet[2764]: E0212 20:23:46.111955 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.112629 kubelet[2764]: E0212 20:23:46.112576 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.112629 kubelet[2764]: W0212 20:23:46.112620 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.112832 kubelet[2764]: E0212 20:23:46.112655 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.113061 kubelet[2764]: E0212 20:23:46.113024 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.113061 kubelet[2764]: W0212 20:23:46.113052 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.113189 kubelet[2764]: E0212 20:23:46.113081 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.113458 kubelet[2764]: E0212 20:23:46.113423 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.113458 kubelet[2764]: W0212 20:23:46.113451 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.113628 kubelet[2764]: E0212 20:23:46.113489 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.114055 kubelet[2764]: E0212 20:23:46.114009 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.114055 kubelet[2764]: W0212 20:23:46.114044 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.114232 kubelet[2764]: E0212 20:23:46.114076 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.114232 kubelet[2764]: I0212 20:23:46.114129 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hfmvz\" (UniqueName: \"kubernetes.io/projected/813164be-67aa-473b-b98f-ae32d6883ffe-kube-api-access-hfmvz\") pod \"csi-node-driver-5zxnw\" (UID: \"813164be-67aa-473b-b98f-ae32d6883ffe\") " pod="calico-system/csi-node-driver-5zxnw" Feb 12 20:23:46.118589 kubelet[2764]: E0212 20:23:46.118532 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.118589 kubelet[2764]: W0212 20:23:46.118575 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.118790 kubelet[2764]: E0212 20:23:46.118625 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.118790 kubelet[2764]: I0212 20:23:46.118677 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/813164be-67aa-473b-b98f-ae32d6883ffe-registration-dir\") pod \"csi-node-driver-5zxnw\" (UID: \"813164be-67aa-473b-b98f-ae32d6883ffe\") " pod="calico-system/csi-node-driver-5zxnw" Feb 12 20:23:46.119121 kubelet[2764]: E0212 20:23:46.119069 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.119121 kubelet[2764]: W0212 20:23:46.119111 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.119317 kubelet[2764]: E0212 20:23:46.119144 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.119509 kubelet[2764]: E0212 20:23:46.119471 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.119584 kubelet[2764]: W0212 20:23:46.119500 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.119584 kubelet[2764]: E0212 20:23:46.119542 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.119923 kubelet[2764]: E0212 20:23:46.119884 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.119923 kubelet[2764]: W0212 20:23:46.119913 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.120079 kubelet[2764]: E0212 20:23:46.119940 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.120293 kubelet[2764]: E0212 20:23:46.120242 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.120293 kubelet[2764]: W0212 20:23:46.120289 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.120419 kubelet[2764]: E0212 20:23:46.120320 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.120715 kubelet[2764]: E0212 20:23:46.120681 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.120715 kubelet[2764]: W0212 20:23:46.120707 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.120878 kubelet[2764]: E0212 20:23:46.120734 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.120878 kubelet[2764]: I0212 20:23:46.120778 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/813164be-67aa-473b-b98f-ae32d6883ffe-kubelet-dir\") pod \"csi-node-driver-5zxnw\" (UID: \"813164be-67aa-473b-b98f-ae32d6883ffe\") " pod="calico-system/csi-node-driver-5zxnw" Feb 12 20:23:46.121303 kubelet[2764]: E0212 20:23:46.121242 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.121303 kubelet[2764]: W0212 20:23:46.121295 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.121442 kubelet[2764]: E0212 20:23:46.121337 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.121442 kubelet[2764]: I0212 20:23:46.121392 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/813164be-67aa-473b-b98f-ae32d6883ffe-socket-dir\") pod \"csi-node-driver-5zxnw\" (UID: \"813164be-67aa-473b-b98f-ae32d6883ffe\") " pod="calico-system/csi-node-driver-5zxnw" Feb 12 20:23:46.123481 kubelet[2764]: E0212 20:23:46.123427 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.123481 kubelet[2764]: W0212 20:23:46.123472 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.123680 kubelet[2764]: E0212 20:23:46.123510 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.123920 kubelet[2764]: E0212 20:23:46.123885 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.123920 kubelet[2764]: W0212 20:23:46.123913 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.124082 kubelet[2764]: E0212 20:23:46.123941 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.124419 kubelet[2764]: E0212 20:23:46.124380 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.124419 kubelet[2764]: W0212 20:23:46.124410 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.124593 kubelet[2764]: E0212 20:23:46.124440 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.128507 kubelet[2764]: E0212 20:23:46.128454 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.128507 kubelet[2764]: W0212 20:23:46.128492 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.128760 kubelet[2764]: E0212 20:23:46.128531 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.129092 kubelet[2764]: E0212 20:23:46.129056 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.129092 kubelet[2764]: W0212 20:23:46.129086 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.129240 kubelet[2764]: E0212 20:23:46.129116 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.129240 kubelet[2764]: I0212 20:23:46.129163 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/813164be-67aa-473b-b98f-ae32d6883ffe-varrun\") pod \"csi-node-driver-5zxnw\" (UID: \"813164be-67aa-473b-b98f-ae32d6883ffe\") " pod="calico-system/csi-node-driver-5zxnw" Feb 12 20:23:46.129598 kubelet[2764]: E0212 20:23:46.129564 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.129598 kubelet[2764]: W0212 20:23:46.129592 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.129732 kubelet[2764]: E0212 20:23:46.129621 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.129919 kubelet[2764]: E0212 20:23:46.129889 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.129919 kubelet[2764]: W0212 20:23:46.129914 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.130058 kubelet[2764]: E0212 20:23:46.129940 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.177830 env[1651]: time="2024-02-12T20:23:46.177761407Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-j2gwg,Uid:17c97462-2eee-43a7-ae94-e6f12831986c,Namespace:calico-system,Attempt:0,}" Feb 12 20:23:46.205843 env[1651]: time="2024-02-12T20:23:46.205700375Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:23:46.206127 env[1651]: time="2024-02-12T20:23:46.206075598Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:23:46.206339 env[1651]: time="2024-02-12T20:23:46.206241129Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:23:46.206832 env[1651]: time="2024-02-12T20:23:46.206707542Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0e54f84a267d48a60a0ae84372c4383ad66e136d2f7ef35d84938086fbfaeefb pid=3197 runtime=io.containerd.runc.v2 Feb 12 20:23:46.230344 kubelet[2764]: E0212 20:23:46.230247 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.230344 kubelet[2764]: W0212 20:23:46.230320 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.230576 kubelet[2764]: E0212 20:23:46.230359 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.231182 kubelet[2764]: E0212 20:23:46.231136 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.231182 kubelet[2764]: W0212 20:23:46.231171 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.231386 kubelet[2764]: E0212 20:23:46.231214 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.231792 kubelet[2764]: E0212 20:23:46.231748 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.231792 kubelet[2764]: W0212 20:23:46.231779 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.231954 kubelet[2764]: E0212 20:23:46.231823 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.232296 kubelet[2764]: E0212 20:23:46.232250 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.232402 kubelet[2764]: W0212 20:23:46.232343 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.232542 kubelet[2764]: E0212 20:23:46.232506 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.232939 kubelet[2764]: E0212 20:23:46.232897 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.232939 kubelet[2764]: W0212 20:23:46.232928 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.233135 kubelet[2764]: E0212 20:23:46.233100 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.233443 kubelet[2764]: E0212 20:23:46.233409 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.233443 kubelet[2764]: W0212 20:23:46.233436 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.233621 kubelet[2764]: E0212 20:23:46.233588 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.233913 kubelet[2764]: E0212 20:23:46.233877 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.233913 kubelet[2764]: W0212 20:23:46.233904 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.234091 kubelet[2764]: E0212 20:23:46.234058 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.234379 kubelet[2764]: E0212 20:23:46.234346 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.234379 kubelet[2764]: W0212 20:23:46.234372 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.235326 kubelet[2764]: E0212 20:23:46.234514 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.237571 kubelet[2764]: E0212 20:23:46.237522 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.237571 kubelet[2764]: W0212 20:23:46.237557 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.237880 kubelet[2764]: E0212 20:23:46.237814 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.239814 kubelet[2764]: E0212 20:23:46.239757 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.239814 kubelet[2764]: W0212 20:23:46.239797 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.240048 kubelet[2764]: E0212 20:23:46.240001 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.240407 kubelet[2764]: E0212 20:23:46.240365 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.240407 kubelet[2764]: W0212 20:23:46.240397 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.240609 kubelet[2764]: E0212 20:23:46.240562 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.240856 kubelet[2764]: E0212 20:23:46.240819 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.240856 kubelet[2764]: W0212 20:23:46.240846 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.241814 kubelet[2764]: E0212 20:23:46.241008 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.241814 kubelet[2764]: E0212 20:23:46.241233 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.241814 kubelet[2764]: W0212 20:23:46.241250 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.241814 kubelet[2764]: E0212 20:23:46.241442 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.244332 kubelet[2764]: E0212 20:23:46.242878 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.244332 kubelet[2764]: W0212 20:23:46.242917 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.244835 kubelet[2764]: E0212 20:23:46.244786 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.246999 kubelet[2764]: E0212 20:23:46.246939 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.247147 kubelet[2764]: W0212 20:23:46.247010 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.248630 kubelet[2764]: E0212 20:23:46.247207 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.248630 kubelet[2764]: E0212 20:23:46.247529 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.248630 kubelet[2764]: W0212 20:23:46.247547 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.248630 kubelet[2764]: E0212 20:23:46.247707 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.248630 kubelet[2764]: E0212 20:23:46.247929 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.248630 kubelet[2764]: W0212 20:23:46.247943 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.248630 kubelet[2764]: E0212 20:23:46.248084 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.256062 kubelet[2764]: E0212 20:23:46.254411 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.256062 kubelet[2764]: W0212 20:23:46.254452 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.256062 kubelet[2764]: E0212 20:23:46.254671 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.256062 kubelet[2764]: E0212 20:23:46.254925 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.256062 kubelet[2764]: W0212 20:23:46.254941 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.256062 kubelet[2764]: E0212 20:23:46.255249 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.256062 kubelet[2764]: W0212 20:23:46.255289 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.256563 kubelet[2764]: E0212 20:23:46.256211 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.256563 kubelet[2764]: W0212 20:23:46.256235 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.257137 systemd[1]: Started cri-containerd-0e54f84a267d48a60a0ae84372c4383ad66e136d2f7ef35d84938086fbfaeefb.scope. Feb 12 20:23:46.258752 kubelet[2764]: E0212 20:23:46.257211 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.258752 kubelet[2764]: W0212 20:23:46.257233 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.258752 kubelet[2764]: E0212 20:23:46.257553 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.258752 kubelet[2764]: W0212 20:23:46.257569 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.258752 kubelet[2764]: E0212 20:23:46.257599 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.258752 kubelet[2764]: E0212 20:23:46.258116 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.258752 kubelet[2764]: W0212 20:23:46.258134 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.258752 kubelet[2764]: E0212 20:23:46.258161 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.260239 kubelet[2764]: E0212 20:23:46.259690 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.263355 kubelet[2764]: E0212 20:23:46.260153 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.263355 kubelet[2764]: W0212 20:23:46.262900 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.263355 kubelet[2764]: E0212 20:23:46.262949 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.263355 kubelet[2764]: E0212 20:23:46.262996 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.263355 kubelet[2764]: E0212 20:23:46.263028 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.263355 kubelet[2764]: E0212 20:23:46.263057 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.305650 kubelet[2764]: E0212 20:23:46.305593 2764 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:23:46.305650 kubelet[2764]: W0212 20:23:46.305635 2764 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:23:46.305861 kubelet[2764]: E0212 20:23:46.305674 2764 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:23:46.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.348000 audit: BPF prog-id=133 op=LOAD Feb 12 20:23:46.350000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.350000 audit[3147]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3135 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:46.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335383434303032386461386163643936306566343739666631343631 Feb 12 20:23:46.350000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.350000 audit[3147]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3135 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:46.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335383434303032386461386163643936306566343739666631343631 Feb 12 20:23:46.350000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.350000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.350000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.350000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.350000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.350000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.350000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.350000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.350000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.350000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.350000 audit: BPF prog-id=134 op=LOAD Feb 12 20:23:46.350000 audit[3147]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3135 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:46.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335383434303032386461386163643936306566343739666631343631 Feb 12 20:23:46.360000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.360000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.360000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.360000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.360000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.360000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.360000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.360000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.360000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.360000 audit: BPF prog-id=135 op=LOAD Feb 12 20:23:46.360000 audit[3147]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3135 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:46.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335383434303032386461386163643936306566343739666631343631 Feb 12 20:23:46.361000 audit: BPF prog-id=135 op=UNLOAD Feb 12 20:23:46.361000 audit: BPF prog-id=134 op=UNLOAD Feb 12 20:23:46.361000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.361000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.361000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.361000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.361000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.361000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.361000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.361000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.361000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.361000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.361000 audit: BPF prog-id=136 op=LOAD Feb 12 20:23:46.361000 audit[3147]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3135 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:46.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335383434303032386461386163643936306566343739666631343631 Feb 12 20:23:46.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.379000 audit: BPF prog-id=137 op=LOAD Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3197 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:46.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065353466383461323637643438613630613061653834333732633433 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3197 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:46.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065353466383461323637643438613630613061653834333732633433 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit: BPF prog-id=138 op=LOAD Feb 12 20:23:46.381000 audit[3205]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3197 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:46.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065353466383461323637643438613630613061653834333732633433 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit: BPF prog-id=139 op=LOAD Feb 12 20:23:46.381000 audit[3205]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3197 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:46.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065353466383461323637643438613630613061653834333732633433 Feb 12 20:23:46.381000 audit: BPF prog-id=139 op=UNLOAD Feb 12 20:23:46.381000 audit: BPF prog-id=138 op=UNLOAD Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:46.381000 audit: BPF prog-id=140 op=LOAD Feb 12 20:23:46.381000 audit[3205]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3197 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:46.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065353466383461323637643438613630613061653834333732633433 Feb 12 20:23:46.415839 env[1651]: time="2024-02-12T20:23:46.415780127Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-j2gwg,Uid:17c97462-2eee-43a7-ae94-e6f12831986c,Namespace:calico-system,Attempt:0,} returns sandbox id \"0e54f84a267d48a60a0ae84372c4383ad66e136d2f7ef35d84938086fbfaeefb\"" Feb 12 20:23:46.420922 env[1651]: time="2024-02-12T20:23:46.420847221Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 20:23:46.450576 env[1651]: time="2024-02-12T20:23:46.450491145Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6fdf4c6679-h6d87,Uid:b5307fac-9581-4b2a-b24f-59e249ff2e5d,Namespace:calico-system,Attempt:0,} returns sandbox id \"c58440028da8acd960ef479ff1461cdd2810ff56083f5f6d722ac96d0075a00c\"" Feb 12 20:23:46.598000 audit[3270]: NETFILTER_CFG table=filter:95 family=2 entries=16 op=nft_register_rule pid=3270 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:23:46.598000 audit[3270]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffc4486060 a2=0 a3=ffffb48a56c0 items=0 ppid=2946 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:46.598000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:23:46.599000 audit[3270]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=3270 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:23:46.599000 audit[3270]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffc4486060 a2=0 a3=ffffb48a56c0 items=0 ppid=2946 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:46.599000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:23:47.721786 kubelet[2764]: E0212 20:23:47.721068 2764 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5zxnw" podUID=813164be-67aa-473b-b98f-ae32d6883ffe Feb 12 20:23:47.932488 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1894090881.mount: Deactivated successfully. Feb 12 20:23:48.109229 env[1651]: time="2024-02-12T20:23:48.109051218Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:48.113560 env[1651]: time="2024-02-12T20:23:48.113488543Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:48.117484 env[1651]: time="2024-02-12T20:23:48.117403895Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:48.121260 env[1651]: time="2024-02-12T20:23:48.121176709Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:48.123786 env[1651]: time="2024-02-12T20:23:48.122544227Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 12 20:23:48.125786 env[1651]: time="2024-02-12T20:23:48.125714079Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 12 20:23:48.128683 env[1651]: time="2024-02-12T20:23:48.128591522Z" level=info msg="CreateContainer within sandbox \"0e54f84a267d48a60a0ae84372c4383ad66e136d2f7ef35d84938086fbfaeefb\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 20:23:48.154573 env[1651]: time="2024-02-12T20:23:48.154485750Z" level=info msg="CreateContainer within sandbox \"0e54f84a267d48a60a0ae84372c4383ad66e136d2f7ef35d84938086fbfaeefb\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"b08ff1f18cfa273d69392cb185d40b553e0a8dc74bb3f519be0f0485c0d702de\"" Feb 12 20:23:48.155686 env[1651]: time="2024-02-12T20:23:48.155616420Z" level=info msg="StartContainer for \"b08ff1f18cfa273d69392cb185d40b553e0a8dc74bb3f519be0f0485c0d702de\"" Feb 12 20:23:48.234905 systemd[1]: Started cri-containerd-b08ff1f18cfa273d69392cb185d40b553e0a8dc74bb3f519be0f0485c0d702de.scope. Feb 12 20:23:48.295000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.295000 audit[3278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3197 pid=3278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:48.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230386666316631386366613237336436393339326362313835643430 Feb 12 20:23:48.296000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.296000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.296000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.296000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.296000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.296000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.296000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.296000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.296000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.296000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.296000 audit: BPF prog-id=141 op=LOAD Feb 12 20:23:48.296000 audit[3278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3197 pid=3278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:48.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230386666316631386366613237336436393339326362313835643430 Feb 12 20:23:48.297000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.297000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.297000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.297000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.297000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.297000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.297000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.297000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.297000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.297000 audit: BPF prog-id=142 op=LOAD Feb 12 20:23:48.297000 audit[3278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3197 pid=3278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:48.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230386666316631386366613237336436393339326362313835643430 Feb 12 20:23:48.299000 audit: BPF prog-id=142 op=UNLOAD Feb 12 20:23:48.300000 audit: BPF prog-id=141 op=UNLOAD Feb 12 20:23:48.300000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.300000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.300000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.300000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.300000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.300000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.300000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.300000 audit[3278]: AVC avc: denied { perfmon } for pid=3278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.300000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.300000 audit[3278]: AVC avc: denied { bpf } for pid=3278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:48.300000 audit: BPF prog-id=143 op=LOAD Feb 12 20:23:48.300000 audit[3278]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3197 pid=3278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:48.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230386666316631386366613237336436393339326362313835643430 Feb 12 20:23:48.341340 env[1651]: time="2024-02-12T20:23:48.341246090Z" level=info msg="StartContainer for \"b08ff1f18cfa273d69392cb185d40b553e0a8dc74bb3f519be0f0485c0d702de\" returns successfully" Feb 12 20:23:48.388000 audit[3303]: NETFILTER_CFG table=filter:97 family=2 entries=16 op=nft_register_rule pid=3303 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:23:48.388000 audit[3303]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffe3af2d30 a2=0 a3=ffffb91cb6c0 items=0 ppid=2946 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:48.388000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:23:48.392000 audit[3303]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=3303 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:23:48.392000 audit[3303]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffe3af2d30 a2=0 a3=ffffb91cb6c0 items=0 ppid=2946 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:48.392000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:23:48.415437 systemd[1]: cri-containerd-b08ff1f18cfa273d69392cb185d40b553e0a8dc74bb3f519be0f0485c0d702de.scope: Deactivated successfully. Feb 12 20:23:48.420000 audit: BPF prog-id=143 op=UNLOAD Feb 12 20:23:48.629218 env[1651]: time="2024-02-12T20:23:48.629143114Z" level=info msg="shim disconnected" id=b08ff1f18cfa273d69392cb185d40b553e0a8dc74bb3f519be0f0485c0d702de Feb 12 20:23:48.629523 env[1651]: time="2024-02-12T20:23:48.629217864Z" level=warning msg="cleaning up after shim disconnected" id=b08ff1f18cfa273d69392cb185d40b553e0a8dc74bb3f519be0f0485c0d702de namespace=k8s.io Feb 12 20:23:48.629523 env[1651]: time="2024-02-12T20:23:48.629241192Z" level=info msg="cleaning up dead shim" Feb 12 20:23:48.649643 env[1651]: time="2024-02-12T20:23:48.649445923Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:23:48Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3322 runtime=io.containerd.runc.v2\n" Feb 12 20:23:48.932648 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b08ff1f18cfa273d69392cb185d40b553e0a8dc74bb3f519be0f0485c0d702de-rootfs.mount: Deactivated successfully. Feb 12 20:23:49.721680 kubelet[2764]: E0212 20:23:49.720991 2764 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5zxnw" podUID=813164be-67aa-473b-b98f-ae32d6883ffe Feb 12 20:23:49.733167 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount656814823.mount: Deactivated successfully. Feb 12 20:23:51.256246 env[1651]: time="2024-02-12T20:23:51.256182916Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:51.259848 env[1651]: time="2024-02-12T20:23:51.259775560Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:51.262241 env[1651]: time="2024-02-12T20:23:51.262172593Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:51.265393 env[1651]: time="2024-02-12T20:23:51.265325647Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:51.266619 env[1651]: time="2024-02-12T20:23:51.266550168Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969\"" Feb 12 20:23:51.270307 env[1651]: time="2024-02-12T20:23:51.268682452Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 20:23:51.298815 env[1651]: time="2024-02-12T20:23:51.298729802Z" level=info msg="CreateContainer within sandbox \"c58440028da8acd960ef479ff1461cdd2810ff56083f5f6d722ac96d0075a00c\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 12 20:23:51.329584 env[1651]: time="2024-02-12T20:23:51.329514057Z" level=info msg="CreateContainer within sandbox \"c58440028da8acd960ef479ff1461cdd2810ff56083f5f6d722ac96d0075a00c\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"4c0d1b1178f150f6cd64f75475e3cb49f3ecc52d2f764caee1cc1491a56e854b\"" Feb 12 20:23:51.330931 env[1651]: time="2024-02-12T20:23:51.330880923Z" level=info msg="StartContainer for \"4c0d1b1178f150f6cd64f75475e3cb49f3ecc52d2f764caee1cc1491a56e854b\"" Feb 12 20:23:51.376895 systemd[1]: Started cri-containerd-4c0d1b1178f150f6cd64f75475e3cb49f3ecc52d2f764caee1cc1491a56e854b.scope. Feb 12 20:23:51.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.443068 kernel: kauditd_printk_skb: 172 callbacks suppressed Feb 12 20:23:51.443178 kernel: audit: type=1400 audit(1707769431.439:1158): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.459554 kernel: audit: type=1400 audit(1707769431.439:1159): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.467852 kernel: audit: type=1400 audit(1707769431.439:1160): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.484388 kernel: audit: type=1400 audit(1707769431.439:1161): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.484549 kernel: audit: type=1400 audit(1707769431.439:1162): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.492880 kernel: audit: type=1400 audit(1707769431.439:1163): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.493047 kernel: audit: type=1400 audit(1707769431.439:1164): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.518487 kernel: audit: type=1400 audit(1707769431.439:1165): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.518671 kernel: audit: type=1400 audit(1707769431.439:1166): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.519381 kernel: audit: type=1400 audit(1707769431.441:1167): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.441000 audit: BPF prog-id=144 op=LOAD Feb 12 20:23:51.449000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.449000 audit[3343]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3135 pid=3343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:51.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463306431623131373866313530663663643634663735343735653363 Feb 12 20:23:51.449000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.449000 audit[3343]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3135 pid=3343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:51.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463306431623131373866313530663663643634663735343735653363 Feb 12 20:23:51.449000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.449000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.449000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.449000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.449000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.449000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.449000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.449000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.449000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.449000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.449000 audit: BPF prog-id=145 op=LOAD Feb 12 20:23:51.449000 audit[3343]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3135 pid=3343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:51.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463306431623131373866313530663663643634663735343735653363 Feb 12 20:23:51.449000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.449000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.449000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.449000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.449000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.449000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.449000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.449000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.449000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.449000 audit: BPF prog-id=146 op=LOAD Feb 12 20:23:51.449000 audit[3343]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3135 pid=3343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:51.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463306431623131373866313530663663643634663735343735653363 Feb 12 20:23:51.450000 audit: BPF prog-id=146 op=UNLOAD Feb 12 20:23:51.450000 audit: BPF prog-id=145 op=UNLOAD Feb 12 20:23:51.450000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.450000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.450000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.450000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.450000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.450000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.450000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.450000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.450000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.450000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:51.450000 audit: BPF prog-id=147 op=LOAD Feb 12 20:23:51.450000 audit[3343]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3135 pid=3343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:51.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463306431623131373866313530663663643634663735343735653363 Feb 12 20:23:51.583145 env[1651]: time="2024-02-12T20:23:51.583083669Z" level=info msg="StartContainer for \"4c0d1b1178f150f6cd64f75475e3cb49f3ecc52d2f764caee1cc1491a56e854b\" returns successfully" Feb 12 20:23:51.721645 kubelet[2764]: E0212 20:23:51.721564 2764 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5zxnw" podUID=813164be-67aa-473b-b98f-ae32d6883ffe Feb 12 20:23:51.854016 env[1651]: time="2024-02-12T20:23:51.852200690Z" level=info msg="StopContainer for \"4c0d1b1178f150f6cd64f75475e3cb49f3ecc52d2f764caee1cc1491a56e854b\" with timeout 300 (s)" Feb 12 20:23:51.856671 env[1651]: time="2024-02-12T20:23:51.856598917Z" level=info msg="Stop container \"4c0d1b1178f150f6cd64f75475e3cb49f3ecc52d2f764caee1cc1491a56e854b\" with signal terminated" Feb 12 20:23:51.891134 kubelet[2764]: I0212 20:23:51.890420 2764 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-6fdf4c6679-h6d87" podStartSLOduration=2.091117282 podCreationTimestamp="2024-02-12 20:23:45 +0000 UTC" firstStartedPulling="2024-02-12 20:23:46.467787475 +0000 UTC m=+20.053427774" lastFinishedPulling="2024-02-12 20:23:51.267031674 +0000 UTC m=+24.852671985" observedRunningTime="2024-02-12 20:23:51.88808829 +0000 UTC m=+25.473728613" watchObservedRunningTime="2024-02-12 20:23:51.890361493 +0000 UTC m=+25.476001792" Feb 12 20:23:51.925000 audit: BPF prog-id=144 op=UNLOAD Feb 12 20:23:51.925552 systemd[1]: cri-containerd-4c0d1b1178f150f6cd64f75475e3cb49f3ecc52d2f764caee1cc1491a56e854b.scope: Deactivated successfully. Feb 12 20:23:51.928000 audit: BPF prog-id=147 op=UNLOAD Feb 12 20:23:52.186710 env[1651]: time="2024-02-12T20:23:52.186633739Z" level=info msg="shim disconnected" id=4c0d1b1178f150f6cd64f75475e3cb49f3ecc52d2f764caee1cc1491a56e854b Feb 12 20:23:52.186710 env[1651]: time="2024-02-12T20:23:52.186704252Z" level=warning msg="cleaning up after shim disconnected" id=4c0d1b1178f150f6cd64f75475e3cb49f3ecc52d2f764caee1cc1491a56e854b namespace=k8s.io Feb 12 20:23:52.187045 env[1651]: time="2024-02-12T20:23:52.186727401Z" level=info msg="cleaning up dead shim" Feb 12 20:23:52.205070 env[1651]: time="2024-02-12T20:23:52.205000824Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:23:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3391 runtime=io.containerd.runc.v2\n" Feb 12 20:23:52.208061 env[1651]: time="2024-02-12T20:23:52.207998438Z" level=info msg="StopContainer for \"4c0d1b1178f150f6cd64f75475e3cb49f3ecc52d2f764caee1cc1491a56e854b\" returns successfully" Feb 12 20:23:52.209130 env[1651]: time="2024-02-12T20:23:52.209079495Z" level=info msg="StopPodSandbox for \"c58440028da8acd960ef479ff1461cdd2810ff56083f5f6d722ac96d0075a00c\"" Feb 12 20:23:52.209729 env[1651]: time="2024-02-12T20:23:52.209674343Z" level=info msg="Container to stop \"4c0d1b1178f150f6cd64f75475e3cb49f3ecc52d2f764caee1cc1491a56e854b\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Feb 12 20:23:52.222000 audit: BPF prog-id=133 op=UNLOAD Feb 12 20:23:52.222108 systemd[1]: cri-containerd-c58440028da8acd960ef479ff1461cdd2810ff56083f5f6d722ac96d0075a00c.scope: Deactivated successfully. Feb 12 20:23:52.226000 audit: BPF prog-id=136 op=UNLOAD Feb 12 20:23:52.283603 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4c0d1b1178f150f6cd64f75475e3cb49f3ecc52d2f764caee1cc1491a56e854b-rootfs.mount: Deactivated successfully. Feb 12 20:23:52.283905 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c58440028da8acd960ef479ff1461cdd2810ff56083f5f6d722ac96d0075a00c-rootfs.mount: Deactivated successfully. Feb 12 20:23:52.284034 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c58440028da8acd960ef479ff1461cdd2810ff56083f5f6d722ac96d0075a00c-shm.mount: Deactivated successfully. Feb 12 20:23:52.286635 env[1651]: time="2024-02-12T20:23:52.286214634Z" level=info msg="shim disconnected" id=c58440028da8acd960ef479ff1461cdd2810ff56083f5f6d722ac96d0075a00c Feb 12 20:23:52.287417 env[1651]: time="2024-02-12T20:23:52.287257244Z" level=warning msg="cleaning up after shim disconnected" id=c58440028da8acd960ef479ff1461cdd2810ff56083f5f6d722ac96d0075a00c namespace=k8s.io Feb 12 20:23:52.287551 env[1651]: time="2024-02-12T20:23:52.287523959Z" level=info msg="cleaning up dead shim" Feb 12 20:23:52.311066 env[1651]: time="2024-02-12T20:23:52.311011748Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:23:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3423 runtime=io.containerd.runc.v2\n" Feb 12 20:23:52.311890 env[1651]: time="2024-02-12T20:23:52.311818734Z" level=info msg="TearDown network for sandbox \"c58440028da8acd960ef479ff1461cdd2810ff56083f5f6d722ac96d0075a00c\" successfully" Feb 12 20:23:52.312546 env[1651]: time="2024-02-12T20:23:52.312493743Z" level=info msg="StopPodSandbox for \"c58440028da8acd960ef479ff1461cdd2810ff56083f5f6d722ac96d0075a00c\" returns successfully" Feb 12 20:23:52.357830 kubelet[2764]: I0212 20:23:52.357724 2764 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:23:52.358220 kubelet[2764]: E0212 20:23:52.358190 2764 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="b5307fac-9581-4b2a-b24f-59e249ff2e5d" containerName="calico-typha" Feb 12 20:23:52.358500 kubelet[2764]: I0212 20:23:52.358476 2764 memory_manager.go:346] "RemoveStaleState removing state" podUID="b5307fac-9581-4b2a-b24f-59e249ff2e5d" containerName="calico-typha" Feb 12 20:23:52.369320 systemd[1]: Created slice kubepods-besteffort-pod04872fee_8984_4b4c_8d81_c23f0f552189.slice. Feb 12 20:23:52.391400 kubelet[2764]: I0212 20:23:52.391350 2764 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/b5307fac-9581-4b2a-b24f-59e249ff2e5d-typha-certs\") pod \"b5307fac-9581-4b2a-b24f-59e249ff2e5d\" (UID: \"b5307fac-9581-4b2a-b24f-59e249ff2e5d\") " Feb 12 20:23:52.391706 kubelet[2764]: I0212 20:23:52.391680 2764 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-fhvxr\" (UniqueName: \"kubernetes.io/projected/b5307fac-9581-4b2a-b24f-59e249ff2e5d-kube-api-access-fhvxr\") pod \"b5307fac-9581-4b2a-b24f-59e249ff2e5d\" (UID: \"b5307fac-9581-4b2a-b24f-59e249ff2e5d\") " Feb 12 20:23:52.391894 kubelet[2764]: I0212 20:23:52.391870 2764 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b5307fac-9581-4b2a-b24f-59e249ff2e5d-tigera-ca-bundle\") pod \"b5307fac-9581-4b2a-b24f-59e249ff2e5d\" (UID: \"b5307fac-9581-4b2a-b24f-59e249ff2e5d\") " Feb 12 20:23:52.392121 kubelet[2764]: I0212 20:23:52.392097 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9gzwv\" (UniqueName: \"kubernetes.io/projected/04872fee-8984-4b4c-8d81-c23f0f552189-kube-api-access-9gzwv\") pod \"calico-typha-84957f9fdb-5m9dm\" (UID: \"04872fee-8984-4b4c-8d81-c23f0f552189\") " pod="calico-system/calico-typha-84957f9fdb-5m9dm" Feb 12 20:23:52.392329 kubelet[2764]: I0212 20:23:52.392305 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/04872fee-8984-4b4c-8d81-c23f0f552189-tigera-ca-bundle\") pod \"calico-typha-84957f9fdb-5m9dm\" (UID: \"04872fee-8984-4b4c-8d81-c23f0f552189\") " pod="calico-system/calico-typha-84957f9fdb-5m9dm" Feb 12 20:23:52.392534 kubelet[2764]: I0212 20:23:52.392510 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/04872fee-8984-4b4c-8d81-c23f0f552189-typha-certs\") pod \"calico-typha-84957f9fdb-5m9dm\" (UID: \"04872fee-8984-4b4c-8d81-c23f0f552189\") " pod="calico-system/calico-typha-84957f9fdb-5m9dm" Feb 12 20:23:52.408334 systemd[1]: var-lib-kubelet-pods-b5307fac\x2d9581\x2d4b2a\x2db24f\x2d59e249ff2e5d-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully. Feb 12 20:23:52.426340 kubelet[2764]: I0212 20:23:52.417798 2764 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/b5307fac-9581-4b2a-b24f-59e249ff2e5d-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "b5307fac-9581-4b2a-b24f-59e249ff2e5d" (UID: "b5307fac-9581-4b2a-b24f-59e249ff2e5d"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Feb 12 20:23:52.419359 systemd[1]: var-lib-kubelet-pods-b5307fac\x2d9581\x2d4b2a\x2db24f\x2d59e249ff2e5d-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. Feb 12 20:23:52.426249 systemd[1]: var-lib-kubelet-pods-b5307fac\x2d9581\x2d4b2a\x2db24f\x2d59e249ff2e5d-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dfhvxr.mount: Deactivated successfully. Feb 12 20:23:52.426917 kubelet[2764]: I0212 20:23:52.426872 2764 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/b5307fac-9581-4b2a-b24f-59e249ff2e5d-kube-api-access-fhvxr" (OuterVolumeSpecName: "kube-api-access-fhvxr") pod "b5307fac-9581-4b2a-b24f-59e249ff2e5d" (UID: "b5307fac-9581-4b2a-b24f-59e249ff2e5d"). InnerVolumeSpecName "kube-api-access-fhvxr". PluginName "kubernetes.io/projected", VolumeGidValue "" Feb 12 20:23:52.430586 kubelet[2764]: W0212 20:23:52.430539 2764 empty_dir.go:525] Warning: Failed to clear quota on /var/lib/kubelet/pods/b5307fac-9581-4b2a-b24f-59e249ff2e5d/volumes/kubernetes.io~configmap/tigera-ca-bundle: clearQuota called, but quotas disabled Feb 12 20:23:52.431035 kubelet[2764]: I0212 20:23:52.430986 2764 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/b5307fac-9581-4b2a-b24f-59e249ff2e5d-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "b5307fac-9581-4b2a-b24f-59e249ff2e5d" (UID: "b5307fac-9581-4b2a-b24f-59e249ff2e5d"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Feb 12 20:23:52.429000 audit[3445]: NETFILTER_CFG table=filter:99 family=2 entries=16 op=nft_register_rule pid=3445 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:23:52.429000 audit[3445]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffdc4d5fd0 a2=0 a3=ffff8f2116c0 items=0 ppid=2946 pid=3445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:52.429000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:23:52.440000 audit[3445]: NETFILTER_CFG table=nat:100 family=2 entries=12 op=nft_register_rule pid=3445 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:23:52.440000 audit[3445]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffdc4d5fd0 a2=0 a3=ffff8f2116c0 items=0 ppid=2946 pid=3445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:52.440000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:23:52.491000 audit[3447]: NETFILTER_CFG table=filter:101 family=2 entries=16 op=nft_register_rule pid=3447 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:23:52.491000 audit[3447]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffc4ce2d40 a2=0 a3=ffff9c6aa6c0 items=0 ppid=2946 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:52.493074 kubelet[2764]: I0212 20:23:52.492892 2764 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-fhvxr\" (UniqueName: \"kubernetes.io/projected/b5307fac-9581-4b2a-b24f-59e249ff2e5d-kube-api-access-fhvxr\") on node \"ip-172-31-19-54\" DevicePath \"\"" Feb 12 20:23:52.493074 kubelet[2764]: I0212 20:23:52.492954 2764 reconciler_common.go:300] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b5307fac-9581-4b2a-b24f-59e249ff2e5d-tigera-ca-bundle\") on node \"ip-172-31-19-54\" DevicePath \"\"" Feb 12 20:23:52.493074 kubelet[2764]: I0212 20:23:52.492984 2764 reconciler_common.go:300] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/b5307fac-9581-4b2a-b24f-59e249ff2e5d-typha-certs\") on node \"ip-172-31-19-54\" DevicePath \"\"" Feb 12 20:23:52.491000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:23:52.498000 audit[3447]: NETFILTER_CFG table=nat:102 family=2 entries=12 op=nft_register_rule pid=3447 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:23:52.498000 audit[3447]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffc4ce2d40 a2=0 a3=ffff9c6aa6c0 items=0 ppid=2946 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:52.498000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:23:52.678333 env[1651]: time="2024-02-12T20:23:52.678235939Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-84957f9fdb-5m9dm,Uid:04872fee-8984-4b4c-8d81-c23f0f552189,Namespace:calico-system,Attempt:0,}" Feb 12 20:23:52.729062 env[1651]: time="2024-02-12T20:23:52.728316304Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:23:52.729062 env[1651]: time="2024-02-12T20:23:52.728380913Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:23:52.729062 env[1651]: time="2024-02-12T20:23:52.728406330Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:23:52.729062 env[1651]: time="2024-02-12T20:23:52.728692857Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cb4779be1668629ec4257ad3c05175e3337eca3b29163bc533a70e3579b85fce pid=3456 runtime=io.containerd.runc.v2 Feb 12 20:23:52.750073 systemd[1]: Removed slice kubepods-besteffort-podb5307fac_9581_4b2a_b24f_59e249ff2e5d.slice. Feb 12 20:23:52.790431 systemd[1]: Started cri-containerd-cb4779be1668629ec4257ad3c05175e3337eca3b29163bc533a70e3579b85fce.scope. Feb 12 20:23:52.861072 kubelet[2764]: I0212 20:23:52.860727 2764 scope.go:115] "RemoveContainer" containerID="4c0d1b1178f150f6cd64f75475e3cb49f3ecc52d2f764caee1cc1491a56e854b" Feb 12 20:23:52.869812 env[1651]: time="2024-02-12T20:23:52.869593011Z" level=info msg="RemoveContainer for \"4c0d1b1178f150f6cd64f75475e3cb49f3ecc52d2f764caee1cc1491a56e854b\"" Feb 12 20:23:52.877379 env[1651]: time="2024-02-12T20:23:52.877107314Z" level=info msg="RemoveContainer for \"4c0d1b1178f150f6cd64f75475e3cb49f3ecc52d2f764caee1cc1491a56e854b\" returns successfully" Feb 12 20:23:52.878919 kubelet[2764]: I0212 20:23:52.877835 2764 scope.go:115] "RemoveContainer" containerID="4c0d1b1178f150f6cd64f75475e3cb49f3ecc52d2f764caee1cc1491a56e854b" Feb 12 20:23:52.879691 env[1651]: time="2024-02-12T20:23:52.879538340Z" level=error msg="ContainerStatus for \"4c0d1b1178f150f6cd64f75475e3cb49f3ecc52d2f764caee1cc1491a56e854b\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"4c0d1b1178f150f6cd64f75475e3cb49f3ecc52d2f764caee1cc1491a56e854b\": not found" Feb 12 20:23:52.882623 kubelet[2764]: E0212 20:23:52.882564 2764 remote_runtime.go:415] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"4c0d1b1178f150f6cd64f75475e3cb49f3ecc52d2f764caee1cc1491a56e854b\": not found" containerID="4c0d1b1178f150f6cd64f75475e3cb49f3ecc52d2f764caee1cc1491a56e854b" Feb 12 20:23:52.882973 kubelet[2764]: I0212 20:23:52.882922 2764 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={Type:containerd ID:4c0d1b1178f150f6cd64f75475e3cb49f3ecc52d2f764caee1cc1491a56e854b} err="failed to get container status \"4c0d1b1178f150f6cd64f75475e3cb49f3ecc52d2f764caee1cc1491a56e854b\": rpc error: code = NotFound desc = an error occurred when try to find container \"4c0d1b1178f150f6cd64f75475e3cb49f3ecc52d2f764caee1cc1491a56e854b\": not found" Feb 12 20:23:52.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.895000 audit: BPF prog-id=148 op=LOAD Feb 12 20:23:52.903000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.903000 audit[3466]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3456 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:52.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362343737396265313636383632396563343235376164336330353137 Feb 12 20:23:52.906000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.906000 audit[3466]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3456 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:52.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362343737396265313636383632396563343235376164336330353137 Feb 12 20:23:52.907000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.907000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.907000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.907000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.907000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.907000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.907000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.907000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.907000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.907000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.907000 audit: BPF prog-id=149 op=LOAD Feb 12 20:23:52.907000 audit[3466]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3456 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:52.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362343737396265313636383632396563343235376164336330353137 Feb 12 20:23:52.909000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.909000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.909000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.909000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.909000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.909000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.909000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.909000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.909000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.909000 audit: BPF prog-id=150 op=LOAD Feb 12 20:23:52.909000 audit[3466]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3456 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:52.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362343737396265313636383632396563343235376164336330353137 Feb 12 20:23:52.914000 audit: BPF prog-id=150 op=UNLOAD Feb 12 20:23:52.915000 audit: BPF prog-id=149 op=UNLOAD Feb 12 20:23:52.916000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.916000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.916000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.916000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.916000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.916000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.916000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.916000 audit[3466]: AVC avc: denied { perfmon } for pid=3466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.916000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.916000 audit[3466]: AVC avc: denied { bpf } for pid=3466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:52.916000 audit: BPF prog-id=151 op=LOAD Feb 12 20:23:52.916000 audit[3466]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3456 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:52.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362343737396265313636383632396563343235376164336330353137 Feb 12 20:23:53.017143 env[1651]: time="2024-02-12T20:23:53.016993945Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-84957f9fdb-5m9dm,Uid:04872fee-8984-4b4c-8d81-c23f0f552189,Namespace:calico-system,Attempt:0,} returns sandbox id \"cb4779be1668629ec4257ad3c05175e3337eca3b29163bc533a70e3579b85fce\"" Feb 12 20:23:53.065778 env[1651]: time="2024-02-12T20:23:53.065712939Z" level=info msg="CreateContainer within sandbox \"cb4779be1668629ec4257ad3c05175e3337eca3b29163bc533a70e3579b85fce\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 12 20:23:53.094133 env[1651]: time="2024-02-12T20:23:53.094063071Z" level=info msg="CreateContainer within sandbox \"cb4779be1668629ec4257ad3c05175e3337eca3b29163bc533a70e3579b85fce\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"079afb82d58cfb6c61cd7e5500bc87725668ff899de3a3278507608d167792ca\"" Feb 12 20:23:53.095414 env[1651]: time="2024-02-12T20:23:53.095358258Z" level=info msg="StartContainer for \"079afb82d58cfb6c61cd7e5500bc87725668ff899de3a3278507608d167792ca\"" Feb 12 20:23:53.184135 systemd[1]: Started cri-containerd-079afb82d58cfb6c61cd7e5500bc87725668ff899de3a3278507608d167792ca.scope. Feb 12 20:23:53.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.546000 audit: BPF prog-id=152 op=LOAD Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3456 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:53.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037396166623832643538636662366336316364376535353030626338 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3456 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:53.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037396166623832643538636662366336316364376535353030626338 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit: BPF prog-id=153 op=LOAD Feb 12 20:23:53.548000 audit[3499]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3456 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:53.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037396166623832643538636662366336316364376535353030626338 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit: BPF prog-id=154 op=LOAD Feb 12 20:23:53.548000 audit[3499]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3456 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:53.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037396166623832643538636662366336316364376535353030626338 Feb 12 20:23:53.548000 audit: BPF prog-id=154 op=UNLOAD Feb 12 20:23:53.548000 audit: BPF prog-id=153 op=UNLOAD Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:53.548000 audit: BPF prog-id=155 op=LOAD Feb 12 20:23:53.548000 audit[3499]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3456 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:53.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037396166623832643538636662366336316364376535353030626338 Feb 12 20:23:53.680238 env[1651]: time="2024-02-12T20:23:53.680172855Z" level=info msg="StartContainer for \"079afb82d58cfb6c61cd7e5500bc87725668ff899de3a3278507608d167792ca\" returns successfully" Feb 12 20:23:53.723046 kubelet[2764]: E0212 20:23:53.722401 2764 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5zxnw" podUID=813164be-67aa-473b-b98f-ae32d6883ffe Feb 12 20:23:53.924857 kubelet[2764]: I0212 20:23:53.924193 2764 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-84957f9fdb-5m9dm" podStartSLOduration=5.92325418 podCreationTimestamp="2024-02-12 20:23:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:23:53.922893336 +0000 UTC m=+27.508533647" watchObservedRunningTime="2024-02-12 20:23:53.92325418 +0000 UTC m=+27.508894479" Feb 12 20:23:54.726879 kubelet[2764]: I0212 20:23:54.726805 2764 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID=b5307fac-9581-4b2a-b24f-59e249ff2e5d path="/var/lib/kubelet/pods/b5307fac-9581-4b2a-b24f-59e249ff2e5d/volumes" Feb 12 20:23:55.001000 audit[3530]: NETFILTER_CFG table=filter:103 family=2 entries=15 op=nft_register_rule pid=3530 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:23:55.001000 audit[3530]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffed6fbdc0 a2=0 a3=ffffaedd06c0 items=0 ppid=2946 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:55.001000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:23:55.004000 audit[3530]: NETFILTER_CFG table=nat:104 family=2 entries=19 op=nft_register_chain pid=3530 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:23:55.004000 audit[3530]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6068 a0=3 a1=ffffed6fbdc0 a2=0 a3=ffffaedd06c0 items=0 ppid=2946 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:55.004000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:23:55.721352 kubelet[2764]: E0212 20:23:55.721311 2764 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5zxnw" podUID=813164be-67aa-473b-b98f-ae32d6883ffe Feb 12 20:23:56.893235 env[1651]: time="2024-02-12T20:23:56.893177804Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:56.895963 env[1651]: time="2024-02-12T20:23:56.895916543Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:56.898405 env[1651]: time="2024-02-12T20:23:56.898358878Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:56.905825 env[1651]: time="2024-02-12T20:23:56.905753567Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:23:56.907071 env[1651]: time="2024-02-12T20:23:56.907008443Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 12 20:23:56.913345 env[1651]: time="2024-02-12T20:23:56.913260048Z" level=info msg="CreateContainer within sandbox \"0e54f84a267d48a60a0ae84372c4383ad66e136d2f7ef35d84938086fbfaeefb\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 20:23:56.935253 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1241762798.mount: Deactivated successfully. Feb 12 20:23:56.947477 env[1651]: time="2024-02-12T20:23:56.947394717Z" level=info msg="CreateContainer within sandbox \"0e54f84a267d48a60a0ae84372c4383ad66e136d2f7ef35d84938086fbfaeefb\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"e1c2fef217e490233eb31b21a2c2a0bbda4048f1faf47ca1132a6db27220ccda\"" Feb 12 20:23:56.950839 env[1651]: time="2024-02-12T20:23:56.950778522Z" level=info msg="StartContainer for \"e1c2fef217e490233eb31b21a2c2a0bbda4048f1faf47ca1132a6db27220ccda\"" Feb 12 20:23:57.018499 systemd[1]: Started cri-containerd-e1c2fef217e490233eb31b21a2c2a0bbda4048f1faf47ca1132a6db27220ccda.scope. Feb 12 20:23:57.050000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.052418 kernel: kauditd_printk_skb: 183 callbacks suppressed Feb 12 20:23:57.052584 kernel: audit: type=1400 audit(1707769437.050:1222): avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.050000 audit[3540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3197 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:57.071620 kernel: audit: type=1300 audit(1707769437.050:1222): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3197 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:57.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531633266656632313765343930323333656233316232316132633261 Feb 12 20:23:57.082719 kernel: audit: type=1327 audit(1707769437.050:1222): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531633266656632313765343930323333656233316232316132633261 Feb 12 20:23:57.082850 kernel: audit: type=1400 audit(1707769437.051:1223): avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.051000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.051000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.098093 kernel: audit: type=1400 audit(1707769437.051:1223): avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.051000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.108015 kernel: audit: type=1400 audit(1707769437.051:1223): avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.051000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.117499 kernel: audit: type=1400 audit(1707769437.051:1223): avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.051000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.131143 kernel: audit: type=1400 audit(1707769437.051:1223): avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.131254 kernel: audit: type=1400 audit(1707769437.051:1223): avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.051000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.051000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.146440 kernel: audit: type=1400 audit(1707769437.051:1223): avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.051000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.051000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.051000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.051000 audit: BPF prog-id=156 op=LOAD Feb 12 20:23:57.051000 audit[3540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3197 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:57.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531633266656632313765343930323333656233316232316132633261 Feb 12 20:23:57.052000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.052000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.052000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.052000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.052000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.052000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.052000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.052000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.052000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.052000 audit: BPF prog-id=157 op=LOAD Feb 12 20:23:57.052000 audit[3540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3197 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:57.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531633266656632313765343930323333656233316232316132633261 Feb 12 20:23:57.059000 audit: BPF prog-id=157 op=UNLOAD Feb 12 20:23:57.059000 audit: BPF prog-id=156 op=UNLOAD Feb 12 20:23:57.060000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.060000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.060000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.060000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.060000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.060000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.060000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.060000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.060000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.060000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:23:57.060000 audit: BPF prog-id=158 op=LOAD Feb 12 20:23:57.060000 audit[3540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3197 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:23:57.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531633266656632313765343930323333656233316232316132633261 Feb 12 20:23:57.159700 env[1651]: time="2024-02-12T20:23:57.159637705Z" level=info msg="StartContainer for \"e1c2fef217e490233eb31b21a2c2a0bbda4048f1faf47ca1132a6db27220ccda\" returns successfully" Feb 12 20:23:57.721713 kubelet[2764]: E0212 20:23:57.720967 2764 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5zxnw" podUID=813164be-67aa-473b-b98f-ae32d6883ffe Feb 12 20:23:57.886922 env[1651]: time="2024-02-12T20:23:57.886839553Z" level=info msg="StopContainer for \"e1c2fef217e490233eb31b21a2c2a0bbda4048f1faf47ca1132a6db27220ccda\" with timeout 5 (s)" Feb 12 20:23:57.889188 env[1651]: time="2024-02-12T20:23:57.887481427Z" level=info msg="Stop container \"e1c2fef217e490233eb31b21a2c2a0bbda4048f1faf47ca1132a6db27220ccda\" with signal terminated" Feb 12 20:23:57.930213 systemd[1]: run-containerd-runc-k8s.io-e1c2fef217e490233eb31b21a2c2a0bbda4048f1faf47ca1132a6db27220ccda-runc.s0zjWK.mount: Deactivated successfully. Feb 12 20:23:57.985142 systemd[1]: cri-containerd-e1c2fef217e490233eb31b21a2c2a0bbda4048f1faf47ca1132a6db27220ccda.scope: Deactivated successfully. Feb 12 20:23:57.990000 audit: BPF prog-id=158 op=UNLOAD Feb 12 20:23:58.032116 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e1c2fef217e490233eb31b21a2c2a0bbda4048f1faf47ca1132a6db27220ccda-rootfs.mount: Deactivated successfully. Feb 12 20:23:58.805450 env[1651]: time="2024-02-12T20:23:58.805084586Z" level=info msg="shim disconnected" id=e1c2fef217e490233eb31b21a2c2a0bbda4048f1faf47ca1132a6db27220ccda Feb 12 20:23:58.805450 env[1651]: time="2024-02-12T20:23:58.805151547Z" level=warning msg="cleaning up after shim disconnected" id=e1c2fef217e490233eb31b21a2c2a0bbda4048f1faf47ca1132a6db27220ccda namespace=k8s.io Feb 12 20:23:58.805450 env[1651]: time="2024-02-12T20:23:58.805172511Z" level=info msg="cleaning up dead shim" Feb 12 20:23:58.820643 env[1651]: time="2024-02-12T20:23:58.820587303Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:23:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3590 runtime=io.containerd.runc.v2\n" Feb 12 20:23:58.823534 env[1651]: time="2024-02-12T20:23:58.823479004Z" level=info msg="StopContainer for \"e1c2fef217e490233eb31b21a2c2a0bbda4048f1faf47ca1132a6db27220ccda\" returns successfully" Feb 12 20:23:58.824562 env[1651]: time="2024-02-12T20:23:58.824478433Z" level=info msg="StopPodSandbox for \"0e54f84a267d48a60a0ae84372c4383ad66e136d2f7ef35d84938086fbfaeefb\"" Feb 12 20:23:58.824711 env[1651]: time="2024-02-12T20:23:58.824592122Z" level=info msg="Container to stop \"b08ff1f18cfa273d69392cb185d40b553e0a8dc74bb3f519be0f0485c0d702de\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Feb 12 20:23:58.824711 env[1651]: time="2024-02-12T20:23:58.824625122Z" level=info msg="Container to stop \"e1c2fef217e490233eb31b21a2c2a0bbda4048f1faf47ca1132a6db27220ccda\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Feb 12 20:23:58.828106 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0e54f84a267d48a60a0ae84372c4383ad66e136d2f7ef35d84938086fbfaeefb-shm.mount: Deactivated successfully. Feb 12 20:23:58.843022 systemd[1]: cri-containerd-0e54f84a267d48a60a0ae84372c4383ad66e136d2f7ef35d84938086fbfaeefb.scope: Deactivated successfully. Feb 12 20:23:58.843000 audit: BPF prog-id=137 op=UNLOAD Feb 12 20:23:58.847000 audit: BPF prog-id=140 op=UNLOAD Feb 12 20:23:58.876236 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0e54f84a267d48a60a0ae84372c4383ad66e136d2f7ef35d84938086fbfaeefb-rootfs.mount: Deactivated successfully. Feb 12 20:23:58.889571 env[1651]: time="2024-02-12T20:23:58.889488679Z" level=info msg="shim disconnected" id=0e54f84a267d48a60a0ae84372c4383ad66e136d2f7ef35d84938086fbfaeefb Feb 12 20:23:58.889571 env[1651]: time="2024-02-12T20:23:58.889565360Z" level=warning msg="cleaning up after shim disconnected" id=0e54f84a267d48a60a0ae84372c4383ad66e136d2f7ef35d84938086fbfaeefb namespace=k8s.io Feb 12 20:23:58.890018 env[1651]: time="2024-02-12T20:23:58.889588064Z" level=info msg="cleaning up dead shim" Feb 12 20:23:58.906530 env[1651]: time="2024-02-12T20:23:58.906467193Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:23:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3620 runtime=io.containerd.runc.v2\n" Feb 12 20:23:58.907101 env[1651]: time="2024-02-12T20:23:58.907052582Z" level=info msg="TearDown network for sandbox \"0e54f84a267d48a60a0ae84372c4383ad66e136d2f7ef35d84938086fbfaeefb\" successfully" Feb 12 20:23:58.907233 env[1651]: time="2024-02-12T20:23:58.907101626Z" level=info msg="StopPodSandbox for \"0e54f84a267d48a60a0ae84372c4383ad66e136d2f7ef35d84938086fbfaeefb\" returns successfully" Feb 12 20:23:58.946320 kubelet[2764]: I0212 20:23:58.946258 2764 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-cni-net-dir\") pod \"17c97462-2eee-43a7-ae94-e6f12831986c\" (UID: \"17c97462-2eee-43a7-ae94-e6f12831986c\") " Feb 12 20:23:58.947043 kubelet[2764]: I0212 20:23:58.947017 2764 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-cni-bin-dir\") pod \"17c97462-2eee-43a7-ae94-e6f12831986c\" (UID: \"17c97462-2eee-43a7-ae94-e6f12831986c\") " Feb 12 20:23:58.947225 kubelet[2764]: I0212 20:23:58.946383 2764 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "17c97462-2eee-43a7-ae94-e6f12831986c" (UID: "17c97462-2eee-43a7-ae94-e6f12831986c"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 20:23:58.947356 kubelet[2764]: I0212 20:23:58.947059 2764 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "17c97462-2eee-43a7-ae94-e6f12831986c" (UID: "17c97462-2eee-43a7-ae94-e6f12831986c"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 20:23:58.947462 kubelet[2764]: I0212 20:23:58.947205 2764 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/17c97462-2eee-43a7-ae94-e6f12831986c-tigera-ca-bundle\") pod \"17c97462-2eee-43a7-ae94-e6f12831986c\" (UID: \"17c97462-2eee-43a7-ae94-e6f12831986c\") " Feb 12 20:23:58.947622 kubelet[2764]: I0212 20:23:58.947599 2764 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-var-lib-calico\") pod \"17c97462-2eee-43a7-ae94-e6f12831986c\" (UID: \"17c97462-2eee-43a7-ae94-e6f12831986c\") " Feb 12 20:23:58.947776 kubelet[2764]: I0212 20:23:58.947755 2764 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/17c97462-2eee-43a7-ae94-e6f12831986c-node-certs\") pod \"17c97462-2eee-43a7-ae94-e6f12831986c\" (UID: \"17c97462-2eee-43a7-ae94-e6f12831986c\") " Feb 12 20:23:58.948045 kubelet[2764]: I0212 20:23:58.948020 2764 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-xtables-lock\") pod \"17c97462-2eee-43a7-ae94-e6f12831986c\" (UID: \"17c97462-2eee-43a7-ae94-e6f12831986c\") " Feb 12 20:23:58.948212 kubelet[2764]: I0212 20:23:58.948190 2764 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-policysync\") pod \"17c97462-2eee-43a7-ae94-e6f12831986c\" (UID: \"17c97462-2eee-43a7-ae94-e6f12831986c\") " Feb 12 20:23:58.948391 kubelet[2764]: I0212 20:23:58.948368 2764 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-lib-modules\") pod \"17c97462-2eee-43a7-ae94-e6f12831986c\" (UID: \"17c97462-2eee-43a7-ae94-e6f12831986c\") " Feb 12 20:23:58.948571 kubelet[2764]: I0212 20:23:58.948548 2764 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-flexvol-driver-host\") pod \"17c97462-2eee-43a7-ae94-e6f12831986c\" (UID: \"17c97462-2eee-43a7-ae94-e6f12831986c\") " Feb 12 20:23:58.948738 kubelet[2764]: I0212 20:23:58.948717 2764 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-q5656\" (UniqueName: \"kubernetes.io/projected/17c97462-2eee-43a7-ae94-e6f12831986c-kube-api-access-q5656\") pod \"17c97462-2eee-43a7-ae94-e6f12831986c\" (UID: \"17c97462-2eee-43a7-ae94-e6f12831986c\") " Feb 12 20:23:58.948894 kubelet[2764]: I0212 20:23:58.948851 2764 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "17c97462-2eee-43a7-ae94-e6f12831986c" (UID: "17c97462-2eee-43a7-ae94-e6f12831986c"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 20:23:58.949017 kubelet[2764]: I0212 20:23:58.948993 2764 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-var-run-calico\") pod \"17c97462-2eee-43a7-ae94-e6f12831986c\" (UID: \"17c97462-2eee-43a7-ae94-e6f12831986c\") " Feb 12 20:23:58.949165 kubelet[2764]: I0212 20:23:58.949144 2764 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-cni-log-dir\") pod \"17c97462-2eee-43a7-ae94-e6f12831986c\" (UID: \"17c97462-2eee-43a7-ae94-e6f12831986c\") " Feb 12 20:23:58.949445 kubelet[2764]: I0212 20:23:58.949420 2764 reconciler_common.go:300] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-cni-bin-dir\") on node \"ip-172-31-19-54\" DevicePath \"\"" Feb 12 20:23:58.949598 kubelet[2764]: I0212 20:23:58.949577 2764 reconciler_common.go:300] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-cni-net-dir\") on node \"ip-172-31-19-54\" DevicePath \"\"" Feb 12 20:23:58.950012 kubelet[2764]: I0212 20:23:58.949989 2764 reconciler_common.go:300] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-lib-modules\") on node \"ip-172-31-19-54\" DevicePath \"\"" Feb 12 20:23:58.950226 kubelet[2764]: I0212 20:23:58.947746 2764 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "17c97462-2eee-43a7-ae94-e6f12831986c" (UID: "17c97462-2eee-43a7-ae94-e6f12831986c"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 20:23:58.950486 kubelet[2764]: I0212 20:23:58.949731 2764 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "17c97462-2eee-43a7-ae94-e6f12831986c" (UID: "17c97462-2eee-43a7-ae94-e6f12831986c"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 20:23:58.950623 kubelet[2764]: I0212 20:23:58.948753 2764 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-policysync" (OuterVolumeSpecName: "policysync") pod "17c97462-2eee-43a7-ae94-e6f12831986c" (UID: "17c97462-2eee-43a7-ae94-e6f12831986c"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 20:23:58.950771 kubelet[2764]: W0212 20:23:58.947673 2764 empty_dir.go:525] Warning: Failed to clear quota on /var/lib/kubelet/pods/17c97462-2eee-43a7-ae94-e6f12831986c/volumes/kubernetes.io~configmap/tigera-ca-bundle: clearQuota called, but quotas disabled Feb 12 20:23:58.950985 kubelet[2764]: I0212 20:23:58.948806 2764 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "17c97462-2eee-43a7-ae94-e6f12831986c" (UID: "17c97462-2eee-43a7-ae94-e6f12831986c"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 20:23:58.951098 kubelet[2764]: I0212 20:23:58.949782 2764 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "17c97462-2eee-43a7-ae94-e6f12831986c" (UID: "17c97462-2eee-43a7-ae94-e6f12831986c"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 20:23:58.951215 kubelet[2764]: I0212 20:23:58.950183 2764 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "17c97462-2eee-43a7-ae94-e6f12831986c" (UID: "17c97462-2eee-43a7-ae94-e6f12831986c"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 20:23:58.951919 kubelet[2764]: I0212 20:23:58.951866 2764 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/17c97462-2eee-43a7-ae94-e6f12831986c-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "17c97462-2eee-43a7-ae94-e6f12831986c" (UID: "17c97462-2eee-43a7-ae94-e6f12831986c"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Feb 12 20:23:58.957120 systemd[1]: var-lib-kubelet-pods-17c97462\x2d2eee\x2d43a7\x2dae94\x2de6f12831986c-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Feb 12 20:23:58.961357 kubelet[2764]: I0212 20:23:58.959501 2764 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/17c97462-2eee-43a7-ae94-e6f12831986c-node-certs" (OuterVolumeSpecName: "node-certs") pod "17c97462-2eee-43a7-ae94-e6f12831986c" (UID: "17c97462-2eee-43a7-ae94-e6f12831986c"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Feb 12 20:23:58.968362 kubelet[2764]: I0212 20:23:58.966656 2764 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/17c97462-2eee-43a7-ae94-e6f12831986c-kube-api-access-q5656" (OuterVolumeSpecName: "kube-api-access-q5656") pod "17c97462-2eee-43a7-ae94-e6f12831986c" (UID: "17c97462-2eee-43a7-ae94-e6f12831986c"). InnerVolumeSpecName "kube-api-access-q5656". PluginName "kubernetes.io/projected", VolumeGidValue "" Feb 12 20:23:58.967921 systemd[1]: var-lib-kubelet-pods-17c97462\x2d2eee\x2d43a7\x2dae94\x2de6f12831986c-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dq5656.mount: Deactivated successfully. Feb 12 20:23:59.051146 kubelet[2764]: I0212 20:23:59.051110 2764 reconciler_common.go:300] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-var-lib-calico\") on node \"ip-172-31-19-54\" DevicePath \"\"" Feb 12 20:23:59.051450 kubelet[2764]: I0212 20:23:59.051427 2764 reconciler_common.go:300] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-policysync\") on node \"ip-172-31-19-54\" DevicePath \"\"" Feb 12 20:23:59.051616 kubelet[2764]: I0212 20:23:59.051595 2764 reconciler_common.go:300] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/17c97462-2eee-43a7-ae94-e6f12831986c-node-certs\") on node \"ip-172-31-19-54\" DevicePath \"\"" Feb 12 20:23:59.051747 kubelet[2764]: I0212 20:23:59.051727 2764 reconciler_common.go:300] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-xtables-lock\") on node \"ip-172-31-19-54\" DevicePath \"\"" Feb 12 20:23:59.051865 kubelet[2764]: I0212 20:23:59.051846 2764 reconciler_common.go:300] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-flexvol-driver-host\") on node \"ip-172-31-19-54\" DevicePath \"\"" Feb 12 20:23:59.052005 kubelet[2764]: I0212 20:23:59.051986 2764 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-q5656\" (UniqueName: \"kubernetes.io/projected/17c97462-2eee-43a7-ae94-e6f12831986c-kube-api-access-q5656\") on node \"ip-172-31-19-54\" DevicePath \"\"" Feb 12 20:23:59.052131 kubelet[2764]: I0212 20:23:59.052110 2764 reconciler_common.go:300] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-cni-log-dir\") on node \"ip-172-31-19-54\" DevicePath \"\"" Feb 12 20:23:59.052255 kubelet[2764]: I0212 20:23:59.052235 2764 reconciler_common.go:300] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/17c97462-2eee-43a7-ae94-e6f12831986c-var-run-calico\") on node \"ip-172-31-19-54\" DevicePath \"\"" Feb 12 20:23:59.052424 kubelet[2764]: I0212 20:23:59.052390 2764 reconciler_common.go:300] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/17c97462-2eee-43a7-ae94-e6f12831986c-tigera-ca-bundle\") on node \"ip-172-31-19-54\" DevicePath \"\"" Feb 12 20:23:59.721641 kubelet[2764]: E0212 20:23:59.721587 2764 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5zxnw" podUID=813164be-67aa-473b-b98f-ae32d6883ffe Feb 12 20:23:59.900327 kubelet[2764]: I0212 20:23:59.900258 2764 scope.go:115] "RemoveContainer" containerID="e1c2fef217e490233eb31b21a2c2a0bbda4048f1faf47ca1132a6db27220ccda" Feb 12 20:23:59.909734 systemd[1]: Removed slice kubepods-besteffort-pod17c97462_2eee_43a7_ae94_e6f12831986c.slice. Feb 12 20:23:59.914220 env[1651]: time="2024-02-12T20:23:59.914121786Z" level=info msg="RemoveContainer for \"e1c2fef217e490233eb31b21a2c2a0bbda4048f1faf47ca1132a6db27220ccda\"" Feb 12 20:23:59.921241 env[1651]: time="2024-02-12T20:23:59.920737164Z" level=info msg="RemoveContainer for \"e1c2fef217e490233eb31b21a2c2a0bbda4048f1faf47ca1132a6db27220ccda\" returns successfully" Feb 12 20:23:59.921474 kubelet[2764]: I0212 20:23:59.921115 2764 scope.go:115] "RemoveContainer" containerID="b08ff1f18cfa273d69392cb185d40b553e0a8dc74bb3f519be0f0485c0d702de" Feb 12 20:23:59.925352 env[1651]: time="2024-02-12T20:23:59.923813400Z" level=info msg="RemoveContainer for \"b08ff1f18cfa273d69392cb185d40b553e0a8dc74bb3f519be0f0485c0d702de\"" Feb 12 20:23:59.928567 env[1651]: time="2024-02-12T20:23:59.928487678Z" level=info msg="RemoveContainer for \"b08ff1f18cfa273d69392cb185d40b553e0a8dc74bb3f519be0f0485c0d702de\" returns successfully" Feb 12 20:23:59.976463 kubelet[2764]: I0212 20:23:59.976313 2764 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:23:59.976463 kubelet[2764]: E0212 20:23:59.976404 2764 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="17c97462-2eee-43a7-ae94-e6f12831986c" containerName="install-cni" Feb 12 20:23:59.976463 kubelet[2764]: E0212 20:23:59.976429 2764 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="17c97462-2eee-43a7-ae94-e6f12831986c" containerName="flexvol-driver" Feb 12 20:23:59.977127 kubelet[2764]: I0212 20:23:59.976492 2764 memory_manager.go:346] "RemoveStaleState removing state" podUID="17c97462-2eee-43a7-ae94-e6f12831986c" containerName="install-cni" Feb 12 20:23:59.987789 systemd[1]: Created slice kubepods-besteffort-podb2d653e3_f5da_4b29_834b_a5b885ab179e.slice. Feb 12 20:24:00.057519 kubelet[2764]: I0212 20:24:00.057456 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b2d653e3-f5da-4b29-834b-a5b885ab179e-node-certs\") pod \"calico-node-kn67c\" (UID: \"b2d653e3-f5da-4b29-834b-a5b885ab179e\") " pod="calico-system/calico-node-kn67c" Feb 12 20:24:00.057519 kubelet[2764]: I0212 20:24:00.057539 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b2d653e3-f5da-4b29-834b-a5b885ab179e-var-run-calico\") pod \"calico-node-kn67c\" (UID: \"b2d653e3-f5da-4b29-834b-a5b885ab179e\") " pod="calico-system/calico-node-kn67c" Feb 12 20:24:00.057786 kubelet[2764]: I0212 20:24:00.057591 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b2d653e3-f5da-4b29-834b-a5b885ab179e-tigera-ca-bundle\") pod \"calico-node-kn67c\" (UID: \"b2d653e3-f5da-4b29-834b-a5b885ab179e\") " pod="calico-system/calico-node-kn67c" Feb 12 20:24:00.057786 kubelet[2764]: I0212 20:24:00.057659 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b2d653e3-f5da-4b29-834b-a5b885ab179e-cni-log-dir\") pod \"calico-node-kn67c\" (UID: \"b2d653e3-f5da-4b29-834b-a5b885ab179e\") " pod="calico-system/calico-node-kn67c" Feb 12 20:24:00.057786 kubelet[2764]: I0212 20:24:00.057704 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b2d653e3-f5da-4b29-834b-a5b885ab179e-cni-net-dir\") pod \"calico-node-kn67c\" (UID: \"b2d653e3-f5da-4b29-834b-a5b885ab179e\") " pod="calico-system/calico-node-kn67c" Feb 12 20:24:00.057786 kubelet[2764]: I0212 20:24:00.057749 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b2d653e3-f5da-4b29-834b-a5b885ab179e-lib-modules\") pod \"calico-node-kn67c\" (UID: \"b2d653e3-f5da-4b29-834b-a5b885ab179e\") " pod="calico-system/calico-node-kn67c" Feb 12 20:24:00.058102 kubelet[2764]: I0212 20:24:00.057791 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b2d653e3-f5da-4b29-834b-a5b885ab179e-policysync\") pod \"calico-node-kn67c\" (UID: \"b2d653e3-f5da-4b29-834b-a5b885ab179e\") " pod="calico-system/calico-node-kn67c" Feb 12 20:24:00.058102 kubelet[2764]: I0212 20:24:00.057835 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b2d653e3-f5da-4b29-834b-a5b885ab179e-xtables-lock\") pod \"calico-node-kn67c\" (UID: \"b2d653e3-f5da-4b29-834b-a5b885ab179e\") " pod="calico-system/calico-node-kn67c" Feb 12 20:24:00.058102 kubelet[2764]: I0212 20:24:00.057955 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b2d653e3-f5da-4b29-834b-a5b885ab179e-var-lib-calico\") pod \"calico-node-kn67c\" (UID: \"b2d653e3-f5da-4b29-834b-a5b885ab179e\") " pod="calico-system/calico-node-kn67c" Feb 12 20:24:00.058102 kubelet[2764]: I0212 20:24:00.058000 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b2d653e3-f5da-4b29-834b-a5b885ab179e-cni-bin-dir\") pod \"calico-node-kn67c\" (UID: \"b2d653e3-f5da-4b29-834b-a5b885ab179e\") " pod="calico-system/calico-node-kn67c" Feb 12 20:24:00.058102 kubelet[2764]: I0212 20:24:00.058045 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pb5xb\" (UniqueName: \"kubernetes.io/projected/b2d653e3-f5da-4b29-834b-a5b885ab179e-kube-api-access-pb5xb\") pod \"calico-node-kn67c\" (UID: \"b2d653e3-f5da-4b29-834b-a5b885ab179e\") " pod="calico-system/calico-node-kn67c" Feb 12 20:24:00.058499 kubelet[2764]: I0212 20:24:00.058092 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b2d653e3-f5da-4b29-834b-a5b885ab179e-flexvol-driver-host\") pod \"calico-node-kn67c\" (UID: \"b2d653e3-f5da-4b29-834b-a5b885ab179e\") " pod="calico-system/calico-node-kn67c" Feb 12 20:24:00.293362 env[1651]: time="2024-02-12T20:24:00.293194346Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-kn67c,Uid:b2d653e3-f5da-4b29-834b-a5b885ab179e,Namespace:calico-system,Attempt:0,}" Feb 12 20:24:00.324119 env[1651]: time="2024-02-12T20:24:00.324000271Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:24:00.324437 env[1651]: time="2024-02-12T20:24:00.324377254Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:24:00.324630 env[1651]: time="2024-02-12T20:24:00.324575147Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:24:00.325185 env[1651]: time="2024-02-12T20:24:00.325084899Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bbb6882452555626a47fff7f30e2e68452da442b92625d012d6e56030448722e pid=3644 runtime=io.containerd.runc.v2 Feb 12 20:24:00.364347 systemd[1]: Started cri-containerd-bbb6882452555626a47fff7f30e2e68452da442b92625d012d6e56030448722e.scope. Feb 12 20:24:00.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.392000 audit: BPF prog-id=159 op=LOAD Feb 12 20:24:00.393000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.393000 audit[3654]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3644 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:00.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262623638383234353235353536323661343766666637663330653265 Feb 12 20:24:00.393000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.393000 audit[3654]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3644 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:00.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262623638383234353235353536323661343766666637663330653265 Feb 12 20:24:00.393000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.393000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.393000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.393000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.393000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.393000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.393000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.393000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.393000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.393000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.393000 audit: BPF prog-id=160 op=LOAD Feb 12 20:24:00.393000 audit[3654]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3644 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:00.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262623638383234353235353536323661343766666637663330653265 Feb 12 20:24:00.393000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.393000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.393000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.393000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.393000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.393000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.393000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.393000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.393000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.393000 audit: BPF prog-id=161 op=LOAD Feb 12 20:24:00.393000 audit[3654]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3644 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:00.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262623638383234353235353536323661343766666637663330653265 Feb 12 20:24:00.393000 audit: BPF prog-id=161 op=UNLOAD Feb 12 20:24:00.393000 audit: BPF prog-id=160 op=UNLOAD Feb 12 20:24:00.394000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.394000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.394000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.394000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.394000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.394000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.394000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.394000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.394000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.394000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.394000 audit: BPF prog-id=162 op=LOAD Feb 12 20:24:00.394000 audit[3654]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3644 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:00.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262623638383234353235353536323661343766666637663330653265 Feb 12 20:24:00.418878 env[1651]: time="2024-02-12T20:24:00.418286495Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-kn67c,Uid:b2d653e3-f5da-4b29-834b-a5b885ab179e,Namespace:calico-system,Attempt:0,} returns sandbox id \"bbb6882452555626a47fff7f30e2e68452da442b92625d012d6e56030448722e\"" Feb 12 20:24:00.424819 env[1651]: time="2024-02-12T20:24:00.424752647Z" level=info msg="CreateContainer within sandbox \"bbb6882452555626a47fff7f30e2e68452da442b92625d012d6e56030448722e\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 20:24:00.448068 env[1651]: time="2024-02-12T20:24:00.448005787Z" level=info msg="CreateContainer within sandbox \"bbb6882452555626a47fff7f30e2e68452da442b92625d012d6e56030448722e\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"c0f06e8cb045ecbf9feec8cfc5ccf8d30be30551ca1dadf02d7437333dd84902\"" Feb 12 20:24:00.451189 env[1651]: time="2024-02-12T20:24:00.449220424Z" level=info msg="StartContainer for \"c0f06e8cb045ecbf9feec8cfc5ccf8d30be30551ca1dadf02d7437333dd84902\"" Feb 12 20:24:00.480723 systemd[1]: Started cri-containerd-c0f06e8cb045ecbf9feec8cfc5ccf8d30be30551ca1dadf02d7437333dd84902.scope. Feb 12 20:24:00.516000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.516000 audit[3687]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014f5a0 a2=3c a3=0 items=0 ppid=3644 pid=3687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:00.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330663036653863623034356563626639666565633863666335636366 Feb 12 20:24:00.516000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.516000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.516000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.516000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.516000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.516000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.516000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.516000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.516000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.516000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.516000 audit: BPF prog-id=163 op=LOAD Feb 12 20:24:00.516000 audit[3687]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014f8e0 a2=78 a3=0 items=0 ppid=3644 pid=3687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:00.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330663036653863623034356563626639666565633863666335636366 Feb 12 20:24:00.516000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.516000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.516000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.516000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.516000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.516000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.516000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.516000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.516000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.516000 audit: BPF prog-id=164 op=LOAD Feb 12 20:24:00.516000 audit[3687]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014f670 a2=78 a3=0 items=0 ppid=3644 pid=3687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:00.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330663036653863623034356563626639666565633863666335636366 Feb 12 20:24:00.516000 audit: BPF prog-id=164 op=UNLOAD Feb 12 20:24:00.516000 audit: BPF prog-id=163 op=UNLOAD Feb 12 20:24:00.517000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.517000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.517000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.517000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.517000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.517000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.517000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.517000 audit[3687]: AVC avc: denied { perfmon } for pid=3687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.517000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.517000 audit[3687]: AVC avc: denied { bpf } for pid=3687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:00.517000 audit: BPF prog-id=165 op=LOAD Feb 12 20:24:00.517000 audit[3687]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014fb40 a2=78 a3=0 items=0 ppid=3644 pid=3687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:00.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330663036653863623034356563626639666565633863666335636366 Feb 12 20:24:00.552321 env[1651]: time="2024-02-12T20:24:00.552117265Z" level=info msg="StartContainer for \"c0f06e8cb045ecbf9feec8cfc5ccf8d30be30551ca1dadf02d7437333dd84902\" returns successfully" Feb 12 20:24:00.575933 systemd[1]: cri-containerd-c0f06e8cb045ecbf9feec8cfc5ccf8d30be30551ca1dadf02d7437333dd84902.scope: Deactivated successfully. Feb 12 20:24:00.580000 audit: BPF prog-id=165 op=UNLOAD Feb 12 20:24:00.636055 env[1651]: time="2024-02-12T20:24:00.635980821Z" level=info msg="shim disconnected" id=c0f06e8cb045ecbf9feec8cfc5ccf8d30be30551ca1dadf02d7437333dd84902 Feb 12 20:24:00.636055 env[1651]: time="2024-02-12T20:24:00.636049966Z" level=warning msg="cleaning up after shim disconnected" id=c0f06e8cb045ecbf9feec8cfc5ccf8d30be30551ca1dadf02d7437333dd84902 namespace=k8s.io Feb 12 20:24:00.636459 env[1651]: time="2024-02-12T20:24:00.636073618Z" level=info msg="cleaning up dead shim" Feb 12 20:24:00.660905 env[1651]: time="2024-02-12T20:24:00.660816797Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:24:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3727 runtime=io.containerd.runc.v2\n" Feb 12 20:24:00.726484 kubelet[2764]: I0212 20:24:00.726450 2764 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID=17c97462-2eee-43a7-ae94-e6f12831986c path="/var/lib/kubelet/pods/17c97462-2eee-43a7-ae94-e6f12831986c/volumes" Feb 12 20:24:00.921595 env[1651]: time="2024-02-12T20:24:00.921535769Z" level=info msg="CreateContainer within sandbox \"bbb6882452555626a47fff7f30e2e68452da442b92625d012d6e56030448722e\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 20:24:00.947477 env[1651]: time="2024-02-12T20:24:00.947392820Z" level=info msg="CreateContainer within sandbox \"bbb6882452555626a47fff7f30e2e68452da442b92625d012d6e56030448722e\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"f9896b322c23abbade6b53e345f8ec9ae11ebf76b988a6ac3335608866b289ee\"" Feb 12 20:24:00.948908 env[1651]: time="2024-02-12T20:24:00.948847459Z" level=info msg="StartContainer for \"f9896b322c23abbade6b53e345f8ec9ae11ebf76b988a6ac3335608866b289ee\"" Feb 12 20:24:00.989233 systemd[1]: Started cri-containerd-f9896b322c23abbade6b53e345f8ec9ae11ebf76b988a6ac3335608866b289ee.scope. Feb 12 20:24:01.033000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.033000 audit[3753]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3644 pid=3753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:01.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639383936623332326332336162626164653662353365333435663865 Feb 12 20:24:01.033000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.033000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.033000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.033000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.033000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.033000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.033000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.033000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.033000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.033000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.033000 audit: BPF prog-id=166 op=LOAD Feb 12 20:24:01.033000 audit[3753]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3644 pid=3753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:01.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639383936623332326332336162626164653662353365333435663865 Feb 12 20:24:01.033000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.033000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.033000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.033000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.033000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.033000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.033000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.033000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.033000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.033000 audit: BPF prog-id=167 op=LOAD Feb 12 20:24:01.033000 audit[3753]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3644 pid=3753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:01.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639383936623332326332336162626164653662353365333435663865 Feb 12 20:24:01.034000 audit: BPF prog-id=167 op=UNLOAD Feb 12 20:24:01.034000 audit: BPF prog-id=166 op=UNLOAD Feb 12 20:24:01.034000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.034000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.034000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.034000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.034000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.034000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.034000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.034000 audit[3753]: AVC avc: denied { perfmon } for pid=3753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.034000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.034000 audit[3753]: AVC avc: denied { bpf } for pid=3753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:01.034000 audit: BPF prog-id=168 op=LOAD Feb 12 20:24:01.034000 audit[3753]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3644 pid=3753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:01.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639383936623332326332336162626164653662353365333435663865 Feb 12 20:24:01.065979 env[1651]: time="2024-02-12T20:24:01.065915991Z" level=info msg="StartContainer for \"f9896b322c23abbade6b53e345f8ec9ae11ebf76b988a6ac3335608866b289ee\" returns successfully" Feb 12 20:24:01.168615 systemd[1]: run-containerd-runc-k8s.io-bbb6882452555626a47fff7f30e2e68452da442b92625d012d6e56030448722e-runc.UPzG29.mount: Deactivated successfully. Feb 12 20:24:01.721674 kubelet[2764]: E0212 20:24:01.721603 2764 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5zxnw" podUID=813164be-67aa-473b-b98f-ae32d6883ffe Feb 12 20:24:02.153133 env[1651]: time="2024-02-12T20:24:02.152984403Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 20:24:02.158593 systemd[1]: cri-containerd-f9896b322c23abbade6b53e345f8ec9ae11ebf76b988a6ac3335608866b289ee.scope: Deactivated successfully. Feb 12 20:24:02.167386 kernel: kauditd_printk_skb: 180 callbacks suppressed Feb 12 20:24:02.167553 kernel: audit: type=1334 audit(1707769442.162:1262): prog-id=168 op=UNLOAD Feb 12 20:24:02.162000 audit: BPF prog-id=168 op=UNLOAD Feb 12 20:24:02.194145 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f9896b322c23abbade6b53e345f8ec9ae11ebf76b988a6ac3335608866b289ee-rootfs.mount: Deactivated successfully. Feb 12 20:24:02.210298 kubelet[2764]: I0212 20:24:02.210239 2764 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 20:24:02.224309 env[1651]: time="2024-02-12T20:24:02.224218556Z" level=info msg="shim disconnected" id=f9896b322c23abbade6b53e345f8ec9ae11ebf76b988a6ac3335608866b289ee Feb 12 20:24:02.224800 env[1651]: time="2024-02-12T20:24:02.224760947Z" level=warning msg="cleaning up after shim disconnected" id=f9896b322c23abbade6b53e345f8ec9ae11ebf76b988a6ac3335608866b289ee namespace=k8s.io Feb 12 20:24:02.224954 env[1651]: time="2024-02-12T20:24:02.224923345Z" level=info msg="cleaning up dead shim" Feb 12 20:24:02.248543 env[1651]: time="2024-02-12T20:24:02.248485117Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:24:02Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3800 runtime=io.containerd.runc.v2\n" Feb 12 20:24:02.259009 kubelet[2764]: I0212 20:24:02.258142 2764 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:24:02.268237 kubelet[2764]: I0212 20:24:02.268193 2764 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:24:02.268393 systemd[1]: Created slice kubepods-burstable-pode7dca9bc_16b3_45ee_a6c5_b466e91d74f2.slice. Feb 12 20:24:02.276519 kubelet[2764]: I0212 20:24:02.276484 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/e7dca9bc-16b3-45ee-a6c5-b466e91d74f2-config-volume\") pod \"coredns-5d78c9869d-gvfp6\" (UID: \"e7dca9bc-16b3-45ee-a6c5-b466e91d74f2\") " pod="kube-system/coredns-5d78c9869d-gvfp6" Feb 12 20:24:02.277770 kubelet[2764]: I0212 20:24:02.277732 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8d4s9\" (UniqueName: \"kubernetes.io/projected/529d2533-9be6-4e17-93dc-7cf74f8ca7c5-kube-api-access-8d4s9\") pod \"coredns-5d78c9869d-lflqt\" (UID: \"529d2533-9be6-4e17-93dc-7cf74f8ca7c5\") " pod="kube-system/coredns-5d78c9869d-lflqt" Feb 12 20:24:02.278056 kubelet[2764]: I0212 20:24:02.277649 2764 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:24:02.279289 kubelet[2764]: I0212 20:24:02.279242 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/529d2533-9be6-4e17-93dc-7cf74f8ca7c5-config-volume\") pod \"coredns-5d78c9869d-lflqt\" (UID: \"529d2533-9be6-4e17-93dc-7cf74f8ca7c5\") " pod="kube-system/coredns-5d78c9869d-lflqt" Feb 12 20:24:02.279584 kubelet[2764]: I0212 20:24:02.279558 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7mkx7\" (UniqueName: \"kubernetes.io/projected/e7dca9bc-16b3-45ee-a6c5-b466e91d74f2-kube-api-access-7mkx7\") pod \"coredns-5d78c9869d-gvfp6\" (UID: \"e7dca9bc-16b3-45ee-a6c5-b466e91d74f2\") " pod="kube-system/coredns-5d78c9869d-gvfp6" Feb 12 20:24:02.287847 systemd[1]: Created slice kubepods-burstable-pod529d2533_9be6_4e17_93dc_7cf74f8ca7c5.slice. Feb 12 20:24:02.301113 systemd[1]: Created slice kubepods-besteffort-pod3bf4fa95_1a58_409e_8327_5b2781c83bb2.slice. Feb 12 20:24:02.380842 kubelet[2764]: I0212 20:24:02.380796 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3bf4fa95-1a58-409e-8327-5b2781c83bb2-tigera-ca-bundle\") pod \"calico-kube-controllers-9ccfb758b-r6cvq\" (UID: \"3bf4fa95-1a58-409e-8327-5b2781c83bb2\") " pod="calico-system/calico-kube-controllers-9ccfb758b-r6cvq" Feb 12 20:24:02.389566 kubelet[2764]: I0212 20:24:02.389517 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bxjt8\" (UniqueName: \"kubernetes.io/projected/3bf4fa95-1a58-409e-8327-5b2781c83bb2-kube-api-access-bxjt8\") pod \"calico-kube-controllers-9ccfb758b-r6cvq\" (UID: \"3bf4fa95-1a58-409e-8327-5b2781c83bb2\") " pod="calico-system/calico-kube-controllers-9ccfb758b-r6cvq" Feb 12 20:24:02.579455 env[1651]: time="2024-02-12T20:24:02.579367200Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-gvfp6,Uid:e7dca9bc-16b3-45ee-a6c5-b466e91d74f2,Namespace:kube-system,Attempt:0,}" Feb 12 20:24:02.597844 env[1651]: time="2024-02-12T20:24:02.597106413Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-lflqt,Uid:529d2533-9be6-4e17-93dc-7cf74f8ca7c5,Namespace:kube-system,Attempt:0,}" Feb 12 20:24:02.607068 env[1651]: time="2024-02-12T20:24:02.606941319Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-9ccfb758b-r6cvq,Uid:3bf4fa95-1a58-409e-8327-5b2781c83bb2,Namespace:calico-system,Attempt:0,}" Feb 12 20:24:02.755545 env[1651]: time="2024-02-12T20:24:02.755440036Z" level=error msg="Failed to destroy network for sandbox \"0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:24:02.756451 env[1651]: time="2024-02-12T20:24:02.756393946Z" level=error msg="encountered an error cleaning up failed sandbox \"0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:24:02.757084 env[1651]: time="2024-02-12T20:24:02.757035782Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-gvfp6,Uid:e7dca9bc-16b3-45ee-a6c5-b466e91d74f2,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:24:02.757634 kubelet[2764]: E0212 20:24:02.757481 2764 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:24:02.758748 kubelet[2764]: E0212 20:24:02.758173 2764 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-gvfp6" Feb 12 20:24:02.758748 kubelet[2764]: E0212 20:24:02.758226 2764 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-gvfp6" Feb 12 20:24:02.758748 kubelet[2764]: E0212 20:24:02.758351 2764 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-gvfp6_kube-system(e7dca9bc-16b3-45ee-a6c5-b466e91d74f2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-gvfp6_kube-system(e7dca9bc-16b3-45ee-a6c5-b466e91d74f2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-gvfp6" podUID=e7dca9bc-16b3-45ee-a6c5-b466e91d74f2 Feb 12 20:24:02.809306 env[1651]: time="2024-02-12T20:24:02.809199456Z" level=error msg="Failed to destroy network for sandbox \"908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:24:02.809940 env[1651]: time="2024-02-12T20:24:02.809862233Z" level=error msg="encountered an error cleaning up failed sandbox \"908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:24:02.810083 env[1651]: time="2024-02-12T20:24:02.809959181Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-lflqt,Uid:529d2533-9be6-4e17-93dc-7cf74f8ca7c5,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:24:02.810663 kubelet[2764]: E0212 20:24:02.810412 2764 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:24:02.810663 kubelet[2764]: E0212 20:24:02.810491 2764 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-lflqt" Feb 12 20:24:02.810663 kubelet[2764]: E0212 20:24:02.810529 2764 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-lflqt" Feb 12 20:24:02.811360 kubelet[2764]: E0212 20:24:02.811003 2764 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-lflqt_kube-system(529d2533-9be6-4e17-93dc-7cf74f8ca7c5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-lflqt_kube-system(529d2533-9be6-4e17-93dc-7cf74f8ca7c5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-lflqt" podUID=529d2533-9be6-4e17-93dc-7cf74f8ca7c5 Feb 12 20:24:02.823857 env[1651]: time="2024-02-12T20:24:02.823781773Z" level=error msg="Failed to destroy network for sandbox \"52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:24:02.824705 env[1651]: time="2024-02-12T20:24:02.824649331Z" level=error msg="encountered an error cleaning up failed sandbox \"52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:24:02.824988 env[1651]: time="2024-02-12T20:24:02.824926041Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-9ccfb758b-r6cvq,Uid:3bf4fa95-1a58-409e-8327-5b2781c83bb2,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:24:02.827784 kubelet[2764]: E0212 20:24:02.825564 2764 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:24:02.827784 kubelet[2764]: E0212 20:24:02.825642 2764 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-9ccfb758b-r6cvq" Feb 12 20:24:02.827784 kubelet[2764]: E0212 20:24:02.825679 2764 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-9ccfb758b-r6cvq" Feb 12 20:24:02.828120 kubelet[2764]: E0212 20:24:02.825766 2764 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-9ccfb758b-r6cvq_calico-system(3bf4fa95-1a58-409e-8327-5b2781c83bb2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-9ccfb758b-r6cvq_calico-system(3bf4fa95-1a58-409e-8327-5b2781c83bb2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-9ccfb758b-r6cvq" podUID=3bf4fa95-1a58-409e-8327-5b2781c83bb2 Feb 12 20:24:02.918959 kubelet[2764]: I0212 20:24:02.918797 2764 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" Feb 12 20:24:02.921304 env[1651]: time="2024-02-12T20:24:02.921233532Z" level=info msg="StopPodSandbox for \"52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9\"" Feb 12 20:24:02.939359 kubelet[2764]: I0212 20:24:02.939316 2764 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" Feb 12 20:24:02.943738 env[1651]: time="2024-02-12T20:24:02.941056307Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 20:24:02.946743 env[1651]: time="2024-02-12T20:24:02.946668240Z" level=info msg="StopPodSandbox for \"908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a\"" Feb 12 20:24:02.950446 kubelet[2764]: I0212 20:24:02.949872 2764 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" Feb 12 20:24:02.953702 env[1651]: time="2024-02-12T20:24:02.953124463Z" level=info msg="StopPodSandbox for \"0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70\"" Feb 12 20:24:03.036962 env[1651]: time="2024-02-12T20:24:03.036874300Z" level=error msg="StopPodSandbox for \"52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9\" failed" error="failed to destroy network for sandbox \"52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:24:03.037893 kubelet[2764]: E0212 20:24:03.037549 2764 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" Feb 12 20:24:03.037893 kubelet[2764]: E0212 20:24:03.037662 2764 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9} Feb 12 20:24:03.037893 kubelet[2764]: E0212 20:24:03.037754 2764 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3bf4fa95-1a58-409e-8327-5b2781c83bb2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:24:03.037893 kubelet[2764]: E0212 20:24:03.037832 2764 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3bf4fa95-1a58-409e-8327-5b2781c83bb2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-9ccfb758b-r6cvq" podUID=3bf4fa95-1a58-409e-8327-5b2781c83bb2 Feb 12 20:24:03.040609 env[1651]: time="2024-02-12T20:24:03.040534394Z" level=error msg="StopPodSandbox for \"908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a\" failed" error="failed to destroy network for sandbox \"908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:24:03.041147 kubelet[2764]: E0212 20:24:03.041104 2764 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" Feb 12 20:24:03.041345 kubelet[2764]: E0212 20:24:03.041169 2764 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a} Feb 12 20:24:03.041345 kubelet[2764]: E0212 20:24:03.041236 2764 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"529d2533-9be6-4e17-93dc-7cf74f8ca7c5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:24:03.041541 kubelet[2764]: E0212 20:24:03.041383 2764 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"529d2533-9be6-4e17-93dc-7cf74f8ca7c5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-lflqt" podUID=529d2533-9be6-4e17-93dc-7cf74f8ca7c5 Feb 12 20:24:03.058842 env[1651]: time="2024-02-12T20:24:03.058750820Z" level=error msg="StopPodSandbox for \"0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70\" failed" error="failed to destroy network for sandbox \"0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:24:03.059543 kubelet[2764]: E0212 20:24:03.059476 2764 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" Feb 12 20:24:03.059683 kubelet[2764]: E0212 20:24:03.059576 2764 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70} Feb 12 20:24:03.059683 kubelet[2764]: E0212 20:24:03.059640 2764 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e7dca9bc-16b3-45ee-a6c5-b466e91d74f2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:24:03.059874 kubelet[2764]: E0212 20:24:03.059690 2764 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e7dca9bc-16b3-45ee-a6c5-b466e91d74f2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-gvfp6" podUID=e7dca9bc-16b3-45ee-a6c5-b466e91d74f2 Feb 12 20:24:03.196127 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70-shm.mount: Deactivated successfully. Feb 12 20:24:03.731462 systemd[1]: Created slice kubepods-besteffort-pod813164be_67aa_473b_b98f_ae32d6883ffe.slice. Feb 12 20:24:03.738409 env[1651]: time="2024-02-12T20:24:03.738241150Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5zxnw,Uid:813164be-67aa-473b-b98f-ae32d6883ffe,Namespace:calico-system,Attempt:0,}" Feb 12 20:24:03.892124 env[1651]: time="2024-02-12T20:24:03.892036854Z" level=error msg="Failed to destroy network for sandbox \"e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:24:03.896394 env[1651]: time="2024-02-12T20:24:03.892725466Z" level=error msg="encountered an error cleaning up failed sandbox \"e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:24:03.896394 env[1651]: time="2024-02-12T20:24:03.892820555Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5zxnw,Uid:813164be-67aa-473b-b98f-ae32d6883ffe,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:24:03.896506 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb-shm.mount: Deactivated successfully. Feb 12 20:24:03.898038 kubelet[2764]: E0212 20:24:03.896968 2764 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:24:03.898038 kubelet[2764]: E0212 20:24:03.897070 2764 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5zxnw" Feb 12 20:24:03.898038 kubelet[2764]: E0212 20:24:03.897136 2764 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5zxnw" Feb 12 20:24:03.898770 kubelet[2764]: E0212 20:24:03.897237 2764 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-5zxnw_calico-system(813164be-67aa-473b-b98f-ae32d6883ffe)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-5zxnw_calico-system(813164be-67aa-473b-b98f-ae32d6883ffe)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5zxnw" podUID=813164be-67aa-473b-b98f-ae32d6883ffe Feb 12 20:24:03.954668 kubelet[2764]: I0212 20:24:03.954488 2764 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" Feb 12 20:24:03.956311 env[1651]: time="2024-02-12T20:24:03.956210541Z" level=info msg="StopPodSandbox for \"e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb\"" Feb 12 20:24:04.040707 env[1651]: time="2024-02-12T20:24:04.040522342Z" level=error msg="StopPodSandbox for \"e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb\" failed" error="failed to destroy network for sandbox \"e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:24:04.042088 kubelet[2764]: E0212 20:24:04.041749 2764 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" Feb 12 20:24:04.042088 kubelet[2764]: E0212 20:24:04.041833 2764 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb} Feb 12 20:24:04.042088 kubelet[2764]: E0212 20:24:04.041919 2764 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"813164be-67aa-473b-b98f-ae32d6883ffe\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:24:04.042088 kubelet[2764]: E0212 20:24:04.041998 2764 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"813164be-67aa-473b-b98f-ae32d6883ffe\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5zxnw" podUID=813164be-67aa-473b-b98f-ae32d6883ffe Feb 12 20:24:11.448393 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount607125012.mount: Deactivated successfully. Feb 12 20:24:11.540305 env[1651]: time="2024-02-12T20:24:11.540228007Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:24:11.544316 env[1651]: time="2024-02-12T20:24:11.544217422Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:24:11.548033 env[1651]: time="2024-02-12T20:24:11.547980792Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:24:11.551716 env[1651]: time="2024-02-12T20:24:11.551650057Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:24:11.552906 env[1651]: time="2024-02-12T20:24:11.552840486Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 12 20:24:11.588690 env[1651]: time="2024-02-12T20:24:11.588361854Z" level=info msg="CreateContainer within sandbox \"bbb6882452555626a47fff7f30e2e68452da442b92625d012d6e56030448722e\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 20:24:11.622750 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount112534305.mount: Deactivated successfully. Feb 12 20:24:11.630339 env[1651]: time="2024-02-12T20:24:11.630236741Z" level=info msg="CreateContainer within sandbox \"bbb6882452555626a47fff7f30e2e68452da442b92625d012d6e56030448722e\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"d7c96b36e6a4155fa6e2100fc40341a23845f6e27687d94cd4634d1d6a120475\"" Feb 12 20:24:11.633542 env[1651]: time="2024-02-12T20:24:11.633256468Z" level=info msg="StartContainer for \"d7c96b36e6a4155fa6e2100fc40341a23845f6e27687d94cd4634d1d6a120475\"" Feb 12 20:24:11.673236 systemd[1]: Started cri-containerd-d7c96b36e6a4155fa6e2100fc40341a23845f6e27687d94cd4634d1d6a120475.scope. Feb 12 20:24:11.727000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.727000 audit[4034]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3644 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:11.747405 kernel: audit: type=1400 audit(1707769451.727:1263): avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.747743 kernel: audit: type=1300 audit(1707769451.727:1263): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3644 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:11.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437633936623336653661343135356661366532313030666334303334 Feb 12 20:24:11.758932 kernel: audit: type=1327 audit(1707769451.727:1263): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437633936623336653661343135356661366532313030666334303334 Feb 12 20:24:11.728000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.768609 kernel: audit: type=1400 audit(1707769451.728:1264): avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.768716 kernel: audit: type=1400 audit(1707769451.728:1264): avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.728000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.728000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.784180 kernel: audit: type=1400 audit(1707769451.728:1264): avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.787300 kernel: audit: type=1400 audit(1707769451.728:1264): avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.728000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.728000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.801196 kernel: audit: type=1400 audit(1707769451.728:1264): avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.728000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.813547 kernel: audit: type=1400 audit(1707769451.728:1264): avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.728000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.822969 kernel: audit: type=1400 audit(1707769451.728:1264): avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.728000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.728000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.728000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.728000 audit: BPF prog-id=169 op=LOAD Feb 12 20:24:11.728000 audit[4034]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3644 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:11.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437633936623336653661343135356661366532313030666334303334 Feb 12 20:24:11.735000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.735000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.735000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.735000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.735000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.735000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.735000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.735000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.735000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.735000 audit: BPF prog-id=170 op=LOAD Feb 12 20:24:11.735000 audit[4034]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3644 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:11.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437633936623336653661343135356661366532313030666334303334 Feb 12 20:24:11.735000 audit: BPF prog-id=170 op=UNLOAD Feb 12 20:24:11.735000 audit: BPF prog-id=169 op=UNLOAD Feb 12 20:24:11.735000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.735000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.735000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.735000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.735000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.735000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.735000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.735000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.735000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.735000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:11.735000 audit: BPF prog-id=171 op=LOAD Feb 12 20:24:11.735000 audit[4034]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3644 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:11.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437633936623336653661343135356661366532313030666334303334 Feb 12 20:24:11.827665 env[1651]: time="2024-02-12T20:24:11.827586378Z" level=info msg="StartContainer for \"d7c96b36e6a4155fa6e2100fc40341a23845f6e27687d94cd4634d1d6a120475\" returns successfully" Feb 12 20:24:11.955307 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 20:24:11.960314 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 20:24:12.030961 kubelet[2764]: I0212 20:24:12.030793 2764 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-kn67c" podStartSLOduration=4.4102111 podCreationTimestamp="2024-02-12 20:23:59 +0000 UTC" firstStartedPulling="2024-02-12 20:24:02.933703774 +0000 UTC m=+36.519344085" lastFinishedPulling="2024-02-12 20:24:11.554229671 +0000 UTC m=+45.139869958" observedRunningTime="2024-02-12 20:24:12.027933896 +0000 UTC m=+45.613574195" watchObservedRunningTime="2024-02-12 20:24:12.030736973 +0000 UTC m=+45.616377296" Feb 12 20:24:13.024587 systemd[1]: run-containerd-runc-k8s.io-d7c96b36e6a4155fa6e2100fc40341a23845f6e27687d94cd4634d1d6a120475-runc.rmfXnm.mount: Deactivated successfully. Feb 12 20:24:13.682000 audit[4184]: AVC avc: denied { write } for pid=4184 comm="tee" name="fd" dev="proc" ino=21411 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:24:13.691000 audit[4189]: AVC avc: denied { write } for pid=4189 comm="tee" name="fd" dev="proc" ino=21419 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:24:13.682000 audit[4184]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffe7bf984 a2=241 a3=1b6 items=1 ppid=4152 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:13.682000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 20:24:13.682000 audit: PATH item=0 name="/dev/fd/63" inode=21405 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:13.682000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:24:13.691000 audit[4189]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe53a2983 a2=241 a3=1b6 items=1 ppid=4147 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:13.691000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 20:24:13.691000 audit: PATH item=0 name="/dev/fd/63" inode=21408 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:13.691000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:24:13.739000 audit[4198]: AVC avc: denied { write } for pid=4198 comm="tee" name="fd" dev="proc" ino=21433 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:24:13.739000 audit[4198]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffa538983 a2=241 a3=1b6 items=1 ppid=4153 pid=4198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:13.739000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 20:24:13.739000 audit: PATH item=0 name="/dev/fd/63" inode=21943 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:13.739000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:24:13.766000 audit[4204]: AVC avc: denied { write } for pid=4204 comm="tee" name="fd" dev="proc" ino=21437 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:24:13.782000 audit[4202]: AVC avc: denied { write } for pid=4202 comm="tee" name="fd" dev="proc" ino=21446 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:24:13.782000 audit[4202]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff55c2973 a2=241 a3=1b6 items=1 ppid=4144 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:13.787000 audit[4208]: AVC avc: denied { write } for pid=4208 comm="tee" name="fd" dev="proc" ino=21450 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:24:13.782000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 20:24:13.782000 audit: PATH item=0 name="/dev/fd/63" inode=21944 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:13.782000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:24:13.766000 audit[4204]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc17a4983 a2=241 a3=1b6 items=1 ppid=4148 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:13.788000 audit[4206]: AVC avc: denied { write } for pid=4206 comm="tee" name="fd" dev="proc" ino=21957 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:24:13.788000 audit[4206]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdb324974 a2=241 a3=1b6 items=1 ppid=4165 pid=4206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:13.788000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 20:24:13.788000 audit: PATH item=0 name="/dev/fd/63" inode=21950 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:13.788000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:24:13.766000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 20:24:13.766000 audit: PATH item=0 name="/dev/fd/63" inode=21947 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:13.766000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:24:13.787000 audit[4208]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc61e5985 a2=241 a3=1b6 items=1 ppid=4149 pid=4208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:13.787000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 20:24:13.787000 audit: PATH item=0 name="/dev/fd/63" inode=21951 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:13.787000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:24:14.417512 (udev-worker)[4066]: Network interface NamePolicy= disabled on kernel command line. Feb 12 20:24:14.418787 (udev-worker)[4067]: Network interface NamePolicy= disabled on kernel command line. Feb 12 20:24:14.422000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.422000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.422000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.422000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.422000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.422000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.422000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.422000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.422000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.422000 audit: BPF prog-id=172 op=LOAD Feb 12 20:24:14.422000 audit[4282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff401d5b8 a2=70 a3=0 items=0 ppid=4159 pid=4282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:14.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:24:14.422000 audit: BPF prog-id=172 op=UNLOAD Feb 12 20:24:14.422000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.422000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.422000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.422000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.422000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.422000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.422000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.422000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.422000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.422000 audit: BPF prog-id=173 op=LOAD Feb 12 20:24:14.422000 audit[4282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff401d5b8 a2=70 a3=4a174c items=0 ppid=4159 pid=4282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:14.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:24:14.422000 audit: BPF prog-id=173 op=UNLOAD Feb 12 20:24:14.422000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.422000 audit[4282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=fffff401d5e8 a2=70 a3=8af073f items=0 ppid=4159 pid=4282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:14.422000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:24:14.423000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.423000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.423000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.423000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.423000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.423000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.423000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.423000 audit[4282]: AVC avc: denied { perfmon } for pid=4282 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.423000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.423000 audit[4282]: AVC avc: denied { bpf } for pid=4282 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.423000 audit: BPF prog-id=174 op=LOAD Feb 12 20:24:14.423000 audit[4282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=fffff401d538 a2=70 a3=8af0759 items=0 ppid=4159 pid=4282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:14.423000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:24:14.430000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.430000 audit[4284]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffffe9d89a8 a2=70 a3=0 items=0 ppid=4159 pid=4284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:14.430000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 20:24:14.430000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:14.430000 audit[4284]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffffe9d8888 a2=70 a3=2 items=0 ppid=4159 pid=4284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:14.430000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 20:24:14.436000 audit: BPF prog-id=174 op=UNLOAD Feb 12 20:24:14.436000 audit[4286]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=32 a0=3 a1=ffffd618ea30 a2=0 a3=ffff9962efa8 items=0 ppid=4159 pid=4286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip" exe="/usr/sbin/ip" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:14.436000 audit: PROCTITLE proctitle=6970006C696E6B0064656C0063616C69636F5F746D705F41 Feb 12 20:24:14.545000 audit[4307]: NETFILTER_CFG table=raw:105 family=2 entries=19 op=nft_register_chain pid=4307 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:24:14.545000 audit[4307]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffc600db20 a2=0 a3=ffff94845fa8 items=0 ppid=4159 pid=4307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:14.545000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:24:14.549000 audit[4309]: NETFILTER_CFG table=nat:106 family=2 entries=16 op=nft_register_chain pid=4309 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:24:14.549000 audit[4309]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=fffffb9b7990 a2=0 a3=ffffa9c6ffa8 items=0 ppid=4159 pid=4309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:14.549000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:24:14.552000 audit[4308]: NETFILTER_CFG table=mangle:107 family=2 entries=19 op=nft_register_chain pid=4308 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:24:14.552000 audit[4308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffc6406420 a2=0 a3=ffff9d334fa8 items=0 ppid=4159 pid=4308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:14.552000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:24:14.562000 audit[4314]: NETFILTER_CFG table=filter:108 family=2 entries=39 op=nft_register_chain pid=4314 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:24:14.562000 audit[4314]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=fffff1e42490 a2=0 a3=ffff80bbffa8 items=0 ppid=4159 pid=4314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:14.562000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:24:14.722736 env[1651]: time="2024-02-12T20:24:14.722668408Z" level=info msg="StopPodSandbox for \"0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70\"" Feb 12 20:24:14.962832 env[1651]: 2024-02-12 20:24:14.817 [INFO][4331] k8s.go 578: Cleaning up netns ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" Feb 12 20:24:14.962832 env[1651]: 2024-02-12 20:24:14.818 [INFO][4331] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" iface="eth0" netns="/var/run/netns/cni-ba635d4c-5f8d-17a3-6ef5-a2a5e86bb5b7" Feb 12 20:24:14.962832 env[1651]: 2024-02-12 20:24:14.818 [INFO][4331] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" iface="eth0" netns="/var/run/netns/cni-ba635d4c-5f8d-17a3-6ef5-a2a5e86bb5b7" Feb 12 20:24:14.962832 env[1651]: 2024-02-12 20:24:14.818 [INFO][4331] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" iface="eth0" netns="/var/run/netns/cni-ba635d4c-5f8d-17a3-6ef5-a2a5e86bb5b7" Feb 12 20:24:14.962832 env[1651]: 2024-02-12 20:24:14.818 [INFO][4331] k8s.go 585: Releasing IP address(es) ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" Feb 12 20:24:14.962832 env[1651]: 2024-02-12 20:24:14.818 [INFO][4331] utils.go 188: Calico CNI releasing IP address ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" Feb 12 20:24:14.962832 env[1651]: 2024-02-12 20:24:14.933 [INFO][4337] ipam_plugin.go 415: Releasing address using handleID ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" HandleID="k8s-pod-network.0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" Workload="ip--172--31--19--54-k8s-coredns--5d78c9869d--gvfp6-eth0" Feb 12 20:24:14.962832 env[1651]: 2024-02-12 20:24:14.934 [INFO][4337] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:24:14.962832 env[1651]: 2024-02-12 20:24:14.934 [INFO][4337] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:24:14.962832 env[1651]: 2024-02-12 20:24:14.951 [WARNING][4337] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" HandleID="k8s-pod-network.0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" Workload="ip--172--31--19--54-k8s-coredns--5d78c9869d--gvfp6-eth0" Feb 12 20:24:14.962832 env[1651]: 2024-02-12 20:24:14.952 [INFO][4337] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" HandleID="k8s-pod-network.0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" Workload="ip--172--31--19--54-k8s-coredns--5d78c9869d--gvfp6-eth0" Feb 12 20:24:14.962832 env[1651]: 2024-02-12 20:24:14.956 [INFO][4337] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:24:14.962832 env[1651]: 2024-02-12 20:24:14.959 [INFO][4331] k8s.go 591: Teardown processing complete. ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" Feb 12 20:24:14.966703 systemd[1]: run-netns-cni\x2dba635d4c\x2d5f8d\x2d17a3\x2d6ef5\x2da2a5e86bb5b7.mount: Deactivated successfully. Feb 12 20:24:14.969105 env[1651]: time="2024-02-12T20:24:14.969020570Z" level=info msg="TearDown network for sandbox \"0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70\" successfully" Feb 12 20:24:14.969258 env[1651]: time="2024-02-12T20:24:14.969225638Z" level=info msg="StopPodSandbox for \"0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70\" returns successfully" Feb 12 20:24:14.971183 env[1651]: time="2024-02-12T20:24:14.971129852Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-gvfp6,Uid:e7dca9bc-16b3-45ee-a6c5-b466e91d74f2,Namespace:kube-system,Attempt:1,}" Feb 12 20:24:15.087177 systemd-networkd[1451]: vxlan.calico: Link UP Feb 12 20:24:15.087192 systemd-networkd[1451]: vxlan.calico: Gained carrier Feb 12 20:24:15.099811 (udev-worker)[4289]: Network interface NamePolicy= disabled on kernel command line. Feb 12 20:24:15.313323 (udev-worker)[4288]: Network interface NamePolicy= disabled on kernel command line. Feb 12 20:24:15.315849 systemd-networkd[1451]: cali21e3df39b7a: Link UP Feb 12 20:24:15.321639 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali21e3df39b7a: link becomes ready Feb 12 20:24:15.321205 systemd-networkd[1451]: cali21e3df39b7a: Gained carrier Feb 12 20:24:15.357977 env[1651]: 2024-02-12 20:24:15.142 [INFO][4344] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--19--54-k8s-coredns--5d78c9869d--gvfp6-eth0 coredns-5d78c9869d- kube-system e7dca9bc-16b3-45ee-a6c5-b466e91d74f2 814 0 2024-02-12 20:23:38 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-19-54 coredns-5d78c9869d-gvfp6 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali21e3df39b7a [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3" Namespace="kube-system" Pod="coredns-5d78c9869d-gvfp6" WorkloadEndpoint="ip--172--31--19--54-k8s-coredns--5d78c9869d--gvfp6-" Feb 12 20:24:15.357977 env[1651]: 2024-02-12 20:24:15.143 [INFO][4344] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3" Namespace="kube-system" Pod="coredns-5d78c9869d-gvfp6" WorkloadEndpoint="ip--172--31--19--54-k8s-coredns--5d78c9869d--gvfp6-eth0" Feb 12 20:24:15.357977 env[1651]: 2024-02-12 20:24:15.226 [INFO][4356] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3" HandleID="k8s-pod-network.1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3" Workload="ip--172--31--19--54-k8s-coredns--5d78c9869d--gvfp6-eth0" Feb 12 20:24:15.357977 env[1651]: 2024-02-12 20:24:15.249 [INFO][4356] ipam_plugin.go 268: Auto assigning IP ContainerID="1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3" HandleID="k8s-pod-network.1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3" Workload="ip--172--31--19--54-k8s-coredns--5d78c9869d--gvfp6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002b5730), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-19-54", "pod":"coredns-5d78c9869d-gvfp6", "timestamp":"2024-02-12 20:24:15.226876932 +0000 UTC"}, Hostname:"ip-172-31-19-54", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:24:15.357977 env[1651]: 2024-02-12 20:24:15.249 [INFO][4356] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:24:15.357977 env[1651]: 2024-02-12 20:24:15.249 [INFO][4356] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:24:15.357977 env[1651]: 2024-02-12 20:24:15.251 [INFO][4356] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-19-54' Feb 12 20:24:15.357977 env[1651]: 2024-02-12 20:24:15.254 [INFO][4356] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3" host="ip-172-31-19-54" Feb 12 20:24:15.357977 env[1651]: 2024-02-12 20:24:15.265 [INFO][4356] ipam.go 372: Looking up existing affinities for host host="ip-172-31-19-54" Feb 12 20:24:15.357977 env[1651]: 2024-02-12 20:24:15.272 [INFO][4356] ipam.go 489: Trying affinity for 192.168.38.64/26 host="ip-172-31-19-54" Feb 12 20:24:15.357977 env[1651]: 2024-02-12 20:24:15.277 [INFO][4356] ipam.go 155: Attempting to load block cidr=192.168.38.64/26 host="ip-172-31-19-54" Feb 12 20:24:15.357977 env[1651]: 2024-02-12 20:24:15.284 [INFO][4356] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.38.64/26 host="ip-172-31-19-54" Feb 12 20:24:15.357977 env[1651]: 2024-02-12 20:24:15.285 [INFO][4356] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.38.64/26 handle="k8s-pod-network.1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3" host="ip-172-31-19-54" Feb 12 20:24:15.357977 env[1651]: 2024-02-12 20:24:15.287 [INFO][4356] ipam.go 1682: Creating new handle: k8s-pod-network.1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3 Feb 12 20:24:15.357977 env[1651]: 2024-02-12 20:24:15.294 [INFO][4356] ipam.go 1203: Writing block in order to claim IPs block=192.168.38.64/26 handle="k8s-pod-network.1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3" host="ip-172-31-19-54" Feb 12 20:24:15.357977 env[1651]: 2024-02-12 20:24:15.303 [INFO][4356] ipam.go 1216: Successfully claimed IPs: [192.168.38.65/26] block=192.168.38.64/26 handle="k8s-pod-network.1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3" host="ip-172-31-19-54" Feb 12 20:24:15.357977 env[1651]: 2024-02-12 20:24:15.303 [INFO][4356] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.38.65/26] handle="k8s-pod-network.1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3" host="ip-172-31-19-54" Feb 12 20:24:15.357977 env[1651]: 2024-02-12 20:24:15.304 [INFO][4356] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:24:15.357977 env[1651]: 2024-02-12 20:24:15.304 [INFO][4356] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.38.65/26] IPv6=[] ContainerID="1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3" HandleID="k8s-pod-network.1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3" Workload="ip--172--31--19--54-k8s-coredns--5d78c9869d--gvfp6-eth0" Feb 12 20:24:15.359484 env[1651]: 2024-02-12 20:24:15.308 [INFO][4344] k8s.go 385: Populated endpoint ContainerID="1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3" Namespace="kube-system" Pod="coredns-5d78c9869d-gvfp6" WorkloadEndpoint="ip--172--31--19--54-k8s-coredns--5d78c9869d--gvfp6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--54-k8s-coredns--5d78c9869d--gvfp6-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"e7dca9bc-16b3-45ee-a6c5-b466e91d74f2", ResourceVersion:"814", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 23, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-54", ContainerID:"", Pod:"coredns-5d78c9869d-gvfp6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali21e3df39b7a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:24:15.359484 env[1651]: 2024-02-12 20:24:15.308 [INFO][4344] k8s.go 386: Calico CNI using IPs: [192.168.38.65/32] ContainerID="1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3" Namespace="kube-system" Pod="coredns-5d78c9869d-gvfp6" WorkloadEndpoint="ip--172--31--19--54-k8s-coredns--5d78c9869d--gvfp6-eth0" Feb 12 20:24:15.359484 env[1651]: 2024-02-12 20:24:15.308 [INFO][4344] dataplane_linux.go 68: Setting the host side veth name to cali21e3df39b7a ContainerID="1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3" Namespace="kube-system" Pod="coredns-5d78c9869d-gvfp6" WorkloadEndpoint="ip--172--31--19--54-k8s-coredns--5d78c9869d--gvfp6-eth0" Feb 12 20:24:15.359484 env[1651]: 2024-02-12 20:24:15.324 [INFO][4344] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3" Namespace="kube-system" Pod="coredns-5d78c9869d-gvfp6" WorkloadEndpoint="ip--172--31--19--54-k8s-coredns--5d78c9869d--gvfp6-eth0" Feb 12 20:24:15.359484 env[1651]: 2024-02-12 20:24:15.326 [INFO][4344] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3" Namespace="kube-system" Pod="coredns-5d78c9869d-gvfp6" WorkloadEndpoint="ip--172--31--19--54-k8s-coredns--5d78c9869d--gvfp6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--54-k8s-coredns--5d78c9869d--gvfp6-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"e7dca9bc-16b3-45ee-a6c5-b466e91d74f2", ResourceVersion:"814", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 23, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-54", ContainerID:"1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3", Pod:"coredns-5d78c9869d-gvfp6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali21e3df39b7a", MAC:"26:47:6e:5e:a6:a1", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:24:15.359484 env[1651]: 2024-02-12 20:24:15.354 [INFO][4344] k8s.go 491: Wrote updated endpoint to datastore ContainerID="1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3" Namespace="kube-system" Pod="coredns-5d78c9869d-gvfp6" WorkloadEndpoint="ip--172--31--19--54-k8s-coredns--5d78c9869d--gvfp6-eth0" Feb 12 20:24:15.421540 env[1651]: time="2024-02-12T20:24:15.421383396Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:24:15.421719 env[1651]: time="2024-02-12T20:24:15.421477933Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:24:15.421910 env[1651]: time="2024-02-12T20:24:15.421506409Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:24:15.422392 env[1651]: time="2024-02-12T20:24:15.422305694Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3 pid=4385 runtime=io.containerd.runc.v2 Feb 12 20:24:15.469031 systemd[1]: Started cri-containerd-1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3.scope. Feb 12 20:24:15.473000 audit[4404]: NETFILTER_CFG table=filter:109 family=2 entries=36 op=nft_register_chain pid=4404 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:24:15.473000 audit[4404]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffea2099c0 a2=0 a3=ffff97fe5fa8 items=0 ppid=4159 pid=4404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:15.473000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:24:15.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.503000 audit: BPF prog-id=175 op=LOAD Feb 12 20:24:15.504000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.504000 audit[4396]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4385 pid=4396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:15.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165666466393338363435623238353765316134616432303866353261 Feb 12 20:24:15.505000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.505000 audit[4396]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4385 pid=4396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:15.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165666466393338363435623238353765316134616432303866353261 Feb 12 20:24:15.505000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.505000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.505000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.505000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.505000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.505000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.505000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.505000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.505000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.505000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.505000 audit: BPF prog-id=176 op=LOAD Feb 12 20:24:15.505000 audit[4396]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4385 pid=4396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:15.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165666466393338363435623238353765316134616432303866353261 Feb 12 20:24:15.509000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.509000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.509000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.509000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.509000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.509000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.509000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.509000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.509000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.509000 audit: BPF prog-id=177 op=LOAD Feb 12 20:24:15.509000 audit[4396]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4385 pid=4396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:15.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165666466393338363435623238353765316134616432303866353261 Feb 12 20:24:15.510000 audit: BPF prog-id=177 op=UNLOAD Feb 12 20:24:15.510000 audit: BPF prog-id=176 op=UNLOAD Feb 12 20:24:15.511000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.511000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.511000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.511000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.511000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.511000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.511000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.511000 audit[4396]: AVC avc: denied { perfmon } for pid=4396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.511000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.511000 audit[4396]: AVC avc: denied { bpf } for pid=4396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.511000 audit: BPF prog-id=178 op=LOAD Feb 12 20:24:15.511000 audit[4396]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4385 pid=4396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:15.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165666466393338363435623238353765316134616432303866353261 Feb 12 20:24:15.555540 env[1651]: time="2024-02-12T20:24:15.555471029Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-gvfp6,Uid:e7dca9bc-16b3-45ee-a6c5-b466e91d74f2,Namespace:kube-system,Attempt:1,} returns sandbox id \"1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3\"" Feb 12 20:24:15.562190 env[1651]: time="2024-02-12T20:24:15.562100985Z" level=info msg="CreateContainer within sandbox \"1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 20:24:15.722957 env[1651]: time="2024-02-12T20:24:15.722902780Z" level=info msg="StopPodSandbox for \"908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a\"" Feb 12 20:24:15.724236 env[1651]: time="2024-02-12T20:24:15.724164955Z" level=info msg="CreateContainer within sandbox \"1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"ca9d92eb34bc3948de0d8a01ec5e5619d8b26176d2a1c85d691862694ac9d2e8\"" Feb 12 20:24:15.725096 env[1651]: time="2024-02-12T20:24:15.725029989Z" level=info msg="StartContainer for \"ca9d92eb34bc3948de0d8a01ec5e5619d8b26176d2a1c85d691862694ac9d2e8\"" Feb 12 20:24:15.772499 systemd[1]: Started cri-containerd-ca9d92eb34bc3948de0d8a01ec5e5619d8b26176d2a1c85d691862694ac9d2e8.scope. Feb 12 20:24:15.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.842000 audit: BPF prog-id=179 op=LOAD Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4385 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:15.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361396439326562333462633339343864653064386130316563356535 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4385 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:15.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361396439326562333462633339343864653064386130316563356535 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit: BPF prog-id=180 op=LOAD Feb 12 20:24:15.844000 audit[4441]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4385 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:15.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361396439326562333462633339343864653064386130316563356535 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit: BPF prog-id=181 op=LOAD Feb 12 20:24:15.844000 audit[4441]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4385 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:15.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361396439326562333462633339343864653064386130316563356535 Feb 12 20:24:15.844000 audit: BPF prog-id=181 op=UNLOAD Feb 12 20:24:15.844000 audit: BPF prog-id=180 op=UNLOAD Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:15.844000 audit: BPF prog-id=182 op=LOAD Feb 12 20:24:15.844000 audit[4441]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4385 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:15.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361396439326562333462633339343864653064386130316563356535 Feb 12 20:24:15.879189 env[1651]: time="2024-02-12T20:24:15.879123325Z" level=info msg="StartContainer for \"ca9d92eb34bc3948de0d8a01ec5e5619d8b26176d2a1c85d691862694ac9d2e8\" returns successfully" Feb 12 20:24:15.968605 systemd[1]: run-containerd-runc-k8s.io-1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3-runc.jnYeYp.mount: Deactivated successfully. Feb 12 20:24:16.079883 env[1651]: 2024-02-12 20:24:15.930 [INFO][4452] k8s.go 578: Cleaning up netns ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" Feb 12 20:24:16.079883 env[1651]: 2024-02-12 20:24:15.930 [INFO][4452] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" iface="eth0" netns="/var/run/netns/cni-2b13018c-ce9d-0aa0-d41a-0d9c6c205dd2" Feb 12 20:24:16.079883 env[1651]: 2024-02-12 20:24:15.931 [INFO][4452] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" iface="eth0" netns="/var/run/netns/cni-2b13018c-ce9d-0aa0-d41a-0d9c6c205dd2" Feb 12 20:24:16.079883 env[1651]: 2024-02-12 20:24:15.931 [INFO][4452] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" iface="eth0" netns="/var/run/netns/cni-2b13018c-ce9d-0aa0-d41a-0d9c6c205dd2" Feb 12 20:24:16.079883 env[1651]: 2024-02-12 20:24:15.931 [INFO][4452] k8s.go 585: Releasing IP address(es) ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" Feb 12 20:24:16.079883 env[1651]: 2024-02-12 20:24:15.931 [INFO][4452] utils.go 188: Calico CNI releasing IP address ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" Feb 12 20:24:16.079883 env[1651]: 2024-02-12 20:24:16.016 [INFO][4479] ipam_plugin.go 415: Releasing address using handleID ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" HandleID="k8s-pod-network.908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" Workload="ip--172--31--19--54-k8s-coredns--5d78c9869d--lflqt-eth0" Feb 12 20:24:16.079883 env[1651]: 2024-02-12 20:24:16.017 [INFO][4479] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:24:16.079883 env[1651]: 2024-02-12 20:24:16.017 [INFO][4479] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:24:16.079883 env[1651]: 2024-02-12 20:24:16.064 [WARNING][4479] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" HandleID="k8s-pod-network.908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" Workload="ip--172--31--19--54-k8s-coredns--5d78c9869d--lflqt-eth0" Feb 12 20:24:16.079883 env[1651]: 2024-02-12 20:24:16.064 [INFO][4479] ipam_plugin.go 443: Releasing address using workloadID ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" HandleID="k8s-pod-network.908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" Workload="ip--172--31--19--54-k8s-coredns--5d78c9869d--lflqt-eth0" Feb 12 20:24:16.079883 env[1651]: 2024-02-12 20:24:16.075 [INFO][4479] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:24:16.079883 env[1651]: 2024-02-12 20:24:16.077 [INFO][4452] k8s.go 591: Teardown processing complete. ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" Feb 12 20:24:16.089392 systemd[1]: run-netns-cni\x2d2b13018c\x2dce9d\x2d0aa0\x2dd41a\x2d0d9c6c205dd2.mount: Deactivated successfully. Feb 12 20:24:16.102477 env[1651]: time="2024-02-12T20:24:16.102363764Z" level=info msg="TearDown network for sandbox \"908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a\" successfully" Feb 12 20:24:16.102477 env[1651]: time="2024-02-12T20:24:16.102422552Z" level=info msg="StopPodSandbox for \"908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a\" returns successfully" Feb 12 20:24:16.106734 env[1651]: time="2024-02-12T20:24:16.103339372Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-lflqt,Uid:529d2533-9be6-4e17-93dc-7cf74f8ca7c5,Namespace:kube-system,Attempt:1,}" Feb 12 20:24:16.276014 systemd-networkd[1451]: vxlan.calico: Gained IPv6LL Feb 12 20:24:16.287000 audit[4506]: NETFILTER_CFG table=filter:110 family=2 entries=14 op=nft_register_rule pid=4506 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:24:16.287000 audit[4506]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=fffffa7b7710 a2=0 a3=ffff9f9026c0 items=0 ppid=2946 pid=4506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:16.287000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:24:16.289000 audit[4506]: NETFILTER_CFG table=nat:111 family=2 entries=14 op=nft_register_rule pid=4506 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:24:16.289000 audit[4506]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3300 a0=3 a1=fffffa7b7710 a2=0 a3=ffff9f9026c0 items=0 ppid=2946 pid=4506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:16.289000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:24:16.391458 systemd-networkd[1451]: calie77aeff95bb: Link UP Feb 12 20:24:16.399850 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:24:16.400007 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie77aeff95bb: link becomes ready Feb 12 20:24:16.400584 systemd-networkd[1451]: calie77aeff95bb: Gained carrier Feb 12 20:24:16.426146 kubelet[2764]: I0212 20:24:16.425361 2764 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-gvfp6" podStartSLOduration=38.425303972 podCreationTimestamp="2024-02-12 20:23:38 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:24:16.066258209 +0000 UTC m=+49.651898532" watchObservedRunningTime="2024-02-12 20:24:16.425303972 +0000 UTC m=+50.010944295" Feb 12 20:24:16.426855 env[1651]: 2024-02-12 20:24:16.216 [INFO][4488] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--19--54-k8s-coredns--5d78c9869d--lflqt-eth0 coredns-5d78c9869d- kube-system 529d2533-9be6-4e17-93dc-7cf74f8ca7c5 822 0 2024-02-12 20:23:38 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-19-54 coredns-5d78c9869d-lflqt eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calie77aeff95bb [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900" Namespace="kube-system" Pod="coredns-5d78c9869d-lflqt" WorkloadEndpoint="ip--172--31--19--54-k8s-coredns--5d78c9869d--lflqt-" Feb 12 20:24:16.426855 env[1651]: 2024-02-12 20:24:16.217 [INFO][4488] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900" Namespace="kube-system" Pod="coredns-5d78c9869d-lflqt" WorkloadEndpoint="ip--172--31--19--54-k8s-coredns--5d78c9869d--lflqt-eth0" Feb 12 20:24:16.426855 env[1651]: 2024-02-12 20:24:16.287 [INFO][4501] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900" HandleID="k8s-pod-network.555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900" Workload="ip--172--31--19--54-k8s-coredns--5d78c9869d--lflqt-eth0" Feb 12 20:24:16.426855 env[1651]: 2024-02-12 20:24:16.312 [INFO][4501] ipam_plugin.go 268: Auto assigning IP ContainerID="555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900" HandleID="k8s-pod-network.555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900" Workload="ip--172--31--19--54-k8s-coredns--5d78c9869d--lflqt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002ba7c0), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-19-54", "pod":"coredns-5d78c9869d-lflqt", "timestamp":"2024-02-12 20:24:16.287914212 +0000 UTC"}, Hostname:"ip-172-31-19-54", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:24:16.426855 env[1651]: 2024-02-12 20:24:16.312 [INFO][4501] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:24:16.426855 env[1651]: 2024-02-12 20:24:16.312 [INFO][4501] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:24:16.426855 env[1651]: 2024-02-12 20:24:16.312 [INFO][4501] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-19-54' Feb 12 20:24:16.426855 env[1651]: 2024-02-12 20:24:16.316 [INFO][4501] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900" host="ip-172-31-19-54" Feb 12 20:24:16.426855 env[1651]: 2024-02-12 20:24:16.338 [INFO][4501] ipam.go 372: Looking up existing affinities for host host="ip-172-31-19-54" Feb 12 20:24:16.426855 env[1651]: 2024-02-12 20:24:16.347 [INFO][4501] ipam.go 489: Trying affinity for 192.168.38.64/26 host="ip-172-31-19-54" Feb 12 20:24:16.426855 env[1651]: 2024-02-12 20:24:16.350 [INFO][4501] ipam.go 155: Attempting to load block cidr=192.168.38.64/26 host="ip-172-31-19-54" Feb 12 20:24:16.426855 env[1651]: 2024-02-12 20:24:16.355 [INFO][4501] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.38.64/26 host="ip-172-31-19-54" Feb 12 20:24:16.426855 env[1651]: 2024-02-12 20:24:16.355 [INFO][4501] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.38.64/26 handle="k8s-pod-network.555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900" host="ip-172-31-19-54" Feb 12 20:24:16.426855 env[1651]: 2024-02-12 20:24:16.364 [INFO][4501] ipam.go 1682: Creating new handle: k8s-pod-network.555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900 Feb 12 20:24:16.426855 env[1651]: 2024-02-12 20:24:16.373 [INFO][4501] ipam.go 1203: Writing block in order to claim IPs block=192.168.38.64/26 handle="k8s-pod-network.555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900" host="ip-172-31-19-54" Feb 12 20:24:16.426855 env[1651]: 2024-02-12 20:24:16.383 [INFO][4501] ipam.go 1216: Successfully claimed IPs: [192.168.38.66/26] block=192.168.38.64/26 handle="k8s-pod-network.555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900" host="ip-172-31-19-54" Feb 12 20:24:16.426855 env[1651]: 2024-02-12 20:24:16.383 [INFO][4501] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.38.66/26] handle="k8s-pod-network.555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900" host="ip-172-31-19-54" Feb 12 20:24:16.426855 env[1651]: 2024-02-12 20:24:16.383 [INFO][4501] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:24:16.426855 env[1651]: 2024-02-12 20:24:16.383 [INFO][4501] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.38.66/26] IPv6=[] ContainerID="555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900" HandleID="k8s-pod-network.555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900" Workload="ip--172--31--19--54-k8s-coredns--5d78c9869d--lflqt-eth0" Feb 12 20:24:16.428083 env[1651]: 2024-02-12 20:24:16.386 [INFO][4488] k8s.go 385: Populated endpoint ContainerID="555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900" Namespace="kube-system" Pod="coredns-5d78c9869d-lflqt" WorkloadEndpoint="ip--172--31--19--54-k8s-coredns--5d78c9869d--lflqt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--54-k8s-coredns--5d78c9869d--lflqt-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"529d2533-9be6-4e17-93dc-7cf74f8ca7c5", ResourceVersion:"822", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 23, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-54", ContainerID:"", Pod:"coredns-5d78c9869d-lflqt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie77aeff95bb", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:24:16.428083 env[1651]: 2024-02-12 20:24:16.387 [INFO][4488] k8s.go 386: Calico CNI using IPs: [192.168.38.66/32] ContainerID="555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900" Namespace="kube-system" Pod="coredns-5d78c9869d-lflqt" WorkloadEndpoint="ip--172--31--19--54-k8s-coredns--5d78c9869d--lflqt-eth0" Feb 12 20:24:16.428083 env[1651]: 2024-02-12 20:24:16.387 [INFO][4488] dataplane_linux.go 68: Setting the host side veth name to calie77aeff95bb ContainerID="555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900" Namespace="kube-system" Pod="coredns-5d78c9869d-lflqt" WorkloadEndpoint="ip--172--31--19--54-k8s-coredns--5d78c9869d--lflqt-eth0" Feb 12 20:24:16.428083 env[1651]: 2024-02-12 20:24:16.402 [INFO][4488] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900" Namespace="kube-system" Pod="coredns-5d78c9869d-lflqt" WorkloadEndpoint="ip--172--31--19--54-k8s-coredns--5d78c9869d--lflqt-eth0" Feb 12 20:24:16.428083 env[1651]: 2024-02-12 20:24:16.405 [INFO][4488] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900" Namespace="kube-system" Pod="coredns-5d78c9869d-lflqt" WorkloadEndpoint="ip--172--31--19--54-k8s-coredns--5d78c9869d--lflqt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--54-k8s-coredns--5d78c9869d--lflqt-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"529d2533-9be6-4e17-93dc-7cf74f8ca7c5", ResourceVersion:"822", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 23, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-54", ContainerID:"555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900", Pod:"coredns-5d78c9869d-lflqt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie77aeff95bb", MAC:"7a:f8:f6:43:11:3f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:24:16.428083 env[1651]: 2024-02-12 20:24:16.423 [INFO][4488] k8s.go 491: Wrote updated endpoint to datastore ContainerID="555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900" Namespace="kube-system" Pod="coredns-5d78c9869d-lflqt" WorkloadEndpoint="ip--172--31--19--54-k8s-coredns--5d78c9869d--lflqt-eth0" Feb 12 20:24:16.459742 env[1651]: time="2024-02-12T20:24:16.459598879Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:24:16.459742 env[1651]: time="2024-02-12T20:24:16.459675259Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:24:16.459742 env[1651]: time="2024-02-12T20:24:16.459702331Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:24:16.460558 env[1651]: time="2024-02-12T20:24:16.460416604Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900 pid=4525 runtime=io.containerd.runc.v2 Feb 12 20:24:16.508531 systemd[1]: Started cri-containerd-555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900.scope. Feb 12 20:24:16.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.578000 audit: BPF prog-id=183 op=LOAD Feb 12 20:24:16.578000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.578000 audit[4535]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=4525 pid=4535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:16.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535356330626638353536616463376239666564626266623264623537 Feb 12 20:24:16.578000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.578000 audit[4535]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=4525 pid=4535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:16.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535356330626638353536616463376239666564626266623264623537 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit: BPF prog-id=184 op=LOAD Feb 12 20:24:16.579000 audit[4535]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=4525 pid=4535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:16.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535356330626638353536616463376239666564626266623264623537 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit: BPF prog-id=185 op=LOAD Feb 12 20:24:16.579000 audit[4535]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=4525 pid=4535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:16.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535356330626638353536616463376239666564626266623264623537 Feb 12 20:24:16.579000 audit: BPF prog-id=185 op=UNLOAD Feb 12 20:24:16.579000 audit: BPF prog-id=184 op=UNLOAD Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { perfmon } for pid=4535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit[4535]: AVC avc: denied { bpf } for pid=4535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.579000 audit: BPF prog-id=186 op=LOAD Feb 12 20:24:16.579000 audit[4535]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=4525 pid=4535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:16.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535356330626638353536616463376239666564626266623264623537 Feb 12 20:24:16.579000 audit[4555]: NETFILTER_CFG table=filter:112 family=2 entries=30 op=nft_register_chain pid=4555 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:24:16.579000 audit[4555]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=16712 a0=3 a1=ffffc408c680 a2=0 a3=ffffa2e80fa8 items=0 ppid=4159 pid=4555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:16.579000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:24:16.646760 env[1651]: time="2024-02-12T20:24:16.646623388Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-lflqt,Uid:529d2533-9be6-4e17-93dc-7cf74f8ca7c5,Namespace:kube-system,Attempt:1,} returns sandbox id \"555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900\"" Feb 12 20:24:16.657675 env[1651]: time="2024-02-12T20:24:16.657622718Z" level=info msg="CreateContainer within sandbox \"555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 20:24:16.698784 env[1651]: time="2024-02-12T20:24:16.698717418Z" level=info msg="CreateContainer within sandbox \"555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"280724a3cea8043779f6d5dae90ce0e8ff53f920e9faa25d3db4ad9855d91826\"" Feb 12 20:24:16.699851 env[1651]: time="2024-02-12T20:24:16.699801601Z" level=info msg="StartContainer for \"280724a3cea8043779f6d5dae90ce0e8ff53f920e9faa25d3db4ad9855d91826\"" Feb 12 20:24:16.726092 systemd-networkd[1451]: cali21e3df39b7a: Gained IPv6LL Feb 12 20:24:16.729715 env[1651]: time="2024-02-12T20:24:16.729664041Z" level=info msg="StopPodSandbox for \"52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9\"" Feb 12 20:24:16.746424 systemd[1]: Started cri-containerd-280724a3cea8043779f6d5dae90ce0e8ff53f920e9faa25d3db4ad9855d91826.scope. Feb 12 20:24:16.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.805517 kernel: kauditd_printk_skb: 314 callbacks suppressed Feb 12 20:24:16.805596 kernel: audit: type=1400 audit(1707769456.803:1347): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.823931 kernel: audit: type=1400 audit(1707769456.808:1348): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.824175 kernel: audit: type=1400 audit(1707769456.808:1349): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.855726 kernel: audit: type=1400 audit(1707769456.808:1350): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.855869 kernel: audit: type=1400 audit(1707769456.808:1351): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.855914 kernel: audit: type=1400 audit(1707769456.808:1352): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.866469 kernel: audit: type=1400 audit(1707769456.808:1353): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.878076 kernel: audit: type=1400 audit(1707769456.808:1354): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.889323 kernel: audit: type=1400 audit(1707769456.808:1355): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.897717 kernel: audit: type=1400 audit(1707769456.812:1356): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.812000 audit: BPF prog-id=187 op=LOAD Feb 12 20:24:16.813000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.813000 audit[4571]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4525 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:16.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238303732346133636561383034333737396636643564616539306365 Feb 12 20:24:16.813000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.813000 audit[4571]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4525 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:16.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238303732346133636561383034333737396636643564616539306365 Feb 12 20:24:16.813000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.813000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.813000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.813000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.813000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.813000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.813000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.813000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.813000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.813000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.813000 audit: BPF prog-id=188 op=LOAD Feb 12 20:24:16.813000 audit[4571]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4525 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:16.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238303732346133636561383034333737396636643564616539306365 Feb 12 20:24:16.814000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.814000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.814000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.814000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.814000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.814000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.814000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.814000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.814000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.814000 audit: BPF prog-id=189 op=LOAD Feb 12 20:24:16.814000 audit[4571]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4525 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:16.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238303732346133636561383034333737396636643564616539306365 Feb 12 20:24:16.814000 audit: BPF prog-id=189 op=UNLOAD Feb 12 20:24:16.814000 audit: BPF prog-id=188 op=UNLOAD Feb 12 20:24:16.814000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.814000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.814000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.814000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.814000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.814000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.814000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.814000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.814000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.814000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:16.814000 audit: BPF prog-id=190 op=LOAD Feb 12 20:24:16.814000 audit[4571]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4525 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:16.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238303732346133636561383034333737396636643564616539306365 Feb 12 20:24:16.930589 env[1651]: time="2024-02-12T20:24:16.930500667Z" level=info msg="StartContainer for \"280724a3cea8043779f6d5dae90ce0e8ff53f920e9faa25d3db4ad9855d91826\" returns successfully" Feb 12 20:24:17.000932 env[1651]: 2024-02-12 20:24:16.918 [INFO][4596] k8s.go 578: Cleaning up netns ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" Feb 12 20:24:17.000932 env[1651]: 2024-02-12 20:24:16.918 [INFO][4596] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" iface="eth0" netns="/var/run/netns/cni-e5a424ae-d10c-263f-d283-f1d6d8d31fa0" Feb 12 20:24:17.000932 env[1651]: 2024-02-12 20:24:16.919 [INFO][4596] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" iface="eth0" netns="/var/run/netns/cni-e5a424ae-d10c-263f-d283-f1d6d8d31fa0" Feb 12 20:24:17.000932 env[1651]: 2024-02-12 20:24:16.919 [INFO][4596] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" iface="eth0" netns="/var/run/netns/cni-e5a424ae-d10c-263f-d283-f1d6d8d31fa0" Feb 12 20:24:17.000932 env[1651]: 2024-02-12 20:24:16.919 [INFO][4596] k8s.go 585: Releasing IP address(es) ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" Feb 12 20:24:17.000932 env[1651]: 2024-02-12 20:24:16.919 [INFO][4596] utils.go 188: Calico CNI releasing IP address ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" Feb 12 20:24:17.000932 env[1651]: 2024-02-12 20:24:16.975 [INFO][4615] ipam_plugin.go 415: Releasing address using handleID ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" HandleID="k8s-pod-network.52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" Workload="ip--172--31--19--54-k8s-calico--kube--controllers--9ccfb758b--r6cvq-eth0" Feb 12 20:24:17.000932 env[1651]: 2024-02-12 20:24:16.975 [INFO][4615] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:24:17.000932 env[1651]: 2024-02-12 20:24:16.976 [INFO][4615] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:24:17.000932 env[1651]: 2024-02-12 20:24:16.992 [WARNING][4615] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" HandleID="k8s-pod-network.52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" Workload="ip--172--31--19--54-k8s-calico--kube--controllers--9ccfb758b--r6cvq-eth0" Feb 12 20:24:17.000932 env[1651]: 2024-02-12 20:24:16.992 [INFO][4615] ipam_plugin.go 443: Releasing address using workloadID ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" HandleID="k8s-pod-network.52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" Workload="ip--172--31--19--54-k8s-calico--kube--controllers--9ccfb758b--r6cvq-eth0" Feb 12 20:24:17.000932 env[1651]: 2024-02-12 20:24:16.995 [INFO][4615] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:24:17.000932 env[1651]: 2024-02-12 20:24:16.997 [INFO][4596] k8s.go 591: Teardown processing complete. ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" Feb 12 20:24:17.010732 systemd[1]: run-netns-cni\x2de5a424ae\x2dd10c\x2d263f\x2dd283\x2df1d6d8d31fa0.mount: Deactivated successfully. Feb 12 20:24:17.012971 env[1651]: time="2024-02-12T20:24:17.012922783Z" level=info msg="TearDown network for sandbox \"52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9\" successfully" Feb 12 20:24:17.013136 env[1651]: time="2024-02-12T20:24:17.013101547Z" level=info msg="StopPodSandbox for \"52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9\" returns successfully" Feb 12 20:24:17.014817 env[1651]: time="2024-02-12T20:24:17.014760899Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-9ccfb758b-r6cvq,Uid:3bf4fa95-1a58-409e-8327-5b2781c83bb2,Namespace:calico-system,Attempt:1,}" Feb 12 20:24:17.089943 kubelet[2764]: I0212 20:24:17.089207 2764 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-lflqt" podStartSLOduration=39.089155085 podCreationTimestamp="2024-02-12 20:23:38 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:24:17.044738722 +0000 UTC m=+50.630379033" watchObservedRunningTime="2024-02-12 20:24:17.089155085 +0000 UTC m=+50.674795396" Feb 12 20:24:17.101000 audit[4639]: NETFILTER_CFG table=filter:113 family=2 entries=14 op=nft_register_rule pid=4639 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:24:17.101000 audit[4639]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffda301200 a2=0 a3=ffffa6dae6c0 items=0 ppid=2946 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:17.101000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:24:17.103000 audit[4639]: NETFILTER_CFG table=nat:114 family=2 entries=14 op=nft_register_rule pid=4639 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:24:17.103000 audit[4639]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3300 a0=3 a1=ffffda301200 a2=0 a3=ffffa6dae6c0 items=0 ppid=2946 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:17.103000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:24:17.179000 audit[4644]: NETFILTER_CFG table=filter:115 family=2 entries=11 op=nft_register_rule pid=4644 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:24:17.179000 audit[4644]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffe9298db0 a2=0 a3=ffffa45d56c0 items=0 ppid=2946 pid=4644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:17.179000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:24:17.189000 audit[4644]: NETFILTER_CFG table=nat:116 family=2 entries=35 op=nft_register_chain pid=4644 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:24:17.189000 audit[4644]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13788 a0=3 a1=ffffe9298db0 a2=0 a3=ffffa45d56c0 items=0 ppid=2946 pid=4644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:17.189000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:24:17.352483 systemd-networkd[1451]: calibd7cd7c968c: Link UP Feb 12 20:24:17.356498 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibd7cd7c968c: link becomes ready Feb 12 20:24:17.356523 systemd-networkd[1451]: calibd7cd7c968c: Gained carrier Feb 12 20:24:17.382511 env[1651]: 2024-02-12 20:24:17.158 [INFO][4629] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--19--54-k8s-calico--kube--controllers--9ccfb758b--r6cvq-eth0 calico-kube-controllers-9ccfb758b- calico-system 3bf4fa95-1a58-409e-8327-5b2781c83bb2 836 0 2024-02-12 20:23:48 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:9ccfb758b projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-19-54 calico-kube-controllers-9ccfb758b-r6cvq eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calibd7cd7c968c [] []}} ContainerID="e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8" Namespace="calico-system" Pod="calico-kube-controllers-9ccfb758b-r6cvq" WorkloadEndpoint="ip--172--31--19--54-k8s-calico--kube--controllers--9ccfb758b--r6cvq-" Feb 12 20:24:17.382511 env[1651]: 2024-02-12 20:24:17.158 [INFO][4629] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8" Namespace="calico-system" Pod="calico-kube-controllers-9ccfb758b-r6cvq" WorkloadEndpoint="ip--172--31--19--54-k8s-calico--kube--controllers--9ccfb758b--r6cvq-eth0" Feb 12 20:24:17.382511 env[1651]: 2024-02-12 20:24:17.225 [INFO][4645] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8" HandleID="k8s-pod-network.e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8" Workload="ip--172--31--19--54-k8s-calico--kube--controllers--9ccfb758b--r6cvq-eth0" Feb 12 20:24:17.382511 env[1651]: 2024-02-12 20:24:17.265 [INFO][4645] ipam_plugin.go 268: Auto assigning IP ContainerID="e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8" HandleID="k8s-pod-network.e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8" Workload="ip--172--31--19--54-k8s-calico--kube--controllers--9ccfb758b--r6cvq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400027b800), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-19-54", "pod":"calico-kube-controllers-9ccfb758b-r6cvq", "timestamp":"2024-02-12 20:24:17.225377063 +0000 UTC"}, Hostname:"ip-172-31-19-54", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:24:17.382511 env[1651]: 2024-02-12 20:24:17.265 [INFO][4645] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:24:17.382511 env[1651]: 2024-02-12 20:24:17.266 [INFO][4645] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:24:17.382511 env[1651]: 2024-02-12 20:24:17.266 [INFO][4645] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-19-54' Feb 12 20:24:17.382511 env[1651]: 2024-02-12 20:24:17.269 [INFO][4645] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8" host="ip-172-31-19-54" Feb 12 20:24:17.382511 env[1651]: 2024-02-12 20:24:17.293 [INFO][4645] ipam.go 372: Looking up existing affinities for host host="ip-172-31-19-54" Feb 12 20:24:17.382511 env[1651]: 2024-02-12 20:24:17.308 [INFO][4645] ipam.go 489: Trying affinity for 192.168.38.64/26 host="ip-172-31-19-54" Feb 12 20:24:17.382511 env[1651]: 2024-02-12 20:24:17.311 [INFO][4645] ipam.go 155: Attempting to load block cidr=192.168.38.64/26 host="ip-172-31-19-54" Feb 12 20:24:17.382511 env[1651]: 2024-02-12 20:24:17.316 [INFO][4645] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.38.64/26 host="ip-172-31-19-54" Feb 12 20:24:17.382511 env[1651]: 2024-02-12 20:24:17.316 [INFO][4645] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.38.64/26 handle="k8s-pod-network.e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8" host="ip-172-31-19-54" Feb 12 20:24:17.382511 env[1651]: 2024-02-12 20:24:17.321 [INFO][4645] ipam.go 1682: Creating new handle: k8s-pod-network.e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8 Feb 12 20:24:17.382511 env[1651]: 2024-02-12 20:24:17.331 [INFO][4645] ipam.go 1203: Writing block in order to claim IPs block=192.168.38.64/26 handle="k8s-pod-network.e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8" host="ip-172-31-19-54" Feb 12 20:24:17.382511 env[1651]: 2024-02-12 20:24:17.342 [INFO][4645] ipam.go 1216: Successfully claimed IPs: [192.168.38.67/26] block=192.168.38.64/26 handle="k8s-pod-network.e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8" host="ip-172-31-19-54" Feb 12 20:24:17.382511 env[1651]: 2024-02-12 20:24:17.343 [INFO][4645] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.38.67/26] handle="k8s-pod-network.e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8" host="ip-172-31-19-54" Feb 12 20:24:17.382511 env[1651]: 2024-02-12 20:24:17.343 [INFO][4645] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:24:17.382511 env[1651]: 2024-02-12 20:24:17.343 [INFO][4645] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.38.67/26] IPv6=[] ContainerID="e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8" HandleID="k8s-pod-network.e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8" Workload="ip--172--31--19--54-k8s-calico--kube--controllers--9ccfb758b--r6cvq-eth0" Feb 12 20:24:17.383888 env[1651]: 2024-02-12 20:24:17.346 [INFO][4629] k8s.go 385: Populated endpoint ContainerID="e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8" Namespace="calico-system" Pod="calico-kube-controllers-9ccfb758b-r6cvq" WorkloadEndpoint="ip--172--31--19--54-k8s-calico--kube--controllers--9ccfb758b--r6cvq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--54-k8s-calico--kube--controllers--9ccfb758b--r6cvq-eth0", GenerateName:"calico-kube-controllers-9ccfb758b-", Namespace:"calico-system", SelfLink:"", UID:"3bf4fa95-1a58-409e-8327-5b2781c83bb2", ResourceVersion:"836", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 23, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"9ccfb758b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-54", ContainerID:"", Pod:"calico-kube-controllers-9ccfb758b-r6cvq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.38.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calibd7cd7c968c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:24:17.383888 env[1651]: 2024-02-12 20:24:17.347 [INFO][4629] k8s.go 386: Calico CNI using IPs: [192.168.38.67/32] ContainerID="e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8" Namespace="calico-system" Pod="calico-kube-controllers-9ccfb758b-r6cvq" WorkloadEndpoint="ip--172--31--19--54-k8s-calico--kube--controllers--9ccfb758b--r6cvq-eth0" Feb 12 20:24:17.383888 env[1651]: 2024-02-12 20:24:17.347 [INFO][4629] dataplane_linux.go 68: Setting the host side veth name to calibd7cd7c968c ContainerID="e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8" Namespace="calico-system" Pod="calico-kube-controllers-9ccfb758b-r6cvq" WorkloadEndpoint="ip--172--31--19--54-k8s-calico--kube--controllers--9ccfb758b--r6cvq-eth0" Feb 12 20:24:17.383888 env[1651]: 2024-02-12 20:24:17.357 [INFO][4629] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8" Namespace="calico-system" Pod="calico-kube-controllers-9ccfb758b-r6cvq" WorkloadEndpoint="ip--172--31--19--54-k8s-calico--kube--controllers--9ccfb758b--r6cvq-eth0" Feb 12 20:24:17.383888 env[1651]: 2024-02-12 20:24:17.358 [INFO][4629] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8" Namespace="calico-system" Pod="calico-kube-controllers-9ccfb758b-r6cvq" WorkloadEndpoint="ip--172--31--19--54-k8s-calico--kube--controllers--9ccfb758b--r6cvq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--54-k8s-calico--kube--controllers--9ccfb758b--r6cvq-eth0", GenerateName:"calico-kube-controllers-9ccfb758b-", Namespace:"calico-system", SelfLink:"", UID:"3bf4fa95-1a58-409e-8327-5b2781c83bb2", ResourceVersion:"836", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 23, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"9ccfb758b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-54", ContainerID:"e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8", Pod:"calico-kube-controllers-9ccfb758b-r6cvq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.38.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calibd7cd7c968c", MAC:"be:17:65:4f:4c:47", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:24:17.383888 env[1651]: 2024-02-12 20:24:17.371 [INFO][4629] k8s.go 491: Wrote updated endpoint to datastore ContainerID="e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8" Namespace="calico-system" Pod="calico-kube-controllers-9ccfb758b-r6cvq" WorkloadEndpoint="ip--172--31--19--54-k8s-calico--kube--controllers--9ccfb758b--r6cvq-eth0" Feb 12 20:24:17.410980 env[1651]: time="2024-02-12T20:24:17.410398901Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:24:17.411173 env[1651]: time="2024-02-12T20:24:17.411032294Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:24:17.411173 env[1651]: time="2024-02-12T20:24:17.411124886Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:24:17.412769 env[1651]: time="2024-02-12T20:24:17.412652527Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8 pid=4669 runtime=io.containerd.runc.v2 Feb 12 20:24:17.452926 systemd[1]: Started cri-containerd-e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8.scope. Feb 12 20:24:17.458000 audit[4693]: NETFILTER_CFG table=filter:117 family=2 entries=44 op=nft_register_chain pid=4693 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:24:17.458000 audit[4693]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22284 a0=3 a1=ffffe5098070 a2=0 a3=ffffb6f25fa8 items=0 ppid=4159 pid=4693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:17.458000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:24:17.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.490000 audit: BPF prog-id=191 op=LOAD Feb 12 20:24:17.492000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.492000 audit[4682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4669 pid=4682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:17.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534373763303461653066303130333236623665343434383839343437 Feb 12 20:24:17.492000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.492000 audit[4682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4669 pid=4682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:17.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534373763303461653066303130333236623665343434383839343437 Feb 12 20:24:17.492000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.492000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.492000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.492000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.492000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.492000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.492000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.492000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.492000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.492000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.492000 audit: BPF prog-id=192 op=LOAD Feb 12 20:24:17.492000 audit[4682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4669 pid=4682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:17.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534373763303461653066303130333236623665343434383839343437 Feb 12 20:24:17.493000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.493000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.493000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.493000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.493000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.493000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.493000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.493000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.493000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.493000 audit: BPF prog-id=193 op=LOAD Feb 12 20:24:17.493000 audit[4682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4669 pid=4682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:17.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534373763303461653066303130333236623665343434383839343437 Feb 12 20:24:17.493000 audit: BPF prog-id=193 op=UNLOAD Feb 12 20:24:17.493000 audit: BPF prog-id=192 op=UNLOAD Feb 12 20:24:17.493000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.493000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.493000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.493000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.493000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.493000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.493000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.493000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.493000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.493000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:17.493000 audit: BPF prog-id=194 op=LOAD Feb 12 20:24:17.493000 audit[4682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4669 pid=4682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:17.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534373763303461653066303130333236623665343434383839343437 Feb 12 20:24:17.535250 env[1651]: time="2024-02-12T20:24:17.535174406Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-9ccfb758b-r6cvq,Uid:3bf4fa95-1a58-409e-8327-5b2781c83bb2,Namespace:calico-system,Attempt:1,} returns sandbox id \"e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8\"" Feb 12 20:24:17.538626 env[1651]: time="2024-02-12T20:24:17.538571219Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 12 20:24:17.875994 systemd-networkd[1451]: calie77aeff95bb: Gained IPv6LL Feb 12 20:24:18.211000 audit[4709]: NETFILTER_CFG table=filter:118 family=2 entries=8 op=nft_register_rule pid=4709 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:24:18.211000 audit[4709]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffd582e4c0 a2=0 a3=ffffbda5c6c0 items=0 ppid=2946 pid=4709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:18.211000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:24:18.223000 audit[4709]: NETFILTER_CFG table=nat:119 family=2 entries=56 op=nft_register_chain pid=4709 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:24:18.223000 audit[4709]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19452 a0=3 a1=ffffd582e4c0 a2=0 a3=ffffbda5c6c0 items=0 ppid=2946 pid=4709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:18.223000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:24:18.645099 systemd-networkd[1451]: calibd7cd7c968c: Gained IPv6LL Feb 12 20:24:18.722978 env[1651]: time="2024-02-12T20:24:18.722925040Z" level=info msg="StopPodSandbox for \"e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb\"" Feb 12 20:24:18.964803 env[1651]: 2024-02-12 20:24:18.852 [INFO][4727] k8s.go 578: Cleaning up netns ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" Feb 12 20:24:18.964803 env[1651]: 2024-02-12 20:24:18.852 [INFO][4727] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" iface="eth0" netns="/var/run/netns/cni-b4a729f2-9a13-a56d-de18-6ecfe4867304" Feb 12 20:24:18.964803 env[1651]: 2024-02-12 20:24:18.853 [INFO][4727] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" iface="eth0" netns="/var/run/netns/cni-b4a729f2-9a13-a56d-de18-6ecfe4867304" Feb 12 20:24:18.964803 env[1651]: 2024-02-12 20:24:18.854 [INFO][4727] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" iface="eth0" netns="/var/run/netns/cni-b4a729f2-9a13-a56d-de18-6ecfe4867304" Feb 12 20:24:18.964803 env[1651]: 2024-02-12 20:24:18.854 [INFO][4727] k8s.go 585: Releasing IP address(es) ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" Feb 12 20:24:18.964803 env[1651]: 2024-02-12 20:24:18.854 [INFO][4727] utils.go 188: Calico CNI releasing IP address ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" Feb 12 20:24:18.964803 env[1651]: 2024-02-12 20:24:18.932 [INFO][4734] ipam_plugin.go 415: Releasing address using handleID ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" HandleID="k8s-pod-network.e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" Workload="ip--172--31--19--54-k8s-csi--node--driver--5zxnw-eth0" Feb 12 20:24:18.964803 env[1651]: 2024-02-12 20:24:18.932 [INFO][4734] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:24:18.964803 env[1651]: 2024-02-12 20:24:18.932 [INFO][4734] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:24:18.964803 env[1651]: 2024-02-12 20:24:18.956 [WARNING][4734] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" HandleID="k8s-pod-network.e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" Workload="ip--172--31--19--54-k8s-csi--node--driver--5zxnw-eth0" Feb 12 20:24:18.964803 env[1651]: 2024-02-12 20:24:18.956 [INFO][4734] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" HandleID="k8s-pod-network.e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" Workload="ip--172--31--19--54-k8s-csi--node--driver--5zxnw-eth0" Feb 12 20:24:18.964803 env[1651]: 2024-02-12 20:24:18.960 [INFO][4734] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:24:18.964803 env[1651]: 2024-02-12 20:24:18.962 [INFO][4727] k8s.go 591: Teardown processing complete. ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" Feb 12 20:24:18.965921 env[1651]: time="2024-02-12T20:24:18.965038334Z" level=info msg="TearDown network for sandbox \"e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb\" successfully" Feb 12 20:24:18.965921 env[1651]: time="2024-02-12T20:24:18.965099810Z" level=info msg="StopPodSandbox for \"e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb\" returns successfully" Feb 12 20:24:18.970961 env[1651]: time="2024-02-12T20:24:18.966996234Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5zxnw,Uid:813164be-67aa-473b-b98f-ae32d6883ffe,Namespace:calico-system,Attempt:1,}" Feb 12 20:24:18.974505 systemd[1]: run-netns-cni\x2db4a729f2\x2d9a13\x2da56d\x2dde18\x2d6ecfe4867304.mount: Deactivated successfully. Feb 12 20:24:19.280782 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:24:19.280931 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9855e0dc949: link becomes ready Feb 12 20:24:19.278638 systemd-networkd[1451]: cali9855e0dc949: Link UP Feb 12 20:24:19.290336 systemd-networkd[1451]: cali9855e0dc949: Gained carrier Feb 12 20:24:19.330022 env[1651]: 2024-02-12 20:24:19.093 [INFO][4740] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--19--54-k8s-csi--node--driver--5zxnw-eth0 csi-node-driver- calico-system 813164be-67aa-473b-b98f-ae32d6883ffe 864 0 2024-02-12 20:23:46 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ip-172-31-19-54 csi-node-driver-5zxnw eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali9855e0dc949 [] []}} ContainerID="c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69" Namespace="calico-system" Pod="csi-node-driver-5zxnw" WorkloadEndpoint="ip--172--31--19--54-k8s-csi--node--driver--5zxnw-" Feb 12 20:24:19.330022 env[1651]: 2024-02-12 20:24:19.094 [INFO][4740] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69" Namespace="calico-system" Pod="csi-node-driver-5zxnw" WorkloadEndpoint="ip--172--31--19--54-k8s-csi--node--driver--5zxnw-eth0" Feb 12 20:24:19.330022 env[1651]: 2024-02-12 20:24:19.172 [INFO][4752] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69" HandleID="k8s-pod-network.c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69" Workload="ip--172--31--19--54-k8s-csi--node--driver--5zxnw-eth0" Feb 12 20:24:19.330022 env[1651]: 2024-02-12 20:24:19.197 [INFO][4752] ipam_plugin.go 268: Auto assigning IP ContainerID="c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69" HandleID="k8s-pod-network.c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69" Workload="ip--172--31--19--54-k8s-csi--node--driver--5zxnw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000632340), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-19-54", "pod":"csi-node-driver-5zxnw", "timestamp":"2024-02-12 20:24:19.172643889 +0000 UTC"}, Hostname:"ip-172-31-19-54", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:24:19.330022 env[1651]: 2024-02-12 20:24:19.197 [INFO][4752] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:24:19.330022 env[1651]: 2024-02-12 20:24:19.198 [INFO][4752] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:24:19.330022 env[1651]: 2024-02-12 20:24:19.198 [INFO][4752] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-19-54' Feb 12 20:24:19.330022 env[1651]: 2024-02-12 20:24:19.201 [INFO][4752] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69" host="ip-172-31-19-54" Feb 12 20:24:19.330022 env[1651]: 2024-02-12 20:24:19.210 [INFO][4752] ipam.go 372: Looking up existing affinities for host host="ip-172-31-19-54" Feb 12 20:24:19.330022 env[1651]: 2024-02-12 20:24:19.222 [INFO][4752] ipam.go 489: Trying affinity for 192.168.38.64/26 host="ip-172-31-19-54" Feb 12 20:24:19.330022 env[1651]: 2024-02-12 20:24:19.226 [INFO][4752] ipam.go 155: Attempting to load block cidr=192.168.38.64/26 host="ip-172-31-19-54" Feb 12 20:24:19.330022 env[1651]: 2024-02-12 20:24:19.238 [INFO][4752] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.38.64/26 host="ip-172-31-19-54" Feb 12 20:24:19.330022 env[1651]: 2024-02-12 20:24:19.239 [INFO][4752] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.38.64/26 handle="k8s-pod-network.c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69" host="ip-172-31-19-54" Feb 12 20:24:19.330022 env[1651]: 2024-02-12 20:24:19.245 [INFO][4752] ipam.go 1682: Creating new handle: k8s-pod-network.c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69 Feb 12 20:24:19.330022 env[1651]: 2024-02-12 20:24:19.259 [INFO][4752] ipam.go 1203: Writing block in order to claim IPs block=192.168.38.64/26 handle="k8s-pod-network.c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69" host="ip-172-31-19-54" Feb 12 20:24:19.330022 env[1651]: 2024-02-12 20:24:19.268 [INFO][4752] ipam.go 1216: Successfully claimed IPs: [192.168.38.68/26] block=192.168.38.64/26 handle="k8s-pod-network.c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69" host="ip-172-31-19-54" Feb 12 20:24:19.330022 env[1651]: 2024-02-12 20:24:19.268 [INFO][4752] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.38.68/26] handle="k8s-pod-network.c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69" host="ip-172-31-19-54" Feb 12 20:24:19.330022 env[1651]: 2024-02-12 20:24:19.268 [INFO][4752] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:24:19.330022 env[1651]: 2024-02-12 20:24:19.268 [INFO][4752] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.38.68/26] IPv6=[] ContainerID="c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69" HandleID="k8s-pod-network.c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69" Workload="ip--172--31--19--54-k8s-csi--node--driver--5zxnw-eth0" Feb 12 20:24:19.331393 env[1651]: 2024-02-12 20:24:19.271 [INFO][4740] k8s.go 385: Populated endpoint ContainerID="c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69" Namespace="calico-system" Pod="csi-node-driver-5zxnw" WorkloadEndpoint="ip--172--31--19--54-k8s-csi--node--driver--5zxnw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--54-k8s-csi--node--driver--5zxnw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"813164be-67aa-473b-b98f-ae32d6883ffe", ResourceVersion:"864", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 23, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-54", ContainerID:"", Pod:"csi-node-driver-5zxnw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.38.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9855e0dc949", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:24:19.331393 env[1651]: 2024-02-12 20:24:19.271 [INFO][4740] k8s.go 386: Calico CNI using IPs: [192.168.38.68/32] ContainerID="c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69" Namespace="calico-system" Pod="csi-node-driver-5zxnw" WorkloadEndpoint="ip--172--31--19--54-k8s-csi--node--driver--5zxnw-eth0" Feb 12 20:24:19.331393 env[1651]: 2024-02-12 20:24:19.271 [INFO][4740] dataplane_linux.go 68: Setting the host side veth name to cali9855e0dc949 ContainerID="c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69" Namespace="calico-system" Pod="csi-node-driver-5zxnw" WorkloadEndpoint="ip--172--31--19--54-k8s-csi--node--driver--5zxnw-eth0" Feb 12 20:24:19.331393 env[1651]: 2024-02-12 20:24:19.285 [INFO][4740] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69" Namespace="calico-system" Pod="csi-node-driver-5zxnw" WorkloadEndpoint="ip--172--31--19--54-k8s-csi--node--driver--5zxnw-eth0" Feb 12 20:24:19.331393 env[1651]: 2024-02-12 20:24:19.301 [INFO][4740] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69" Namespace="calico-system" Pod="csi-node-driver-5zxnw" WorkloadEndpoint="ip--172--31--19--54-k8s-csi--node--driver--5zxnw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--54-k8s-csi--node--driver--5zxnw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"813164be-67aa-473b-b98f-ae32d6883ffe", ResourceVersion:"864", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 23, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-54", ContainerID:"c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69", Pod:"csi-node-driver-5zxnw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.38.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9855e0dc949", MAC:"3e:67:ce:46:ce:8a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:24:19.331393 env[1651]: 2024-02-12 20:24:19.327 [INFO][4740] k8s.go 491: Wrote updated endpoint to datastore ContainerID="c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69" Namespace="calico-system" Pod="csi-node-driver-5zxnw" WorkloadEndpoint="ip--172--31--19--54-k8s-csi--node--driver--5zxnw-eth0" Feb 12 20:24:19.366391 env[1651]: time="2024-02-12T20:24:19.365093705Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:24:19.366391 env[1651]: time="2024-02-12T20:24:19.365188696Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:24:19.366391 env[1651]: time="2024-02-12T20:24:19.365216140Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:24:19.366391 env[1651]: time="2024-02-12T20:24:19.365757182Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69 pid=4776 runtime=io.containerd.runc.v2 Feb 12 20:24:19.420475 systemd[1]: Started cri-containerd-c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69.scope. Feb 12 20:24:19.486000 audit[4801]: NETFILTER_CFG table=filter:120 family=2 entries=42 op=nft_register_chain pid=4801 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:24:19.486000 audit[4801]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20696 a0=3 a1=ffffd0533d70 a2=0 a3=ffff82528fa8 items=0 ppid=4159 pid=4801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:19.486000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:24:19.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.511000 audit: BPF prog-id=195 op=LOAD Feb 12 20:24:19.514000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.514000 audit[4788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4776 pid=4788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:19.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333356432313835336631376633313030633864636639323633646665 Feb 12 20:24:19.515000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.515000 audit[4788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4776 pid=4788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:19.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333356432313835336631376633313030633864636639323633646665 Feb 12 20:24:19.516000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.516000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.516000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.516000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.516000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.516000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.516000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.516000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.516000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.516000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.516000 audit: BPF prog-id=196 op=LOAD Feb 12 20:24:19.516000 audit[4788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4776 pid=4788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:19.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333356432313835336631376633313030633864636639323633646665 Feb 12 20:24:19.517000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.517000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.517000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.517000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.517000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.517000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.517000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.517000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.517000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.517000 audit: BPF prog-id=197 op=LOAD Feb 12 20:24:19.517000 audit[4788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4776 pid=4788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:19.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333356432313835336631376633313030633864636639323633646665 Feb 12 20:24:19.519000 audit: BPF prog-id=197 op=UNLOAD Feb 12 20:24:19.519000 audit: BPF prog-id=196 op=UNLOAD Feb 12 20:24:19.519000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.519000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.519000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.519000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.519000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.519000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.519000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.519000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.519000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.519000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:19.519000 audit: BPF prog-id=198 op=LOAD Feb 12 20:24:19.519000 audit[4788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4776 pid=4788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:19.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333356432313835336631376633313030633864636639323633646665 Feb 12 20:24:19.570064 env[1651]: time="2024-02-12T20:24:19.569891576Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5zxnw,Uid:813164be-67aa-473b-b98f-ae32d6883ffe,Namespace:calico-system,Attempt:1,} returns sandbox id \"c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69\"" Feb 12 20:24:19.974761 systemd[1]: run-containerd-runc-k8s.io-c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69-runc.l3nlHZ.mount: Deactivated successfully. Feb 12 20:24:20.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.19.54:22-147.75.109.163:51274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:20.401256 systemd[1]: Started sshd@7-172.31.19.54:22-147.75.109.163:51274.service. Feb 12 20:24:20.606000 audit[4826]: USER_ACCT pid=4826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:20.608417 sshd[4826]: Accepted publickey for core from 147.75.109.163 port 51274 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:24:20.608000 audit[4826]: CRED_ACQ pid=4826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:20.608000 audit[4826]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff0baae00 a2=3 a3=1 items=0 ppid=1 pid=4826 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:20.608000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:24:20.613102 sshd[4826]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:24:20.628823 systemd[1]: Started session-8.scope. Feb 12 20:24:20.631390 systemd-logind[1628]: New session 8 of user core. Feb 12 20:24:20.642000 audit[4826]: USER_START pid=4826 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:20.645000 audit[4828]: CRED_ACQ pid=4828 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:20.884124 systemd-networkd[1451]: cali9855e0dc949: Gained IPv6LL Feb 12 20:24:20.996687 sshd[4826]: pam_unix(sshd:session): session closed for user core Feb 12 20:24:20.998000 audit[4826]: USER_END pid=4826 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:20.998000 audit[4826]: CRED_DISP pid=4826 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:21.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.19.54:22-147.75.109.163:51274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:21.001073 systemd[1]: sshd@7-172.31.19.54:22-147.75.109.163:51274.service: Deactivated successfully. Feb 12 20:24:21.003623 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 20:24:21.006361 systemd-logind[1628]: Session 8 logged out. Waiting for processes to exit. Feb 12 20:24:21.011438 systemd-logind[1628]: Removed session 8. Feb 12 20:24:21.627904 env[1651]: time="2024-02-12T20:24:21.627824111Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:24:21.632463 env[1651]: time="2024-02-12T20:24:21.632388377Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:24:21.636841 env[1651]: time="2024-02-12T20:24:21.636761136Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:24:21.641394 env[1651]: time="2024-02-12T20:24:21.641264934Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:24:21.644356 env[1651]: time="2024-02-12T20:24:21.642882359Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8\"" Feb 12 20:24:21.645606 env[1651]: time="2024-02-12T20:24:21.645538417Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 20:24:21.682315 env[1651]: time="2024-02-12T20:24:21.679093247Z" level=info msg="CreateContainer within sandbox \"e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 12 20:24:21.713978 env[1651]: time="2024-02-12T20:24:21.713898197Z" level=info msg="CreateContainer within sandbox \"e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"ccc3138ea94139585d2c5d0f827530663ede048b728368cadb8ebc3744b21b6c\"" Feb 12 20:24:21.715204 env[1651]: time="2024-02-12T20:24:21.715153656Z" level=info msg="StartContainer for \"ccc3138ea94139585d2c5d0f827530663ede048b728368cadb8ebc3744b21b6c\"" Feb 12 20:24:21.718000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:24:21.718000 audit[2497]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4013a447a0 a2=fc6 a3=0 items=0 ppid=2366 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 key=(null) Feb 12 20:24:21.718000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:24:21.719000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:24:21.719000 audit[2497]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4012ffa0f0 a2=fc6 a3=0 items=0 ppid=2366 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 key=(null) Feb 12 20:24:21.719000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:24:21.720000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:24:21.720000 audit[2497]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4012ffa330 a2=fc6 a3=0 items=0 ppid=2366 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 key=(null) Feb 12 20:24:21.720000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:24:21.749000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:24:21.749000 audit[2497]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=67 a1=4012ffaab0 a2=fc6 a3=0 items=0 ppid=2366 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 key=(null) Feb 12 20:24:21.749000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:24:21.776778 systemd[1]: Started cri-containerd-ccc3138ea94139585d2c5d0f827530663ede048b728368cadb8ebc3744b21b6c.scope. Feb 12 20:24:21.871249 kernel: kauditd_printk_skb: 208 callbacks suppressed Feb 12 20:24:21.871479 kernel: audit: type=1400 audit(1707769461.861:1422): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.881820 kernel: audit: type=1400 audit(1707769461.871:1423): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.899629 kernel: audit: type=1400 audit(1707769461.871:1424): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.899710 kernel: audit: type=1400 audit(1707769461.871:1425): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.907872 kernel: audit: type=1400 audit(1707769461.871:1426): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.924325 kernel: audit: type=1400 audit(1707769461.871:1427): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.924411 kernel: audit: type=1400 audit(1707769461.871:1428): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.933401 kernel: audit: type=1400 audit(1707769461.871:1429): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.949447 kernel: audit: type=1400 audit(1707769461.871:1430): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.949537 kernel: audit: type=1400 audit(1707769461.871:1431): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.871000 audit: BPF prog-id=199 op=LOAD Feb 12 20:24:21.872000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.872000 audit[4847]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=4669 pid=4847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:21.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363633331333865613934313339353835643263356430663832373533 Feb 12 20:24:21.872000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.872000 audit[4847]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=4669 pid=4847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:21.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363633331333865613934313339353835643263356430663832373533 Feb 12 20:24:21.872000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.872000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.872000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.872000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.872000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.872000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.872000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.872000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.872000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.872000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.872000 audit: BPF prog-id=200 op=LOAD Feb 12 20:24:21.872000 audit[4847]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=4669 pid=4847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:21.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363633331333865613934313339353835643263356430663832373533 Feb 12 20:24:21.873000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.873000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.873000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.873000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.873000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.873000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.873000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.873000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.873000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.873000 audit: BPF prog-id=201 op=LOAD Feb 12 20:24:21.873000 audit[4847]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=19 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=4669 pid=4847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:21.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363633331333865613934313339353835643263356430663832373533 Feb 12 20:24:21.873000 audit: BPF prog-id=201 op=UNLOAD Feb 12 20:24:21.873000 audit: BPF prog-id=200 op=UNLOAD Feb 12 20:24:21.873000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.873000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.873000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.873000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.873000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.873000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.873000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.873000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.873000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.873000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:21.873000 audit: BPF prog-id=202 op=LOAD Feb 12 20:24:21.873000 audit[4847]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=4669 pid=4847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:21.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363633331333865613934313339353835643263356430663832373533 Feb 12 20:24:21.955000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:24:21.955000 audit[2497]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=67 a1=401562e960 a2=fc6 a3=0 items=0 ppid=2366 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 key=(null) Feb 12 20:24:21.955000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:24:21.956000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:24:21.956000 audit[2497]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=67 a1=40151b27b0 a2=fc6 a3=0 items=0 ppid=2366 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 key=(null) Feb 12 20:24:21.956000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:24:22.023494 env[1651]: time="2024-02-12T20:24:22.023230186Z" level=info msg="StartContainer for \"ccc3138ea94139585d2c5d0f827530663ede048b728368cadb8ebc3744b21b6c\" returns successfully" Feb 12 20:24:23.116716 systemd[1]: run-containerd-runc-k8s.io-ccc3138ea94139585d2c5d0f827530663ede048b728368cadb8ebc3744b21b6c-runc.KGBFFB.mount: Deactivated successfully. Feb 12 20:24:23.229220 env[1651]: time="2024-02-12T20:24:23.229122516Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:24:23.233598 env[1651]: time="2024-02-12T20:24:23.233525132Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:24:23.237686 env[1651]: time="2024-02-12T20:24:23.237609604Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:24:23.241656 env[1651]: time="2024-02-12T20:24:23.241569949Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:24:23.243911 env[1651]: time="2024-02-12T20:24:23.242893256Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 12 20:24:23.247197 env[1651]: time="2024-02-12T20:24:23.247125101Z" level=info msg="CreateContainer within sandbox \"c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 20:24:23.275993 env[1651]: time="2024-02-12T20:24:23.275911060Z" level=info msg="CreateContainer within sandbox \"c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"06a96101e9c66c22ca1e20145c8c99043d51367898d73d5b00e21e23a03e760b\"" Feb 12 20:24:23.276780 env[1651]: time="2024-02-12T20:24:23.276701629Z" level=info msg="StartContainer for \"06a96101e9c66c22ca1e20145c8c99043d51367898d73d5b00e21e23a03e760b\"" Feb 12 20:24:23.340294 systemd[1]: Started cri-containerd-06a96101e9c66c22ca1e20145c8c99043d51367898d73d5b00e21e23a03e760b.scope. Feb 12 20:24:23.349616 kubelet[2764]: I0212 20:24:23.349544 2764 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-9ccfb758b-r6cvq" podStartSLOduration=31.241872894 podCreationTimestamp="2024-02-12 20:23:48 +0000 UTC" firstStartedPulling="2024-02-12 20:24:17.537250433 +0000 UTC m=+51.122890720" lastFinishedPulling="2024-02-12 20:24:21.644859855 +0000 UTC m=+55.230500154" observedRunningTime="2024-02-12 20:24:22.070668211 +0000 UTC m=+55.656308534" watchObservedRunningTime="2024-02-12 20:24:23.349482328 +0000 UTC m=+56.935122639" Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit[4922]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4776 pid=4922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:23.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036613936313031653963363663323263613165323031343563386339 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit: BPF prog-id=203 op=LOAD Feb 12 20:24:23.403000 audit[4922]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4776 pid=4922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:23.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036613936313031653963363663323263613165323031343563386339 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit: BPF prog-id=204 op=LOAD Feb 12 20:24:23.403000 audit[4922]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4776 pid=4922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:23.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036613936313031653963363663323263613165323031343563386339 Feb 12 20:24:23.403000 audit: BPF prog-id=204 op=UNLOAD Feb 12 20:24:23.403000 audit: BPF prog-id=203 op=UNLOAD Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { perfmon } for pid=4922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit[4922]: AVC avc: denied { bpf } for pid=4922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:23.403000 audit: BPF prog-id=205 op=LOAD Feb 12 20:24:23.403000 audit[4922]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4776 pid=4922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:23.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036613936313031653963363663323263613165323031343563386339 Feb 12 20:24:23.448322 env[1651]: time="2024-02-12T20:24:23.448237192Z" level=info msg="StartContainer for \"06a96101e9c66c22ca1e20145c8c99043d51367898d73d5b00e21e23a03e760b\" returns successfully" Feb 12 20:24:23.450714 env[1651]: time="2024-02-12T20:24:23.450647911Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 20:24:23.725000 audit[2551]: AVC avc: denied { watch } for pid=2551 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:24:23.725000 audit[2551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000f9b200 a2=fc6 a3=0 items=0 ppid=2393 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 key=(null) Feb 12 20:24:23.725000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:24:23.726000 audit[2551]: AVC avc: denied { watch } for pid=2551 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:24:23.726000 audit[2551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400183c8e0 a2=fc6 a3=0 items=0 ppid=2393 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 key=(null) Feb 12 20:24:23.726000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:24:25.251823 env[1651]: time="2024-02-12T20:24:25.251749945Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:24:25.254716 env[1651]: time="2024-02-12T20:24:25.254655975Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:24:25.257692 env[1651]: time="2024-02-12T20:24:25.257644900Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:24:25.261727 env[1651]: time="2024-02-12T20:24:25.261657014Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:24:25.263140 env[1651]: time="2024-02-12T20:24:25.263079237Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 12 20:24:25.269776 env[1651]: time="2024-02-12T20:24:25.269326055Z" level=info msg="CreateContainer within sandbox \"c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 20:24:25.297525 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2551769651.mount: Deactivated successfully. Feb 12 20:24:25.299885 env[1651]: time="2024-02-12T20:24:25.299787754Z" level=info msg="CreateContainer within sandbox \"c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"ce55e191497eaad10bf699514b234bc799cc13ad2b40438e409abdfdc3a81374\"" Feb 12 20:24:25.304220 env[1651]: time="2024-02-12T20:24:25.304161691Z" level=info msg="StartContainer for \"ce55e191497eaad10bf699514b234bc799cc13ad2b40438e409abdfdc3a81374\"" Feb 12 20:24:25.365168 systemd[1]: Started cri-containerd-ce55e191497eaad10bf699514b234bc799cc13ad2b40438e409abdfdc3a81374.scope. Feb 12 20:24:25.404000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.404000 audit[4966]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4776 pid=4966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:25.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365353565313931343937656161643130626636393935313462323334 Feb 12 20:24:25.405000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.405000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.405000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.405000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.405000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.405000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.405000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.405000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.405000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.405000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.405000 audit: BPF prog-id=206 op=LOAD Feb 12 20:24:25.405000 audit[4966]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4776 pid=4966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:25.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365353565313931343937656161643130626636393935313462323334 Feb 12 20:24:25.406000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.406000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.406000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.406000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.406000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.406000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.406000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.406000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.406000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.406000 audit: BPF prog-id=207 op=LOAD Feb 12 20:24:25.406000 audit[4966]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4776 pid=4966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:25.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365353565313931343937656161643130626636393935313462323334 Feb 12 20:24:25.408000 audit: BPF prog-id=207 op=UNLOAD Feb 12 20:24:25.408000 audit: BPF prog-id=206 op=UNLOAD Feb 12 20:24:25.408000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.408000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.408000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.408000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.408000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.408000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.408000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.408000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.408000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.408000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:25.408000 audit: BPF prog-id=208 op=LOAD Feb 12 20:24:25.408000 audit[4966]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4776 pid=4966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:25.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365353565313931343937656161643130626636393935313462323334 Feb 12 20:24:25.442620 env[1651]: time="2024-02-12T20:24:25.442539330Z" level=info msg="StartContainer for \"ce55e191497eaad10bf699514b234bc799cc13ad2b40438e409abdfdc3a81374\" returns successfully" Feb 12 20:24:25.919359 kubelet[2764]: I0212 20:24:25.919326 2764 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 20:24:25.920095 kubelet[2764]: I0212 20:24:25.920043 2764 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 20:24:26.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.19.54:22-147.75.109.163:55488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:26.025753 systemd[1]: Started sshd@8-172.31.19.54:22-147.75.109.163:55488.service. Feb 12 20:24:26.080917 kubelet[2764]: I0212 20:24:26.080861 2764 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-5zxnw" podStartSLOduration=34.391949001 podCreationTimestamp="2024-02-12 20:23:46 +0000 UTC" firstStartedPulling="2024-02-12 20:24:19.575498337 +0000 UTC m=+53.161138660" lastFinishedPulling="2024-02-12 20:24:25.264328517 +0000 UTC m=+58.849968816" observedRunningTime="2024-02-12 20:24:26.076176345 +0000 UTC m=+59.661816668" watchObservedRunningTime="2024-02-12 20:24:26.080779157 +0000 UTC m=+59.666419468" Feb 12 20:24:26.205000 audit[4996]: USER_ACCT pid=4996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:26.206677 sshd[4996]: Accepted publickey for core from 147.75.109.163 port 55488 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:24:26.207000 audit[4996]: CRED_ACQ pid=4996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:26.207000 audit[4996]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeeea5650 a2=3 a3=1 items=0 ppid=1 pid=4996 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:26.207000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:24:26.210090 sshd[4996]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:24:26.220103 systemd-logind[1628]: New session 9 of user core. Feb 12 20:24:26.220198 systemd[1]: Started session-9.scope. Feb 12 20:24:26.230000 audit[4996]: USER_START pid=4996 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:26.233000 audit[4998]: CRED_ACQ pid=4998 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:26.491178 sshd[4996]: pam_unix(sshd:session): session closed for user core Feb 12 20:24:26.492000 audit[4996]: USER_END pid=4996 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:26.492000 audit[4996]: CRED_DISP pid=4996 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:26.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.19.54:22-147.75.109.163:55488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:26.496756 systemd[1]: sshd@8-172.31.19.54:22-147.75.109.163:55488.service: Deactivated successfully. Feb 12 20:24:26.498175 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 20:24:26.499961 systemd-logind[1628]: Session 9 logged out. Waiting for processes to exit. Feb 12 20:24:26.501800 systemd-logind[1628]: Removed session 9. Feb 12 20:24:26.661593 env[1651]: time="2024-02-12T20:24:26.661255306Z" level=info msg="StopPodSandbox for \"c58440028da8acd960ef479ff1461cdd2810ff56083f5f6d722ac96d0075a00c\"" Feb 12 20:24:26.661593 env[1651]: time="2024-02-12T20:24:26.661425165Z" level=info msg="TearDown network for sandbox \"c58440028da8acd960ef479ff1461cdd2810ff56083f5f6d722ac96d0075a00c\" successfully" Feb 12 20:24:26.661593 env[1651]: time="2024-02-12T20:24:26.661482525Z" level=info msg="StopPodSandbox for \"c58440028da8acd960ef479ff1461cdd2810ff56083f5f6d722ac96d0075a00c\" returns successfully" Feb 12 20:24:26.662728 env[1651]: time="2024-02-12T20:24:26.662663165Z" level=info msg="RemovePodSandbox for \"c58440028da8acd960ef479ff1461cdd2810ff56083f5f6d722ac96d0075a00c\"" Feb 12 20:24:26.662862 env[1651]: time="2024-02-12T20:24:26.662726069Z" level=info msg="Forcibly stopping sandbox \"c58440028da8acd960ef479ff1461cdd2810ff56083f5f6d722ac96d0075a00c\"" Feb 12 20:24:26.662926 env[1651]: time="2024-02-12T20:24:26.662863960Z" level=info msg="TearDown network for sandbox \"c58440028da8acd960ef479ff1461cdd2810ff56083f5f6d722ac96d0075a00c\" successfully" Feb 12 20:24:26.668051 env[1651]: time="2024-02-12T20:24:26.667967723Z" level=info msg="RemovePodSandbox \"c58440028da8acd960ef479ff1461cdd2810ff56083f5f6d722ac96d0075a00c\" returns successfully" Feb 12 20:24:26.668975 env[1651]: time="2024-02-12T20:24:26.668919499Z" level=info msg="StopPodSandbox for \"52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9\"" Feb 12 20:24:26.804898 env[1651]: 2024-02-12 20:24:26.740 [WARNING][5021] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--54-k8s-calico--kube--controllers--9ccfb758b--r6cvq-eth0", GenerateName:"calico-kube-controllers-9ccfb758b-", Namespace:"calico-system", SelfLink:"", UID:"3bf4fa95-1a58-409e-8327-5b2781c83bb2", ResourceVersion:"922", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 23, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"9ccfb758b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-54", ContainerID:"e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8", Pod:"calico-kube-controllers-9ccfb758b-r6cvq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.38.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calibd7cd7c968c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:24:26.804898 env[1651]: 2024-02-12 20:24:26.740 [INFO][5021] k8s.go 578: Cleaning up netns ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" Feb 12 20:24:26.804898 env[1651]: 2024-02-12 20:24:26.740 [INFO][5021] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" iface="eth0" netns="" Feb 12 20:24:26.804898 env[1651]: 2024-02-12 20:24:26.740 [INFO][5021] k8s.go 585: Releasing IP address(es) ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" Feb 12 20:24:26.804898 env[1651]: 2024-02-12 20:24:26.740 [INFO][5021] utils.go 188: Calico CNI releasing IP address ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" Feb 12 20:24:26.804898 env[1651]: 2024-02-12 20:24:26.776 [INFO][5029] ipam_plugin.go 415: Releasing address using handleID ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" HandleID="k8s-pod-network.52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" Workload="ip--172--31--19--54-k8s-calico--kube--controllers--9ccfb758b--r6cvq-eth0" Feb 12 20:24:26.804898 env[1651]: 2024-02-12 20:24:26.776 [INFO][5029] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:24:26.804898 env[1651]: 2024-02-12 20:24:26.776 [INFO][5029] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:24:26.804898 env[1651]: 2024-02-12 20:24:26.794 [WARNING][5029] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" HandleID="k8s-pod-network.52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" Workload="ip--172--31--19--54-k8s-calico--kube--controllers--9ccfb758b--r6cvq-eth0" Feb 12 20:24:26.804898 env[1651]: 2024-02-12 20:24:26.794 [INFO][5029] ipam_plugin.go 443: Releasing address using workloadID ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" HandleID="k8s-pod-network.52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" Workload="ip--172--31--19--54-k8s-calico--kube--controllers--9ccfb758b--r6cvq-eth0" Feb 12 20:24:26.804898 env[1651]: 2024-02-12 20:24:26.798 [INFO][5029] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:24:26.804898 env[1651]: 2024-02-12 20:24:26.801 [INFO][5021] k8s.go 591: Teardown processing complete. ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" Feb 12 20:24:26.805926 env[1651]: time="2024-02-12T20:24:26.805875973Z" level=info msg="TearDown network for sandbox \"52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9\" successfully" Feb 12 20:24:26.806219 env[1651]: time="2024-02-12T20:24:26.806091516Z" level=info msg="StopPodSandbox for \"52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9\" returns successfully" Feb 12 20:24:26.806984 env[1651]: time="2024-02-12T20:24:26.806942469Z" level=info msg="RemovePodSandbox for \"52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9\"" Feb 12 20:24:26.807464 env[1651]: time="2024-02-12T20:24:26.807384488Z" level=info msg="Forcibly stopping sandbox \"52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9\"" Feb 12 20:24:26.957496 env[1651]: 2024-02-12 20:24:26.873 [WARNING][5048] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--54-k8s-calico--kube--controllers--9ccfb758b--r6cvq-eth0", GenerateName:"calico-kube-controllers-9ccfb758b-", Namespace:"calico-system", SelfLink:"", UID:"3bf4fa95-1a58-409e-8327-5b2781c83bb2", ResourceVersion:"922", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 23, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"9ccfb758b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-54", ContainerID:"e477c04ae0f010326b6e4448894474af44b84b6860b752cca813df0249139ca8", Pod:"calico-kube-controllers-9ccfb758b-r6cvq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.38.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calibd7cd7c968c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:24:26.957496 env[1651]: 2024-02-12 20:24:26.874 [INFO][5048] k8s.go 578: Cleaning up netns ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" Feb 12 20:24:26.957496 env[1651]: 2024-02-12 20:24:26.874 [INFO][5048] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" iface="eth0" netns="" Feb 12 20:24:26.957496 env[1651]: 2024-02-12 20:24:26.874 [INFO][5048] k8s.go 585: Releasing IP address(es) ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" Feb 12 20:24:26.957496 env[1651]: 2024-02-12 20:24:26.874 [INFO][5048] utils.go 188: Calico CNI releasing IP address ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" Feb 12 20:24:26.957496 env[1651]: 2024-02-12 20:24:26.934 [INFO][5054] ipam_plugin.go 415: Releasing address using handleID ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" HandleID="k8s-pod-network.52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" Workload="ip--172--31--19--54-k8s-calico--kube--controllers--9ccfb758b--r6cvq-eth0" Feb 12 20:24:26.957496 env[1651]: 2024-02-12 20:24:26.934 [INFO][5054] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:24:26.957496 env[1651]: 2024-02-12 20:24:26.935 [INFO][5054] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:24:26.957496 env[1651]: 2024-02-12 20:24:26.949 [WARNING][5054] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" HandleID="k8s-pod-network.52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" Workload="ip--172--31--19--54-k8s-calico--kube--controllers--9ccfb758b--r6cvq-eth0" Feb 12 20:24:26.957496 env[1651]: 2024-02-12 20:24:26.949 [INFO][5054] ipam_plugin.go 443: Releasing address using workloadID ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" HandleID="k8s-pod-network.52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" Workload="ip--172--31--19--54-k8s-calico--kube--controllers--9ccfb758b--r6cvq-eth0" Feb 12 20:24:26.957496 env[1651]: 2024-02-12 20:24:26.952 [INFO][5054] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:24:26.957496 env[1651]: 2024-02-12 20:24:26.955 [INFO][5048] k8s.go 591: Teardown processing complete. ContainerID="52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9" Feb 12 20:24:26.958681 env[1651]: time="2024-02-12T20:24:26.958412064Z" level=info msg="TearDown network for sandbox \"52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9\" successfully" Feb 12 20:24:26.963037 env[1651]: time="2024-02-12T20:24:26.962977952Z" level=info msg="RemovePodSandbox \"52e3dd1aeddd335d4bc33f828696ffeb5c79ae21355be5358ad56b00b0a5bfc9\" returns successfully" Feb 12 20:24:26.963978 env[1651]: time="2024-02-12T20:24:26.963929045Z" level=info msg="StopPodSandbox for \"908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a\"" Feb 12 20:24:27.095728 env[1651]: 2024-02-12 20:24:27.030 [WARNING][5073] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--54-k8s-coredns--5d78c9869d--lflqt-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"529d2533-9be6-4e17-93dc-7cf74f8ca7c5", ResourceVersion:"851", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 23, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-54", ContainerID:"555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900", Pod:"coredns-5d78c9869d-lflqt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie77aeff95bb", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:24:27.095728 env[1651]: 2024-02-12 20:24:27.031 [INFO][5073] k8s.go 578: Cleaning up netns ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" Feb 12 20:24:27.095728 env[1651]: 2024-02-12 20:24:27.031 [INFO][5073] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" iface="eth0" netns="" Feb 12 20:24:27.095728 env[1651]: 2024-02-12 20:24:27.031 [INFO][5073] k8s.go 585: Releasing IP address(es) ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" Feb 12 20:24:27.095728 env[1651]: 2024-02-12 20:24:27.031 [INFO][5073] utils.go 188: Calico CNI releasing IP address ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" Feb 12 20:24:27.095728 env[1651]: 2024-02-12 20:24:27.071 [INFO][5079] ipam_plugin.go 415: Releasing address using handleID ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" HandleID="k8s-pod-network.908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" Workload="ip--172--31--19--54-k8s-coredns--5d78c9869d--lflqt-eth0" Feb 12 20:24:27.095728 env[1651]: 2024-02-12 20:24:27.072 [INFO][5079] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:24:27.095728 env[1651]: 2024-02-12 20:24:27.072 [INFO][5079] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:24:27.095728 env[1651]: 2024-02-12 20:24:27.087 [WARNING][5079] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" HandleID="k8s-pod-network.908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" Workload="ip--172--31--19--54-k8s-coredns--5d78c9869d--lflqt-eth0" Feb 12 20:24:27.095728 env[1651]: 2024-02-12 20:24:27.087 [INFO][5079] ipam_plugin.go 443: Releasing address using workloadID ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" HandleID="k8s-pod-network.908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" Workload="ip--172--31--19--54-k8s-coredns--5d78c9869d--lflqt-eth0" Feb 12 20:24:27.095728 env[1651]: 2024-02-12 20:24:27.090 [INFO][5079] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:24:27.095728 env[1651]: 2024-02-12 20:24:27.093 [INFO][5073] k8s.go 591: Teardown processing complete. ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" Feb 12 20:24:27.096868 env[1651]: time="2024-02-12T20:24:27.096767562Z" level=info msg="TearDown network for sandbox \"908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a\" successfully" Feb 12 20:24:27.097033 env[1651]: time="2024-02-12T20:24:27.096996329Z" level=info msg="StopPodSandbox for \"908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a\" returns successfully" Feb 12 20:24:27.098200 env[1651]: time="2024-02-12T20:24:27.098134741Z" level=info msg="RemovePodSandbox for \"908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a\"" Feb 12 20:24:27.098395 env[1651]: time="2024-02-12T20:24:27.098199385Z" level=info msg="Forcibly stopping sandbox \"908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a\"" Feb 12 20:24:27.219908 kernel: kauditd_printk_skb: 156 callbacks suppressed Feb 12 20:24:27.220069 kernel: audit: type=1400 audit(1707769467.203:1465): avc: denied { watch } for pid=2551 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:24:27.203000 audit[2551]: AVC avc: denied { watch } for pid=2551 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:24:27.203000 audit[2551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000b981e0 a2=fc6 a3=0 items=0 ppid=2393 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 key=(null) Feb 12 20:24:27.233933 kernel: audit: type=1300 audit(1707769467.203:1465): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000b981e0 a2=fc6 a3=0 items=0 ppid=2393 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 key=(null) Feb 12 20:24:27.203000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:24:27.246637 kernel: audit: type=1327 audit(1707769467.203:1465): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:24:27.216000 audit[2551]: AVC avc: denied { watch } for pid=2551 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:24:27.256623 kernel: audit: type=1400 audit(1707769467.216:1466): avc: denied { watch } for pid=2551 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:24:27.216000 audit[2551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400183dae0 a2=fc6 a3=0 items=0 ppid=2393 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 key=(null) Feb 12 20:24:27.269725 kernel: audit: type=1300 audit(1707769467.216:1466): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400183dae0 a2=fc6 a3=0 items=0 ppid=2393 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 key=(null) Feb 12 20:24:27.216000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:24:27.280640 kernel: audit: type=1327 audit(1707769467.216:1466): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:24:27.217000 audit[2551]: AVC avc: denied { watch } for pid=2551 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:24:27.290607 kernel: audit: type=1400 audit(1707769467.217:1467): avc: denied { watch } for pid=2551 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:24:27.217000 audit[2551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400183dc00 a2=fc6 a3=0 items=0 ppid=2393 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 key=(null) Feb 12 20:24:27.295140 env[1651]: 2024-02-12 20:24:27.165 [WARNING][5097] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--54-k8s-coredns--5d78c9869d--lflqt-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"529d2533-9be6-4e17-93dc-7cf74f8ca7c5", ResourceVersion:"851", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 23, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-54", ContainerID:"555c0bf8556adc7b9fedbbfb2db577ec79fb7a50c7b04143d13655b81c331900", Pod:"coredns-5d78c9869d-lflqt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie77aeff95bb", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:24:27.295140 env[1651]: 2024-02-12 20:24:27.165 [INFO][5097] k8s.go 578: Cleaning up netns ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" Feb 12 20:24:27.295140 env[1651]: 2024-02-12 20:24:27.165 [INFO][5097] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" iface="eth0" netns="" Feb 12 20:24:27.295140 env[1651]: 2024-02-12 20:24:27.165 [INFO][5097] k8s.go 585: Releasing IP address(es) ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" Feb 12 20:24:27.295140 env[1651]: 2024-02-12 20:24:27.165 [INFO][5097] utils.go 188: Calico CNI releasing IP address ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" Feb 12 20:24:27.295140 env[1651]: 2024-02-12 20:24:27.204 [INFO][5103] ipam_plugin.go 415: Releasing address using handleID ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" HandleID="k8s-pod-network.908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" Workload="ip--172--31--19--54-k8s-coredns--5d78c9869d--lflqt-eth0" Feb 12 20:24:27.295140 env[1651]: 2024-02-12 20:24:27.204 [INFO][5103] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:24:27.295140 env[1651]: 2024-02-12 20:24:27.205 [INFO][5103] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:24:27.295140 env[1651]: 2024-02-12 20:24:27.257 [WARNING][5103] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" HandleID="k8s-pod-network.908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" Workload="ip--172--31--19--54-k8s-coredns--5d78c9869d--lflqt-eth0" Feb 12 20:24:27.295140 env[1651]: 2024-02-12 20:24:27.257 [INFO][5103] ipam_plugin.go 443: Releasing address using workloadID ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" HandleID="k8s-pod-network.908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" Workload="ip--172--31--19--54-k8s-coredns--5d78c9869d--lflqt-eth0" Feb 12 20:24:27.295140 env[1651]: 2024-02-12 20:24:27.281 [INFO][5103] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:24:27.295140 env[1651]: 2024-02-12 20:24:27.292 [INFO][5097] k8s.go 591: Teardown processing complete. ContainerID="908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a" Feb 12 20:24:27.296398 env[1651]: time="2024-02-12T20:24:27.296345093Z" level=info msg="TearDown network for sandbox \"908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a\" successfully" Feb 12 20:24:27.301652 env[1651]: time="2024-02-12T20:24:27.301582679Z" level=info msg="RemovePodSandbox \"908fe7418d2fada82c4550dea48ab600f944fa563c43b940299c6027decc786a\" returns successfully" Feb 12 20:24:27.306979 env[1651]: time="2024-02-12T20:24:27.306913217Z" level=info msg="StopPodSandbox for \"0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70\"" Feb 12 20:24:27.217000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:24:27.318012 kernel: audit: type=1300 audit(1707769467.217:1467): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400183dc00 a2=fc6 a3=0 items=0 ppid=2393 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 key=(null) Feb 12 20:24:27.318170 kernel: audit: type=1327 audit(1707769467.217:1467): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:24:27.318239 kernel: audit: type=1400 audit(1707769467.217:1468): avc: denied { watch } for pid=2551 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:24:27.217000 audit[2551]: AVC avc: denied { watch } for pid=2551 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:24:27.217000 audit[2551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400183dc20 a2=fc6 a3=0 items=0 ppid=2393 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 key=(null) Feb 12 20:24:27.217000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:24:27.505391 env[1651]: 2024-02-12 20:24:27.446 [WARNING][5123] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--54-k8s-coredns--5d78c9869d--gvfp6-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"e7dca9bc-16b3-45ee-a6c5-b466e91d74f2", ResourceVersion:"842", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 23, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-54", ContainerID:"1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3", Pod:"coredns-5d78c9869d-gvfp6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali21e3df39b7a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:24:27.505391 env[1651]: 2024-02-12 20:24:27.447 [INFO][5123] k8s.go 578: Cleaning up netns ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" Feb 12 20:24:27.505391 env[1651]: 2024-02-12 20:24:27.447 [INFO][5123] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" iface="eth0" netns="" Feb 12 20:24:27.505391 env[1651]: 2024-02-12 20:24:27.447 [INFO][5123] k8s.go 585: Releasing IP address(es) ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" Feb 12 20:24:27.505391 env[1651]: 2024-02-12 20:24:27.447 [INFO][5123] utils.go 188: Calico CNI releasing IP address ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" Feb 12 20:24:27.505391 env[1651]: 2024-02-12 20:24:27.483 [INFO][5135] ipam_plugin.go 415: Releasing address using handleID ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" HandleID="k8s-pod-network.0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" Workload="ip--172--31--19--54-k8s-coredns--5d78c9869d--gvfp6-eth0" Feb 12 20:24:27.505391 env[1651]: 2024-02-12 20:24:27.483 [INFO][5135] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:24:27.505391 env[1651]: 2024-02-12 20:24:27.483 [INFO][5135] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:24:27.505391 env[1651]: 2024-02-12 20:24:27.497 [WARNING][5135] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" HandleID="k8s-pod-network.0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" Workload="ip--172--31--19--54-k8s-coredns--5d78c9869d--gvfp6-eth0" Feb 12 20:24:27.505391 env[1651]: 2024-02-12 20:24:27.497 [INFO][5135] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" HandleID="k8s-pod-network.0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" Workload="ip--172--31--19--54-k8s-coredns--5d78c9869d--gvfp6-eth0" Feb 12 20:24:27.505391 env[1651]: 2024-02-12 20:24:27.500 [INFO][5135] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:24:27.505391 env[1651]: 2024-02-12 20:24:27.502 [INFO][5123] k8s.go 591: Teardown processing complete. ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" Feb 12 20:24:27.506609 env[1651]: time="2024-02-12T20:24:27.506499472Z" level=info msg="TearDown network for sandbox \"0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70\" successfully" Feb 12 20:24:27.506609 env[1651]: time="2024-02-12T20:24:27.506598700Z" level=info msg="StopPodSandbox for \"0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70\" returns successfully" Feb 12 20:24:27.507794 env[1651]: time="2024-02-12T20:24:27.507728160Z" level=info msg="RemovePodSandbox for \"0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70\"" Feb 12 20:24:27.507947 env[1651]: time="2024-02-12T20:24:27.507792324Z" level=info msg="Forcibly stopping sandbox \"0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70\"" Feb 12 20:24:27.628832 env[1651]: 2024-02-12 20:24:27.572 [WARNING][5154] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--54-k8s-coredns--5d78c9869d--gvfp6-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"e7dca9bc-16b3-45ee-a6c5-b466e91d74f2", ResourceVersion:"842", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 23, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-54", ContainerID:"1efdf938645b2857e1a4ad208f52a232a7a959d0bcab8a5bec7f42a4cc09d1b3", Pod:"coredns-5d78c9869d-gvfp6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali21e3df39b7a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:24:27.628832 env[1651]: 2024-02-12 20:24:27.572 [INFO][5154] k8s.go 578: Cleaning up netns ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" Feb 12 20:24:27.628832 env[1651]: 2024-02-12 20:24:27.572 [INFO][5154] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" iface="eth0" netns="" Feb 12 20:24:27.628832 env[1651]: 2024-02-12 20:24:27.572 [INFO][5154] k8s.go 585: Releasing IP address(es) ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" Feb 12 20:24:27.628832 env[1651]: 2024-02-12 20:24:27.573 [INFO][5154] utils.go 188: Calico CNI releasing IP address ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" Feb 12 20:24:27.628832 env[1651]: 2024-02-12 20:24:27.606 [INFO][5160] ipam_plugin.go 415: Releasing address using handleID ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" HandleID="k8s-pod-network.0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" Workload="ip--172--31--19--54-k8s-coredns--5d78c9869d--gvfp6-eth0" Feb 12 20:24:27.628832 env[1651]: 2024-02-12 20:24:27.606 [INFO][5160] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:24:27.628832 env[1651]: 2024-02-12 20:24:27.606 [INFO][5160] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:24:27.628832 env[1651]: 2024-02-12 20:24:27.621 [WARNING][5160] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" HandleID="k8s-pod-network.0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" Workload="ip--172--31--19--54-k8s-coredns--5d78c9869d--gvfp6-eth0" Feb 12 20:24:27.628832 env[1651]: 2024-02-12 20:24:27.621 [INFO][5160] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" HandleID="k8s-pod-network.0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" Workload="ip--172--31--19--54-k8s-coredns--5d78c9869d--gvfp6-eth0" Feb 12 20:24:27.628832 env[1651]: 2024-02-12 20:24:27.624 [INFO][5160] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:24:27.628832 env[1651]: 2024-02-12 20:24:27.626 [INFO][5154] k8s.go 591: Teardown processing complete. ContainerID="0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70" Feb 12 20:24:27.629800 env[1651]: time="2024-02-12T20:24:27.628881419Z" level=info msg="TearDown network for sandbox \"0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70\" successfully" Feb 12 20:24:27.634065 env[1651]: time="2024-02-12T20:24:27.633985638Z" level=info msg="RemovePodSandbox \"0a04e232694f7671dc0f9310841150de9b896be5c9070d6b526ee54e63770b70\" returns successfully" Feb 12 20:24:27.634814 env[1651]: time="2024-02-12T20:24:27.634768575Z" level=info msg="StopPodSandbox for \"e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb\"" Feb 12 20:24:27.777835 env[1651]: 2024-02-12 20:24:27.714 [WARNING][5178] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--54-k8s-csi--node--driver--5zxnw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"813164be-67aa-473b-b98f-ae32d6883ffe", ResourceVersion:"952", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 23, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-54", ContainerID:"c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69", Pod:"csi-node-driver-5zxnw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.38.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9855e0dc949", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:24:27.777835 env[1651]: 2024-02-12 20:24:27.714 [INFO][5178] k8s.go 578: Cleaning up netns ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" Feb 12 20:24:27.777835 env[1651]: 2024-02-12 20:24:27.714 [INFO][5178] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" iface="eth0" netns="" Feb 12 20:24:27.777835 env[1651]: 2024-02-12 20:24:27.714 [INFO][5178] k8s.go 585: Releasing IP address(es) ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" Feb 12 20:24:27.777835 env[1651]: 2024-02-12 20:24:27.715 [INFO][5178] utils.go 188: Calico CNI releasing IP address ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" Feb 12 20:24:27.777835 env[1651]: 2024-02-12 20:24:27.749 [INFO][5184] ipam_plugin.go 415: Releasing address using handleID ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" HandleID="k8s-pod-network.e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" Workload="ip--172--31--19--54-k8s-csi--node--driver--5zxnw-eth0" Feb 12 20:24:27.777835 env[1651]: 2024-02-12 20:24:27.750 [INFO][5184] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:24:27.777835 env[1651]: 2024-02-12 20:24:27.750 [INFO][5184] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:24:27.777835 env[1651]: 2024-02-12 20:24:27.767 [WARNING][5184] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" HandleID="k8s-pod-network.e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" Workload="ip--172--31--19--54-k8s-csi--node--driver--5zxnw-eth0" Feb 12 20:24:27.777835 env[1651]: 2024-02-12 20:24:27.767 [INFO][5184] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" HandleID="k8s-pod-network.e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" Workload="ip--172--31--19--54-k8s-csi--node--driver--5zxnw-eth0" Feb 12 20:24:27.777835 env[1651]: 2024-02-12 20:24:27.771 [INFO][5184] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:24:27.777835 env[1651]: 2024-02-12 20:24:27.773 [INFO][5178] k8s.go 591: Teardown processing complete. ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" Feb 12 20:24:27.779352 env[1651]: time="2024-02-12T20:24:27.779219120Z" level=info msg="TearDown network for sandbox \"e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb\" successfully" Feb 12 20:24:27.779511 env[1651]: time="2024-02-12T20:24:27.779476231Z" level=info msg="StopPodSandbox for \"e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb\" returns successfully" Feb 12 20:24:27.780452 env[1651]: time="2024-02-12T20:24:27.780346540Z" level=info msg="RemovePodSandbox for \"e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb\"" Feb 12 20:24:27.780600 env[1651]: time="2024-02-12T20:24:27.780496960Z" level=info msg="Forcibly stopping sandbox \"e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb\"" Feb 12 20:24:27.897812 env[1651]: 2024-02-12 20:24:27.841 [WARNING][5204] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--54-k8s-csi--node--driver--5zxnw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"813164be-67aa-473b-b98f-ae32d6883ffe", ResourceVersion:"952", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 23, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-54", ContainerID:"c35d21853f17f3100c8dcf9263dfea06e27092297446a354f50af5d12bf1ea69", Pod:"csi-node-driver-5zxnw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.38.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9855e0dc949", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:24:27.897812 env[1651]: 2024-02-12 20:24:27.841 [INFO][5204] k8s.go 578: Cleaning up netns ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" Feb 12 20:24:27.897812 env[1651]: 2024-02-12 20:24:27.841 [INFO][5204] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" iface="eth0" netns="" Feb 12 20:24:27.897812 env[1651]: 2024-02-12 20:24:27.841 [INFO][5204] k8s.go 585: Releasing IP address(es) ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" Feb 12 20:24:27.897812 env[1651]: 2024-02-12 20:24:27.841 [INFO][5204] utils.go 188: Calico CNI releasing IP address ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" Feb 12 20:24:27.897812 env[1651]: 2024-02-12 20:24:27.876 [INFO][5211] ipam_plugin.go 415: Releasing address using handleID ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" HandleID="k8s-pod-network.e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" Workload="ip--172--31--19--54-k8s-csi--node--driver--5zxnw-eth0" Feb 12 20:24:27.897812 env[1651]: 2024-02-12 20:24:27.877 [INFO][5211] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:24:27.897812 env[1651]: 2024-02-12 20:24:27.877 [INFO][5211] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:24:27.897812 env[1651]: 2024-02-12 20:24:27.890 [WARNING][5211] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" HandleID="k8s-pod-network.e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" Workload="ip--172--31--19--54-k8s-csi--node--driver--5zxnw-eth0" Feb 12 20:24:27.897812 env[1651]: 2024-02-12 20:24:27.890 [INFO][5211] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" HandleID="k8s-pod-network.e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" Workload="ip--172--31--19--54-k8s-csi--node--driver--5zxnw-eth0" Feb 12 20:24:27.897812 env[1651]: 2024-02-12 20:24:27.893 [INFO][5211] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:24:27.897812 env[1651]: 2024-02-12 20:24:27.895 [INFO][5204] k8s.go 591: Teardown processing complete. ContainerID="e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb" Feb 12 20:24:27.899354 env[1651]: time="2024-02-12T20:24:27.897861088Z" level=info msg="TearDown network for sandbox \"e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb\" successfully" Feb 12 20:24:27.903038 env[1651]: time="2024-02-12T20:24:27.902938667Z" level=info msg="RemovePodSandbox \"e0ee12182c4dbcde864097fcb6cd804f647618a44daf9fc4d0891cdf9ee0a0bb\" returns successfully" Feb 12 20:24:27.903778 env[1651]: time="2024-02-12T20:24:27.903710768Z" level=info msg="StopPodSandbox for \"0e54f84a267d48a60a0ae84372c4383ad66e136d2f7ef35d84938086fbfaeefb\"" Feb 12 20:24:27.903941 env[1651]: time="2024-02-12T20:24:27.903869432Z" level=info msg="TearDown network for sandbox \"0e54f84a267d48a60a0ae84372c4383ad66e136d2f7ef35d84938086fbfaeefb\" successfully" Feb 12 20:24:27.904021 env[1651]: time="2024-02-12T20:24:27.903942956Z" level=info msg="StopPodSandbox for \"0e54f84a267d48a60a0ae84372c4383ad66e136d2f7ef35d84938086fbfaeefb\" returns successfully" Feb 12 20:24:27.904704 env[1651]: time="2024-02-12T20:24:27.904655657Z" level=info msg="RemovePodSandbox for \"0e54f84a267d48a60a0ae84372c4383ad66e136d2f7ef35d84938086fbfaeefb\"" Feb 12 20:24:27.904826 env[1651]: time="2024-02-12T20:24:27.904713617Z" level=info msg="Forcibly stopping sandbox \"0e54f84a267d48a60a0ae84372c4383ad66e136d2f7ef35d84938086fbfaeefb\"" Feb 12 20:24:27.904888 env[1651]: time="2024-02-12T20:24:27.904853033Z" level=info msg="TearDown network for sandbox \"0e54f84a267d48a60a0ae84372c4383ad66e136d2f7ef35d84938086fbfaeefb\" successfully" Feb 12 20:24:27.909989 env[1651]: time="2024-02-12T20:24:27.909918455Z" level=info msg="RemovePodSandbox \"0e54f84a267d48a60a0ae84372c4383ad66e136d2f7ef35d84938086fbfaeefb\" returns successfully" Feb 12 20:24:30.326625 systemd[1]: run-containerd-runc-k8s.io-d7c96b36e6a4155fa6e2100fc40341a23845f6e27687d94cd4634d1d6a120475-runc.gkfFkL.mount: Deactivated successfully. Feb 12 20:24:31.521839 systemd[1]: Started sshd@9-172.31.19.54:22-147.75.109.163:55504.service. Feb 12 20:24:31.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.19.54:22-147.75.109.163:55504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:31.699809 sshd[5240]: Accepted publickey for core from 147.75.109.163 port 55504 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:24:31.698000 audit[5240]: USER_ACCT pid=5240 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:31.701000 audit[5240]: CRED_ACQ pid=5240 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:31.701000 audit[5240]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe541a830 a2=3 a3=1 items=0 ppid=1 pid=5240 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:31.701000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:24:31.705147 sshd[5240]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:24:31.714616 systemd[1]: Started session-10.scope. Feb 12 20:24:31.715918 systemd-logind[1628]: New session 10 of user core. Feb 12 20:24:31.725000 audit[5240]: USER_START pid=5240 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:31.728000 audit[5242]: CRED_ACQ pid=5242 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:31.977333 sshd[5240]: pam_unix(sshd:session): session closed for user core Feb 12 20:24:31.978000 audit[5240]: USER_END pid=5240 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:31.978000 audit[5240]: CRED_DISP pid=5240 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:31.983203 systemd-logind[1628]: Session 10 logged out. Waiting for processes to exit. Feb 12 20:24:31.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.19.54:22-147.75.109.163:55504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:31.984000 systemd[1]: sshd@9-172.31.19.54:22-147.75.109.163:55504.service: Deactivated successfully. Feb 12 20:24:31.985432 systemd[1]: session-10.scope: Deactivated successfully. Feb 12 20:24:31.988508 systemd-logind[1628]: Removed session 10. Feb 12 20:24:32.006891 systemd[1]: Started sshd@10-172.31.19.54:22-147.75.109.163:55512.service. Feb 12 20:24:32.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.19.54:22-147.75.109.163:55512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:32.184000 audit[5253]: USER_ACCT pid=5253 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:32.185834 sshd[5253]: Accepted publickey for core from 147.75.109.163 port 55512 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:24:32.186000 audit[5253]: CRED_ACQ pid=5253 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:32.186000 audit[5253]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd2885920 a2=3 a3=1 items=0 ppid=1 pid=5253 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:32.186000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:24:32.189325 sshd[5253]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:24:32.198418 systemd-logind[1628]: New session 11 of user core. Feb 12 20:24:32.199464 systemd[1]: Started session-11.scope. Feb 12 20:24:32.210000 audit[5253]: USER_START pid=5253 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:32.213832 kernel: kauditd_printk_skb: 19 callbacks suppressed Feb 12 20:24:32.213917 kernel: audit: type=1105 audit(1707769472.210:1482): pid=5253 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:32.217000 audit[5255]: CRED_ACQ pid=5255 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:32.234375 kernel: audit: type=1103 audit(1707769472.217:1483): pid=5255 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:32.646936 systemd[1]: run-containerd-runc-k8s.io-ccc3138ea94139585d2c5d0f827530663ede048b728368cadb8ebc3744b21b6c-runc.Y4rpLh.mount: Deactivated successfully. Feb 12 20:24:34.346939 sshd[5253]: pam_unix(sshd:session): session closed for user core Feb 12 20:24:34.349000 audit[5253]: USER_END pid=5253 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:34.353288 systemd[1]: session-11.scope: Deactivated successfully. Feb 12 20:24:34.354540 systemd[1]: sshd@10-172.31.19.54:22-147.75.109.163:55512.service: Deactivated successfully. Feb 12 20:24:34.363855 systemd-logind[1628]: Session 11 logged out. Waiting for processes to exit. Feb 12 20:24:34.349000 audit[5253]: CRED_DISP pid=5253 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:34.377893 kernel: audit: type=1106 audit(1707769474.349:1484): pid=5253 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:34.378064 kernel: audit: type=1104 audit(1707769474.349:1485): pid=5253 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:34.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.19.54:22-147.75.109.163:55512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:34.383948 systemd[1]: Started sshd@11-172.31.19.54:22-147.75.109.163:55518.service. Feb 12 20:24:34.389694 kernel: audit: type=1131 audit(1707769474.349:1486): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.19.54:22-147.75.109.163:55512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:34.398697 systemd-logind[1628]: Removed session 11. Feb 12 20:24:34.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.19.54:22-147.75.109.163:55518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:34.412867 kernel: audit: type=1130 audit(1707769474.379:1487): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.19.54:22-147.75.109.163:55518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:34.587653 sshd[5281]: Accepted publickey for core from 147.75.109.163 port 55518 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:24:34.586000 audit[5281]: USER_ACCT pid=5281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:34.599170 sshd[5281]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:24:34.597000 audit[5281]: CRED_ACQ pid=5281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:34.610194 kernel: audit: type=1101 audit(1707769474.586:1488): pid=5281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:34.610397 kernel: audit: type=1103 audit(1707769474.597:1489): pid=5281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:34.618596 kernel: audit: type=1006 audit(1707769474.597:1490): pid=5281 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 12 20:24:34.597000 audit[5281]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff9fc8780 a2=3 a3=1 items=0 ppid=1 pid=5281 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:34.629616 kernel: audit: type=1300 audit(1707769474.597:1490): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff9fc8780 a2=3 a3=1 items=0 ppid=1 pid=5281 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:34.597000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:24:34.634401 systemd-logind[1628]: New session 12 of user core. Feb 12 20:24:34.636731 systemd[1]: Started session-12.scope. Feb 12 20:24:34.650000 audit[5281]: USER_START pid=5281 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:34.656000 audit[5289]: CRED_ACQ pid=5289 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:34.917814 sshd[5281]: pam_unix(sshd:session): session closed for user core Feb 12 20:24:34.919000 audit[5281]: USER_END pid=5281 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:34.919000 audit[5281]: CRED_DISP pid=5281 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:34.924129 systemd[1]: session-12.scope: Deactivated successfully. Feb 12 20:24:34.925531 systemd[1]: sshd@11-172.31.19.54:22-147.75.109.163:55518.service: Deactivated successfully. Feb 12 20:24:34.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.19.54:22-147.75.109.163:55518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:34.927857 systemd-logind[1628]: Session 12 logged out. Waiting for processes to exit. Feb 12 20:24:34.930767 systemd-logind[1628]: Removed session 12. Feb 12 20:24:39.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.19.54:22-147.75.109.163:40492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:39.951537 kernel: kauditd_printk_skb: 6 callbacks suppressed Feb 12 20:24:39.951622 kernel: audit: type=1130 audit(1707769479.948:1496): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.19.54:22-147.75.109.163:40492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:39.949144 systemd[1]: Started sshd@12-172.31.19.54:22-147.75.109.163:40492.service. Feb 12 20:24:40.121000 audit[5301]: USER_ACCT pid=5301 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:40.123167 sshd[5301]: Accepted publickey for core from 147.75.109.163 port 40492 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:24:40.135431 kernel: audit: type=1101 audit(1707769480.121:1497): pid=5301 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:40.135000 audit[5301]: CRED_ACQ pid=5301 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:40.137965 sshd[5301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:24:40.153201 kernel: audit: type=1103 audit(1707769480.135:1498): pid=5301 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:40.153379 kernel: audit: type=1006 audit(1707769480.135:1499): pid=5301 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 12 20:24:40.135000 audit[5301]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffca34eab0 a2=3 a3=1 items=0 ppid=1 pid=5301 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:40.164476 kernel: audit: type=1300 audit(1707769480.135:1499): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffca34eab0 a2=3 a3=1 items=0 ppid=1 pid=5301 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:40.135000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:24:40.168489 kernel: audit: type=1327 audit(1707769480.135:1499): proctitle=737368643A20636F7265205B707269765D Feb 12 20:24:40.174785 systemd-logind[1628]: New session 13 of user core. Feb 12 20:24:40.175840 systemd[1]: Started session-13.scope. Feb 12 20:24:40.186000 audit[5301]: USER_START pid=5301 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:40.190000 audit[5303]: CRED_ACQ pid=5303 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:40.208392 kernel: audit: type=1105 audit(1707769480.186:1500): pid=5301 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:40.208614 kernel: audit: type=1103 audit(1707769480.190:1501): pid=5303 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:40.432772 sshd[5301]: pam_unix(sshd:session): session closed for user core Feb 12 20:24:40.433000 audit[5301]: USER_END pid=5301 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:40.438426 systemd-logind[1628]: Session 13 logged out. Waiting for processes to exit. Feb 12 20:24:40.440929 systemd[1]: session-13.scope: Deactivated successfully. Feb 12 20:24:40.443165 systemd-logind[1628]: Removed session 13. Feb 12 20:24:40.444696 systemd[1]: sshd@12-172.31.19.54:22-147.75.109.163:40492.service: Deactivated successfully. Feb 12 20:24:40.433000 audit[5301]: CRED_DISP pid=5301 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:40.455914 kernel: audit: type=1106 audit(1707769480.433:1502): pid=5301 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:40.456094 kernel: audit: type=1104 audit(1707769480.433:1503): pid=5301 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:40.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.19.54:22-147.75.109.163:40492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:45.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.19.54:22-147.75.109.163:48422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:45.464674 systemd[1]: Started sshd@13-172.31.19.54:22-147.75.109.163:48422.service. Feb 12 20:24:45.467138 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:24:45.467219 kernel: audit: type=1130 audit(1707769485.463:1505): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.19.54:22-147.75.109.163:48422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:45.639000 audit[5320]: USER_ACCT pid=5320 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:45.640865 sshd[5320]: Accepted publickey for core from 147.75.109.163 port 48422 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:24:45.652358 kernel: audit: type=1101 audit(1707769485.639:1506): pid=5320 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:45.651000 audit[5320]: CRED_ACQ pid=5320 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:45.653938 sshd[5320]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:24:45.671372 kernel: audit: type=1103 audit(1707769485.651:1507): pid=5320 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:45.671529 kernel: audit: type=1006 audit(1707769485.651:1508): pid=5320 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 12 20:24:45.651000 audit[5320]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffce6f6e50 a2=3 a3=1 items=0 ppid=1 pid=5320 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:45.682428 kernel: audit: type=1300 audit(1707769485.651:1508): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffce6f6e50 a2=3 a3=1 items=0 ppid=1 pid=5320 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:45.651000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:24:45.686114 kernel: audit: type=1327 audit(1707769485.651:1508): proctitle=737368643A20636F7265205B707269765D Feb 12 20:24:45.689387 systemd-logind[1628]: New session 14 of user core. Feb 12 20:24:45.692545 systemd[1]: Started session-14.scope. Feb 12 20:24:45.701000 audit[5320]: USER_START pid=5320 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:45.704000 audit[5322]: CRED_ACQ pid=5322 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:45.723728 kernel: audit: type=1105 audit(1707769485.701:1509): pid=5320 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:45.723872 kernel: audit: type=1103 audit(1707769485.704:1510): pid=5322 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:45.989329 sshd[5320]: pam_unix(sshd:session): session closed for user core Feb 12 20:24:45.990000 audit[5320]: USER_END pid=5320 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:45.996921 systemd[1]: session-14.scope: Deactivated successfully. Feb 12 20:24:45.998554 systemd[1]: sshd@13-172.31.19.54:22-147.75.109.163:48422.service: Deactivated successfully. Feb 12 20:24:45.993000 audit[5320]: CRED_DISP pid=5320 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:46.004980 systemd-logind[1628]: Session 14 logged out. Waiting for processes to exit. Feb 12 20:24:46.013976 kernel: audit: type=1106 audit(1707769485.990:1511): pid=5320 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:46.014118 kernel: audit: type=1104 audit(1707769485.993:1512): pid=5320 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:45.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.19.54:22-147.75.109.163:48422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:46.016203 systemd-logind[1628]: Removed session 14. Feb 12 20:24:51.020172 systemd[1]: Started sshd@14-172.31.19.54:22-147.75.109.163:48430.service. Feb 12 20:24:51.034208 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:24:51.034367 kernel: audit: type=1130 audit(1707769491.021:1514): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.19.54:22-147.75.109.163:48430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.19.54:22-147.75.109.163:48430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.192000 audit[5333]: USER_ACCT pid=5333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:51.193851 sshd[5333]: Accepted publickey for core from 147.75.109.163 port 48430 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:24:51.204000 audit[5333]: CRED_ACQ pid=5333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:51.206900 sshd[5333]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:24:51.215412 kernel: audit: type=1101 audit(1707769491.192:1515): pid=5333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:51.215568 kernel: audit: type=1103 audit(1707769491.204:1516): pid=5333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:51.221931 kernel: audit: type=1006 audit(1707769491.204:1517): pid=5333 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 12 20:24:51.204000 audit[5333]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffce9b1c0 a2=3 a3=1 items=0 ppid=1 pid=5333 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:51.233405 kernel: audit: type=1300 audit(1707769491.204:1517): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffce9b1c0 a2=3 a3=1 items=0 ppid=1 pid=5333 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:51.204000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:24:51.237261 kernel: audit: type=1327 audit(1707769491.204:1517): proctitle=737368643A20636F7265205B707269765D Feb 12 20:24:51.243511 systemd-logind[1628]: New session 15 of user core. Feb 12 20:24:51.244996 systemd[1]: Started session-15.scope. Feb 12 20:24:51.259000 audit[5333]: USER_START pid=5333 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:51.272000 audit[5335]: CRED_ACQ pid=5335 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:51.283882 kernel: audit: type=1105 audit(1707769491.259:1518): pid=5333 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:51.284022 kernel: audit: type=1103 audit(1707769491.272:1519): pid=5335 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:51.615479 sshd[5333]: pam_unix(sshd:session): session closed for user core Feb 12 20:24:51.616000 audit[5333]: USER_END pid=5333 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:51.621912 systemd-logind[1628]: Session 15 logged out. Waiting for processes to exit. Feb 12 20:24:51.632962 systemd[1]: sshd@14-172.31.19.54:22-147.75.109.163:48430.service: Deactivated successfully. Feb 12 20:24:51.617000 audit[5333]: CRED_DISP pid=5333 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:51.636881 systemd[1]: session-15.scope: Deactivated successfully. Feb 12 20:24:51.640496 systemd-logind[1628]: Removed session 15. Feb 12 20:24:51.644486 kernel: audit: type=1106 audit(1707769491.616:1520): pid=5333 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:51.644700 kernel: audit: type=1104 audit(1707769491.617:1521): pid=5333 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:51.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.19.54:22-147.75.109.163:48430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:55.866202 kubelet[2764]: I0212 20:24:55.866148 2764 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:24:55.878112 systemd[1]: Created slice kubepods-besteffort-poda8c27979_82a0_40b8_9f5a_0551e701428d.slice. Feb 12 20:24:55.972000 audit[5351]: NETFILTER_CFG table=filter:121 family=2 entries=9 op=nft_register_rule pid=5351 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:24:55.972000 audit[5351]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffe1981050 a2=0 a3=ffffab7776c0 items=0 ppid=2946 pid=5351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:55.972000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:24:55.976000 audit[5351]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=5351 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:24:55.976000 audit[5351]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffe1981050 a2=0 a3=ffffab7776c0 items=0 ppid=2946 pid=5351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:55.976000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:24:56.007019 kubelet[2764]: I0212 20:24:56.006933 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/a8c27979-82a0-40b8-9f5a-0551e701428d-calico-apiserver-certs\") pod \"calico-apiserver-84b8bd5599-mxgvp\" (UID: \"a8c27979-82a0-40b8-9f5a-0551e701428d\") " pod="calico-apiserver/calico-apiserver-84b8bd5599-mxgvp" Feb 12 20:24:56.007213 kubelet[2764]: I0212 20:24:56.007096 2764 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s5f5z\" (UniqueName: \"kubernetes.io/projected/a8c27979-82a0-40b8-9f5a-0551e701428d-kube-api-access-s5f5z\") pod \"calico-apiserver-84b8bd5599-mxgvp\" (UID: \"a8c27979-82a0-40b8-9f5a-0551e701428d\") " pod="calico-apiserver/calico-apiserver-84b8bd5599-mxgvp" Feb 12 20:24:56.012000 audit[5353]: NETFILTER_CFG table=filter:123 family=2 entries=10 op=nft_register_rule pid=5353 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:24:56.012000 audit[5353]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=fffffa4458f0 a2=0 a3=ffff88b3d6c0 items=0 ppid=2946 pid=5353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:56.012000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:24:56.018000 audit[5353]: NETFILTER_CFG table=nat:124 family=2 entries=20 op=nft_register_rule pid=5353 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:24:56.018000 audit[5353]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=fffffa4458f0 a2=0 a3=ffff88b3d6c0 items=0 ppid=2946 pid=5353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:56.018000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:24:56.187310 env[1651]: time="2024-02-12T20:24:56.186679327Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-84b8bd5599-mxgvp,Uid:a8c27979-82a0-40b8-9f5a-0551e701428d,Namespace:calico-apiserver,Attempt:0,}" Feb 12 20:24:56.463703 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:24:56.463879 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4357f1fd0c1: link becomes ready Feb 12 20:24:56.460401 systemd-networkd[1451]: cali4357f1fd0c1: Link UP Feb 12 20:24:56.467889 systemd-networkd[1451]: cali4357f1fd0c1: Gained carrier Feb 12 20:24:56.471053 (udev-worker)[5374]: Network interface NamePolicy= disabled on kernel command line. Feb 12 20:24:56.504615 env[1651]: 2024-02-12 20:24:56.304 [INFO][5357] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--19--54-k8s-calico--apiserver--84b8bd5599--mxgvp-eth0 calico-apiserver-84b8bd5599- calico-apiserver a8c27979-82a0-40b8-9f5a-0551e701428d 1128 0 2024-02-12 20:24:55 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:84b8bd5599 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-19-54 calico-apiserver-84b8bd5599-mxgvp eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali4357f1fd0c1 [] []}} ContainerID="efa9c83d44d110b8f6c785d3e4e672e29d9d3d076edfac60e12418653e4a6e12" Namespace="calico-apiserver" Pod="calico-apiserver-84b8bd5599-mxgvp" WorkloadEndpoint="ip--172--31--19--54-k8s-calico--apiserver--84b8bd5599--mxgvp-" Feb 12 20:24:56.504615 env[1651]: 2024-02-12 20:24:56.305 [INFO][5357] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="efa9c83d44d110b8f6c785d3e4e672e29d9d3d076edfac60e12418653e4a6e12" Namespace="calico-apiserver" Pod="calico-apiserver-84b8bd5599-mxgvp" WorkloadEndpoint="ip--172--31--19--54-k8s-calico--apiserver--84b8bd5599--mxgvp-eth0" Feb 12 20:24:56.504615 env[1651]: 2024-02-12 20:24:56.366 [INFO][5367] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="efa9c83d44d110b8f6c785d3e4e672e29d9d3d076edfac60e12418653e4a6e12" HandleID="k8s-pod-network.efa9c83d44d110b8f6c785d3e4e672e29d9d3d076edfac60e12418653e4a6e12" Workload="ip--172--31--19--54-k8s-calico--apiserver--84b8bd5599--mxgvp-eth0" Feb 12 20:24:56.504615 env[1651]: 2024-02-12 20:24:56.389 [INFO][5367] ipam_plugin.go 268: Auto assigning IP ContainerID="efa9c83d44d110b8f6c785d3e4e672e29d9d3d076edfac60e12418653e4a6e12" HandleID="k8s-pod-network.efa9c83d44d110b8f6c785d3e4e672e29d9d3d076edfac60e12418653e4a6e12" Workload="ip--172--31--19--54-k8s-calico--apiserver--84b8bd5599--mxgvp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000316b50), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-19-54", "pod":"calico-apiserver-84b8bd5599-mxgvp", "timestamp":"2024-02-12 20:24:56.366681551 +0000 UTC"}, Hostname:"ip-172-31-19-54", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:24:56.504615 env[1651]: 2024-02-12 20:24:56.390 [INFO][5367] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:24:56.504615 env[1651]: 2024-02-12 20:24:56.390 [INFO][5367] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:24:56.504615 env[1651]: 2024-02-12 20:24:56.390 [INFO][5367] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-19-54' Feb 12 20:24:56.504615 env[1651]: 2024-02-12 20:24:56.394 [INFO][5367] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.efa9c83d44d110b8f6c785d3e4e672e29d9d3d076edfac60e12418653e4a6e12" host="ip-172-31-19-54" Feb 12 20:24:56.504615 env[1651]: 2024-02-12 20:24:56.401 [INFO][5367] ipam.go 372: Looking up existing affinities for host host="ip-172-31-19-54" Feb 12 20:24:56.504615 env[1651]: 2024-02-12 20:24:56.409 [INFO][5367] ipam.go 489: Trying affinity for 192.168.38.64/26 host="ip-172-31-19-54" Feb 12 20:24:56.504615 env[1651]: 2024-02-12 20:24:56.421 [INFO][5367] ipam.go 155: Attempting to load block cidr=192.168.38.64/26 host="ip-172-31-19-54" Feb 12 20:24:56.504615 env[1651]: 2024-02-12 20:24:56.426 [INFO][5367] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.38.64/26 host="ip-172-31-19-54" Feb 12 20:24:56.504615 env[1651]: 2024-02-12 20:24:56.426 [INFO][5367] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.38.64/26 handle="k8s-pod-network.efa9c83d44d110b8f6c785d3e4e672e29d9d3d076edfac60e12418653e4a6e12" host="ip-172-31-19-54" Feb 12 20:24:56.504615 env[1651]: 2024-02-12 20:24:56.431 [INFO][5367] ipam.go 1682: Creating new handle: k8s-pod-network.efa9c83d44d110b8f6c785d3e4e672e29d9d3d076edfac60e12418653e4a6e12 Feb 12 20:24:56.504615 env[1651]: 2024-02-12 20:24:56.437 [INFO][5367] ipam.go 1203: Writing block in order to claim IPs block=192.168.38.64/26 handle="k8s-pod-network.efa9c83d44d110b8f6c785d3e4e672e29d9d3d076edfac60e12418653e4a6e12" host="ip-172-31-19-54" Feb 12 20:24:56.504615 env[1651]: 2024-02-12 20:24:56.451 [INFO][5367] ipam.go 1216: Successfully claimed IPs: [192.168.38.69/26] block=192.168.38.64/26 handle="k8s-pod-network.efa9c83d44d110b8f6c785d3e4e672e29d9d3d076edfac60e12418653e4a6e12" host="ip-172-31-19-54" Feb 12 20:24:56.504615 env[1651]: 2024-02-12 20:24:56.451 [INFO][5367] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.38.69/26] handle="k8s-pod-network.efa9c83d44d110b8f6c785d3e4e672e29d9d3d076edfac60e12418653e4a6e12" host="ip-172-31-19-54" Feb 12 20:24:56.504615 env[1651]: 2024-02-12 20:24:56.451 [INFO][5367] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:24:56.504615 env[1651]: 2024-02-12 20:24:56.452 [INFO][5367] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.38.69/26] IPv6=[] ContainerID="efa9c83d44d110b8f6c785d3e4e672e29d9d3d076edfac60e12418653e4a6e12" HandleID="k8s-pod-network.efa9c83d44d110b8f6c785d3e4e672e29d9d3d076edfac60e12418653e4a6e12" Workload="ip--172--31--19--54-k8s-calico--apiserver--84b8bd5599--mxgvp-eth0" Feb 12 20:24:56.511570 env[1651]: 2024-02-12 20:24:56.455 [INFO][5357] k8s.go 385: Populated endpoint ContainerID="efa9c83d44d110b8f6c785d3e4e672e29d9d3d076edfac60e12418653e4a6e12" Namespace="calico-apiserver" Pod="calico-apiserver-84b8bd5599-mxgvp" WorkloadEndpoint="ip--172--31--19--54-k8s-calico--apiserver--84b8bd5599--mxgvp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--54-k8s-calico--apiserver--84b8bd5599--mxgvp-eth0", GenerateName:"calico-apiserver-84b8bd5599-", Namespace:"calico-apiserver", SelfLink:"", UID:"a8c27979-82a0-40b8-9f5a-0551e701428d", ResourceVersion:"1128", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 24, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"84b8bd5599", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-54", ContainerID:"", Pod:"calico-apiserver-84b8bd5599-mxgvp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.38.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4357f1fd0c1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:24:56.511570 env[1651]: 2024-02-12 20:24:56.455 [INFO][5357] k8s.go 386: Calico CNI using IPs: [192.168.38.69/32] ContainerID="efa9c83d44d110b8f6c785d3e4e672e29d9d3d076edfac60e12418653e4a6e12" Namespace="calico-apiserver" Pod="calico-apiserver-84b8bd5599-mxgvp" WorkloadEndpoint="ip--172--31--19--54-k8s-calico--apiserver--84b8bd5599--mxgvp-eth0" Feb 12 20:24:56.511570 env[1651]: 2024-02-12 20:24:56.455 [INFO][5357] dataplane_linux.go 68: Setting the host side veth name to cali4357f1fd0c1 ContainerID="efa9c83d44d110b8f6c785d3e4e672e29d9d3d076edfac60e12418653e4a6e12" Namespace="calico-apiserver" Pod="calico-apiserver-84b8bd5599-mxgvp" WorkloadEndpoint="ip--172--31--19--54-k8s-calico--apiserver--84b8bd5599--mxgvp-eth0" Feb 12 20:24:56.511570 env[1651]: 2024-02-12 20:24:56.465 [INFO][5357] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="efa9c83d44d110b8f6c785d3e4e672e29d9d3d076edfac60e12418653e4a6e12" Namespace="calico-apiserver" Pod="calico-apiserver-84b8bd5599-mxgvp" WorkloadEndpoint="ip--172--31--19--54-k8s-calico--apiserver--84b8bd5599--mxgvp-eth0" Feb 12 20:24:56.511570 env[1651]: 2024-02-12 20:24:56.482 [INFO][5357] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="efa9c83d44d110b8f6c785d3e4e672e29d9d3d076edfac60e12418653e4a6e12" Namespace="calico-apiserver" Pod="calico-apiserver-84b8bd5599-mxgvp" WorkloadEndpoint="ip--172--31--19--54-k8s-calico--apiserver--84b8bd5599--mxgvp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--54-k8s-calico--apiserver--84b8bd5599--mxgvp-eth0", GenerateName:"calico-apiserver-84b8bd5599-", Namespace:"calico-apiserver", SelfLink:"", UID:"a8c27979-82a0-40b8-9f5a-0551e701428d", ResourceVersion:"1128", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 24, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"84b8bd5599", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-54", ContainerID:"efa9c83d44d110b8f6c785d3e4e672e29d9d3d076edfac60e12418653e4a6e12", Pod:"calico-apiserver-84b8bd5599-mxgvp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.38.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4357f1fd0c1", MAC:"62:55:e5:97:9f:db", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:24:56.511570 env[1651]: 2024-02-12 20:24:56.500 [INFO][5357] k8s.go 491: Wrote updated endpoint to datastore ContainerID="efa9c83d44d110b8f6c785d3e4e672e29d9d3d076edfac60e12418653e4a6e12" Namespace="calico-apiserver" Pod="calico-apiserver-84b8bd5599-mxgvp" WorkloadEndpoint="ip--172--31--19--54-k8s-calico--apiserver--84b8bd5599--mxgvp-eth0" Feb 12 20:24:56.563511 env[1651]: time="2024-02-12T20:24:56.563249255Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:24:56.563874 env[1651]: time="2024-02-12T20:24:56.563772790Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:24:56.564169 env[1651]: time="2024-02-12T20:24:56.564062974Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:24:56.565087 env[1651]: time="2024-02-12T20:24:56.564728493Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/efa9c83d44d110b8f6c785d3e4e672e29d9d3d076edfac60e12418653e4a6e12 pid=5393 runtime=io.containerd.runc.v2 Feb 12 20:24:56.618698 systemd[1]: Started cri-containerd-efa9c83d44d110b8f6c785d3e4e672e29d9d3d076edfac60e12418653e4a6e12.scope. Feb 12 20:24:56.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.19.54:22-147.75.109.163:60542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:56.648541 systemd[1]: Started sshd@15-172.31.19.54:22-147.75.109.163:60542.service. Feb 12 20:24:56.651901 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 12 20:24:56.652034 kernel: audit: type=1130 audit(1707769496.647:1527): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.19.54:22-147.75.109.163:60542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:56.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.720080 kernel: audit: type=1400 audit(1707769496.701:1528): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.720302 kernel: audit: type=1400 audit(1707769496.701:1529): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.734496 kernel: audit: type=1400 audit(1707769496.701:1530): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.750611 kernel: audit: type=1400 audit(1707769496.701:1531): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.764544 kernel: audit: type=1400 audit(1707769496.701:1532): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.778639 kernel: audit: type=1400 audit(1707769496.701:1533): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.791439 kernel: audit: type=1400 audit(1707769496.701:1534): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.800777 kernel: audit: type=1400 audit(1707769496.701:1535): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.810383 kernel: audit: type=1400 audit(1707769496.701:1536): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.711000 audit: BPF prog-id=209 op=LOAD Feb 12 20:24:56.718000 audit[5403]: AVC avc: denied { bpf } for pid=5403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.718000 audit[5403]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=5393 pid=5403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:56.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566613963383364343464313130623866366337383564336534653637 Feb 12 20:24:56.718000 audit[5403]: AVC avc: denied { perfmon } for pid=5403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.718000 audit[5403]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=5393 pid=5403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:56.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566613963383364343464313130623866366337383564336534653637 Feb 12 20:24:56.718000 audit[5403]: AVC avc: denied { bpf } for pid=5403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.718000 audit[5403]: AVC avc: denied { bpf } for pid=5403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.718000 audit[5403]: AVC avc: denied { bpf } for pid=5403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.718000 audit[5403]: AVC avc: denied { perfmon } for pid=5403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.718000 audit[5403]: AVC avc: denied { perfmon } for pid=5403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.718000 audit[5403]: AVC avc: denied { perfmon } for pid=5403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.718000 audit[5403]: AVC avc: denied { perfmon } for pid=5403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.718000 audit[5403]: AVC avc: denied { perfmon } for pid=5403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.718000 audit[5403]: AVC avc: denied { bpf } for pid=5403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.718000 audit[5403]: AVC avc: denied { bpf } for pid=5403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.718000 audit: BPF prog-id=210 op=LOAD Feb 12 20:24:56.718000 audit[5403]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=5393 pid=5403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:56.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566613963383364343464313130623866366337383564336534653637 Feb 12 20:24:56.719000 audit[5403]: AVC avc: denied { bpf } for pid=5403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.719000 audit[5403]: AVC avc: denied { bpf } for pid=5403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.719000 audit[5403]: AVC avc: denied { perfmon } for pid=5403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.719000 audit[5403]: AVC avc: denied { perfmon } for pid=5403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.719000 audit[5403]: AVC avc: denied { perfmon } for pid=5403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.719000 audit[5403]: AVC avc: denied { perfmon } for pid=5403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.719000 audit[5403]: AVC avc: denied { perfmon } for pid=5403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.719000 audit[5403]: AVC avc: denied { bpf } for pid=5403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.719000 audit[5403]: AVC avc: denied { bpf } for pid=5403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.719000 audit: BPF prog-id=211 op=LOAD Feb 12 20:24:56.719000 audit[5403]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=5393 pid=5403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:56.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566613963383364343464313130623866366337383564336534653637 Feb 12 20:24:56.719000 audit: BPF prog-id=211 op=UNLOAD Feb 12 20:24:56.719000 audit: BPF prog-id=210 op=UNLOAD Feb 12 20:24:56.719000 audit[5403]: AVC avc: denied { bpf } for pid=5403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.719000 audit[5403]: AVC avc: denied { bpf } for pid=5403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.719000 audit[5403]: AVC avc: denied { bpf } for pid=5403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.719000 audit[5403]: AVC avc: denied { perfmon } for pid=5403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.719000 audit[5403]: AVC avc: denied { perfmon } for pid=5403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.719000 audit[5403]: AVC avc: denied { perfmon } for pid=5403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.719000 audit[5403]: AVC avc: denied { perfmon } for pid=5403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.719000 audit[5403]: AVC avc: denied { perfmon } for pid=5403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.719000 audit[5403]: AVC avc: denied { bpf } for pid=5403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.719000 audit[5403]: AVC avc: denied { bpf } for pid=5403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:56.719000 audit: BPF prog-id=212 op=LOAD Feb 12 20:24:56.719000 audit[5403]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=5393 pid=5403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:56.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566613963383364343464313130623866366337383564336534653637 Feb 12 20:24:56.853000 audit[5416]: USER_ACCT pid=5416 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:56.856793 sshd[5416]: Accepted publickey for core from 147.75.109.163 port 60542 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:24:56.856000 audit[5416]: CRED_ACQ pid=5416 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:56.856000 audit[5416]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe9d1d630 a2=3 a3=1 items=0 ppid=1 pid=5416 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:56.856000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:24:56.857000 audit[5427]: NETFILTER_CFG table=filter:125 family=2 entries=59 op=nft_register_chain pid=5427 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:24:56.857000 audit[5427]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=29292 a0=3 a1=ffffeaf3f170 a2=0 a3=ffffa6691fa8 items=0 ppid=4159 pid=5427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:56.857000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:24:56.858865 sshd[5416]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:24:56.871794 systemd[1]: Started session-16.scope. Feb 12 20:24:56.872971 systemd-logind[1628]: New session 16 of user core. Feb 12 20:24:56.885000 audit[5416]: USER_START pid=5416 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:56.888000 audit[5434]: CRED_ACQ pid=5434 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:56.903999 env[1651]: time="2024-02-12T20:24:56.903933590Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-84b8bd5599-mxgvp,Uid:a8c27979-82a0-40b8-9f5a-0551e701428d,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"efa9c83d44d110b8f6c785d3e4e672e29d9d3d076edfac60e12418653e4a6e12\"" Feb 12 20:24:56.907574 env[1651]: time="2024-02-12T20:24:56.907471100Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 20:24:57.175890 sshd[5416]: pam_unix(sshd:session): session closed for user core Feb 12 20:24:57.176000 audit[5416]: USER_END pid=5416 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:57.177000 audit[5416]: CRED_DISP pid=5416 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:24:57.182387 systemd[1]: session-16.scope: Deactivated successfully. Feb 12 20:24:57.183414 systemd-logind[1628]: Session 16 logged out. Waiting for processes to exit. Feb 12 20:24:57.184238 systemd[1]: sshd@15-172.31.19.54:22-147.75.109.163:60542.service: Deactivated successfully. Feb 12 20:24:57.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.19.54:22-147.75.109.163:60542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:57.190784 systemd-logind[1628]: Removed session 16. Feb 12 20:24:57.812093 systemd-networkd[1451]: cali4357f1fd0c1: Gained IPv6LL Feb 12 20:24:58.045156 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1689485666.mount: Deactivated successfully. Feb 12 20:24:59.810525 env[1651]: time="2024-02-12T20:24:59.810467176Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:24:59.813800 env[1651]: time="2024-02-12T20:24:59.813744839Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:24:59.816922 env[1651]: time="2024-02-12T20:24:59.816853806Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:24:59.820329 env[1651]: time="2024-02-12T20:24:59.820217737Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:24:59.822048 env[1651]: time="2024-02-12T20:24:59.821992630Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 12 20:24:59.834674 env[1651]: time="2024-02-12T20:24:59.834491307Z" level=info msg="CreateContainer within sandbox \"efa9c83d44d110b8f6c785d3e4e672e29d9d3d076edfac60e12418653e4a6e12\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 20:24:59.858609 env[1651]: time="2024-02-12T20:24:59.858541958Z" level=info msg="CreateContainer within sandbox \"efa9c83d44d110b8f6c785d3e4e672e29d9d3d076edfac60e12418653e4a6e12\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"73c99412070e930d6be43f7770410158e22ef436061cce1355e9abc1e55ced1d\"" Feb 12 20:24:59.863660 env[1651]: time="2024-02-12T20:24:59.863585214Z" level=info msg="StartContainer for \"73c99412070e930d6be43f7770410158e22ef436061cce1355e9abc1e55ced1d\"" Feb 12 20:24:59.942858 systemd[1]: run-containerd-runc-k8s.io-73c99412070e930d6be43f7770410158e22ef436061cce1355e9abc1e55ced1d-runc.H7M23G.mount: Deactivated successfully. Feb 12 20:24:59.948171 systemd[1]: Started cri-containerd-73c99412070e930d6be43f7770410158e22ef436061cce1355e9abc1e55ced1d.scope. Feb 12 20:24:59.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.979000 audit: BPF prog-id=213 op=LOAD Feb 12 20:24:59.981000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.981000 audit[5453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=5393 pid=5453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:59.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733633939343132303730653933306436626534336637373730343130 Feb 12 20:24:59.982000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.982000 audit[5453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=5393 pid=5453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:59.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733633939343132303730653933306436626534336637373730343130 Feb 12 20:24:59.982000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.982000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.982000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.982000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.982000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.982000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.982000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.982000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.982000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.982000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.982000 audit: BPF prog-id=214 op=LOAD Feb 12 20:24:59.982000 audit[5453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=5393 pid=5453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:59.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733633939343132303730653933306436626534336637373730343130 Feb 12 20:24:59.984000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.984000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.984000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.984000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.984000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.984000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.984000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.984000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.984000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.984000 audit: BPF prog-id=215 op=LOAD Feb 12 20:24:59.984000 audit[5453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=5393 pid=5453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:59.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733633939343132303730653933306436626534336637373730343130 Feb 12 20:24:59.986000 audit: BPF prog-id=215 op=UNLOAD Feb 12 20:24:59.986000 audit: BPF prog-id=214 op=UNLOAD Feb 12 20:24:59.986000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.986000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.986000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.986000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.986000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.986000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.986000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.986000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.986000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.986000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.986000 audit: BPF prog-id=216 op=LOAD Feb 12 20:24:59.986000 audit[5453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=5393 pid=5453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:59.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733633939343132303730653933306436626534336637373730343130 Feb 12 20:25:00.036652 env[1651]: time="2024-02-12T20:25:00.036566052Z" level=info msg="StartContainer for \"73c99412070e930d6be43f7770410158e22ef436061cce1355e9abc1e55ced1d\" returns successfully" Feb 12 20:25:00.244000 audit[5485]: NETFILTER_CFG table=filter:126 family=2 entries=10 op=nft_register_rule pid=5485 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:00.244000 audit[5485]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffea024850 a2=0 a3=ffffa9a406c0 items=0 ppid=2946 pid=5485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.244000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:00.248000 audit[5485]: NETFILTER_CFG table=nat:127 family=2 entries=20 op=nft_register_rule pid=5485 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:00.248000 audit[5485]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffea024850 a2=0 a3=ffffa9a406c0 items=0 ppid=2946 pid=5485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.248000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:02.204401 systemd[1]: Started sshd@16-172.31.19.54:22-147.75.109.163:60544.service. Feb 12 20:25:02.215754 kernel: kauditd_printk_skb: 124 callbacks suppressed Feb 12 20:25:02.215830 kernel: audit: type=1130 audit(1707769502.203:1575): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.19.54:22-147.75.109.163:60544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:02.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.19.54:22-147.75.109.163:60544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:02.390000 audit[5509]: USER_ACCT pid=5509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:02.394522 sshd[5509]: Accepted publickey for core from 147.75.109.163 port 60544 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:25:02.395425 sshd[5509]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:25:02.390000 audit[5509]: CRED_ACQ pid=5509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:02.413409 kernel: audit: type=1101 audit(1707769502.390:1576): pid=5509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:02.413507 kernel: audit: type=1103 audit(1707769502.390:1577): pid=5509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:02.420025 kernel: audit: type=1006 audit(1707769502.390:1578): pid=5509 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 12 20:25:02.390000 audit[5509]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc35f1060 a2=3 a3=1 items=0 ppid=1 pid=5509 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:02.432824 kernel: audit: type=1300 audit(1707769502.390:1578): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc35f1060 a2=3 a3=1 items=0 ppid=1 pid=5509 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:02.432090 systemd-logind[1628]: New session 17 of user core. Feb 12 20:25:02.434108 systemd[1]: Started session-17.scope. Feb 12 20:25:02.390000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:25:02.443307 kernel: audit: type=1327 audit(1707769502.390:1578): proctitle=737368643A20636F7265205B707269765D Feb 12 20:25:02.448000 audit[5509]: USER_START pid=5509 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:02.448000 audit[5511]: CRED_ACQ pid=5511 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:02.475200 kernel: audit: type=1105 audit(1707769502.448:1579): pid=5509 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:02.475401 kernel: audit: type=1103 audit(1707769502.448:1580): pid=5511 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:02.610000 audit[5464]: AVC avc: denied { watch } for pid=5464 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_20_24_56.1214017608/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c486 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c113,c486 tclass=file permissive=0 Feb 12 20:25:02.610000 audit[5464]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000b290a0 a2=fc6 a3=0 items=0 ppid=5393 pid=5464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c486 key=(null) Feb 12 20:25:02.639972 kernel: audit: type=1400 audit(1707769502.610:1581): avc: denied { watch } for pid=5464 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_20_24_56.1214017608/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c486 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c113,c486 tclass=file permissive=0 Feb 12 20:25:02.640150 kernel: audit: type=1300 audit(1707769502.610:1581): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000b290a0 a2=fc6 a3=0 items=0 ppid=5393 pid=5464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c486 key=(null) Feb 12 20:25:02.656153 systemd[1]: run-containerd-runc-k8s.io-ccc3138ea94139585d2c5d0f827530663ede048b728368cadb8ebc3744b21b6c-runc.8M2GUy.mount: Deactivated successfully. Feb 12 20:25:02.610000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 20:25:02.817325 sshd[5509]: pam_unix(sshd:session): session closed for user core Feb 12 20:25:02.806000 audit[5536]: NETFILTER_CFG table=filter:128 family=2 entries=10 op=nft_register_rule pid=5536 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:02.806000 audit[5536]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffc6e20fb0 a2=0 a3=ffff86bb86c0 items=0 ppid=2946 pid=5536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:02.806000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:02.818000 audit[5509]: USER_END pid=5509 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:02.818000 audit[5509]: CRED_DISP pid=5509 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:02.822242 systemd[1]: session-17.scope: Deactivated successfully. Feb 12 20:25:02.823701 systemd-logind[1628]: Session 17 logged out. Waiting for processes to exit. Feb 12 20:25:02.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.19.54:22-147.75.109.163:60544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:02.823969 systemd[1]: sshd@16-172.31.19.54:22-147.75.109.163:60544.service: Deactivated successfully. Feb 12 20:25:02.826369 systemd-logind[1628]: Removed session 17. Feb 12 20:25:02.826000 audit[5536]: NETFILTER_CFG table=nat:129 family=2 entries=20 op=nft_register_rule pid=5536 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:02.826000 audit[5536]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffc6e20fb0 a2=0 a3=ffff86bb86c0 items=0 ppid=2946 pid=5536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:02.826000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:02.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.19.54:22-147.75.109.163:60558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:02.848913 systemd[1]: Started sshd@17-172.31.19.54:22-147.75.109.163:60558.service. Feb 12 20:25:03.022000 audit[5543]: USER_ACCT pid=5543 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:03.023651 sshd[5543]: Accepted publickey for core from 147.75.109.163 port 60558 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:25:03.024000 audit[5543]: CRED_ACQ pid=5543 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:03.024000 audit[5543]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffed68de00 a2=3 a3=1 items=0 ppid=1 pid=5543 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:03.024000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:25:03.026218 sshd[5543]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:25:03.035506 systemd-logind[1628]: New session 18 of user core. Feb 12 20:25:03.035607 systemd[1]: Started session-18.scope. Feb 12 20:25:03.045000 audit[5543]: USER_START pid=5543 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:03.048000 audit[5545]: CRED_ACQ pid=5545 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:03.528482 sshd[5543]: pam_unix(sshd:session): session closed for user core Feb 12 20:25:03.529000 audit[5543]: USER_END pid=5543 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:03.529000 audit[5543]: CRED_DISP pid=5543 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:03.533899 systemd-logind[1628]: Session 18 logged out. Waiting for processes to exit. Feb 12 20:25:03.534434 systemd[1]: sshd@17-172.31.19.54:22-147.75.109.163:60558.service: Deactivated successfully. Feb 12 20:25:03.535826 systemd[1]: session-18.scope: Deactivated successfully. Feb 12 20:25:03.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.19.54:22-147.75.109.163:60558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:03.538258 systemd-logind[1628]: Removed session 18. Feb 12 20:25:03.557097 systemd[1]: Started sshd@18-172.31.19.54:22-147.75.109.163:60572.service. Feb 12 20:25:03.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.19.54:22-147.75.109.163:60572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:03.731000 audit[5553]: USER_ACCT pid=5553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:03.733108 sshd[5553]: Accepted publickey for core from 147.75.109.163 port 60572 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:25:03.734000 audit[5553]: CRED_ACQ pid=5553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:03.734000 audit[5553]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffec6463b0 a2=3 a3=1 items=0 ppid=1 pid=5553 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:03.734000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:25:03.736582 sshd[5553]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:25:03.745535 systemd-logind[1628]: New session 19 of user core. Feb 12 20:25:03.747028 systemd[1]: Started session-19.scope. Feb 12 20:25:03.756000 audit[5553]: USER_START pid=5553 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:03.759000 audit[5555]: CRED_ACQ pid=5555 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:05.787000 audit[5565]: NETFILTER_CFG table=filter:130 family=2 entries=22 op=nft_register_rule pid=5565 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:05.787000 audit[5565]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11996 a0=3 a1=ffffe78560c0 a2=0 a3=ffff942266c0 items=0 ppid=2946 pid=5565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:05.787000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:05.795389 sshd[5553]: pam_unix(sshd:session): session closed for user core Feb 12 20:25:05.796000 audit[5565]: NETFILTER_CFG table=nat:131 family=2 entries=20 op=nft_register_rule pid=5565 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:05.796000 audit[5565]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffe78560c0 a2=0 a3=ffff942266c0 items=0 ppid=2946 pid=5565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:05.797000 audit[5553]: USER_END pid=5553 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:05.797000 audit[5553]: CRED_DISP pid=5553 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:05.796000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:05.802368 systemd[1]: sshd@18-172.31.19.54:22-147.75.109.163:60572.service: Deactivated successfully. Feb 12 20:25:05.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.19.54:22-147.75.109.163:60572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:05.803786 systemd-logind[1628]: Session 19 logged out. Waiting for processes to exit. Feb 12 20:25:05.804940 systemd[1]: session-19.scope: Deactivated successfully. Feb 12 20:25:05.805981 systemd[1]: session-19.scope: Consumed 1.165s CPU time. Feb 12 20:25:05.808643 systemd-logind[1628]: Removed session 19. Feb 12 20:25:05.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.19.54:22-147.75.109.163:47936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:05.827233 systemd[1]: Started sshd@19-172.31.19.54:22-147.75.109.163:47936.service. Feb 12 20:25:05.878000 audit[5571]: NETFILTER_CFG table=filter:132 family=2 entries=34 op=nft_register_rule pid=5571 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:05.878000 audit[5571]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11996 a0=3 a1=ffffeca96060 a2=0 a3=ffff89d416c0 items=0 ppid=2946 pid=5571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:05.878000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:05.880000 audit[5571]: NETFILTER_CFG table=nat:133 family=2 entries=20 op=nft_register_rule pid=5571 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:05.880000 audit[5571]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffeca96060 a2=0 a3=ffff89d416c0 items=0 ppid=2946 pid=5571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:05.880000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:06.019000 audit[5568]: USER_ACCT pid=5568 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:06.021430 sshd[5568]: Accepted publickey for core from 147.75.109.163 port 47936 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:25:06.022000 audit[5568]: CRED_ACQ pid=5568 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:06.022000 audit[5568]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc55f250 a2=3 a3=1 items=0 ppid=1 pid=5568 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:06.022000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:25:06.025010 sshd[5568]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:25:06.035087 systemd-logind[1628]: New session 20 of user core. Feb 12 20:25:06.036544 systemd[1]: Started session-20.scope. Feb 12 20:25:06.046000 audit[5568]: USER_START pid=5568 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:06.050000 audit[5572]: CRED_ACQ pid=5572 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:06.884690 sshd[5568]: pam_unix(sshd:session): session closed for user core Feb 12 20:25:06.885000 audit[5568]: USER_END pid=5568 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:06.886000 audit[5568]: CRED_DISP pid=5568 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:06.891112 systemd-logind[1628]: Session 20 logged out. Waiting for processes to exit. Feb 12 20:25:06.891550 systemd[1]: sshd@19-172.31.19.54:22-147.75.109.163:47936.service: Deactivated successfully. Feb 12 20:25:06.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.19.54:22-147.75.109.163:47936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:06.893395 systemd[1]: session-20.scope: Deactivated successfully. Feb 12 20:25:06.899827 systemd-logind[1628]: Removed session 20. Feb 12 20:25:06.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.19.54:22-147.75.109.163:47948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:06.915259 systemd[1]: Started sshd@20-172.31.19.54:22-147.75.109.163:47948.service. Feb 12 20:25:07.090000 audit[5582]: USER_ACCT pid=5582 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:07.092194 sshd[5582]: Accepted publickey for core from 147.75.109.163 port 47948 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:25:07.092000 audit[5582]: CRED_ACQ pid=5582 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:07.093000 audit[5582]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe7cd5580 a2=3 a3=1 items=0 ppid=1 pid=5582 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:07.093000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:25:07.095888 sshd[5582]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:25:07.103407 systemd-logind[1628]: New session 21 of user core. Feb 12 20:25:07.105437 systemd[1]: Started session-21.scope. Feb 12 20:25:07.114000 audit[5582]: USER_START pid=5582 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:07.117000 audit[5584]: CRED_ACQ pid=5584 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:07.368440 sshd[5582]: pam_unix(sshd:session): session closed for user core Feb 12 20:25:07.378009 kernel: kauditd_printk_skb: 63 callbacks suppressed Feb 12 20:25:07.378186 kernel: audit: type=1106 audit(1707769507.369:1624): pid=5582 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:07.369000 audit[5582]: USER_END pid=5582 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:07.374097 systemd[1]: session-21.scope: Deactivated successfully. Feb 12 20:25:07.375837 systemd[1]: sshd@20-172.31.19.54:22-147.75.109.163:47948.service: Deactivated successfully. Feb 12 20:25:07.369000 audit[5582]: CRED_DISP pid=5582 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:07.392991 kernel: audit: type=1104 audit(1707769507.369:1625): pid=5582 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:07.393049 systemd-logind[1628]: Session 21 logged out. Waiting for processes to exit. Feb 12 20:25:07.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.19.54:22-147.75.109.163:47948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:07.402346 kernel: audit: type=1131 audit(1707769507.371:1626): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.19.54:22-147.75.109.163:47948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:07.402953 systemd-logind[1628]: Removed session 21. Feb 12 20:25:12.398023 systemd[1]: Started sshd@21-172.31.19.54:22-147.75.109.163:47962.service. Feb 12 20:25:12.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.19.54:22-147.75.109.163:47962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:12.408341 kernel: audit: type=1130 audit(1707769512.397:1627): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.19.54:22-147.75.109.163:47962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:12.570000 audit[5597]: USER_ACCT pid=5597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:12.572072 sshd[5597]: Accepted publickey for core from 147.75.109.163 port 47962 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:25:12.582000 audit[5597]: CRED_ACQ pid=5597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:12.585135 sshd[5597]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:25:12.593595 kernel: audit: type=1101 audit(1707769512.570:1628): pid=5597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:12.593704 kernel: audit: type=1103 audit(1707769512.582:1629): pid=5597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:12.600878 kernel: audit: type=1006 audit(1707769512.582:1630): pid=5597 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 12 20:25:12.582000 audit[5597]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffcecca60 a2=3 a3=1 items=0 ppid=1 pid=5597 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:12.612382 kernel: audit: type=1300 audit(1707769512.582:1630): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffcecca60 a2=3 a3=1 items=0 ppid=1 pid=5597 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:12.582000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:25:12.618375 kernel: audit: type=1327 audit(1707769512.582:1630): proctitle=737368643A20636F7265205B707269765D Feb 12 20:25:12.621134 systemd-logind[1628]: New session 22 of user core. Feb 12 20:25:12.622749 systemd[1]: Started session-22.scope. Feb 12 20:25:12.634000 audit[5597]: USER_START pid=5597 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:12.646000 audit[5599]: CRED_ACQ pid=5599 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:12.657126 kernel: audit: type=1105 audit(1707769512.634:1631): pid=5597 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:12.657462 kernel: audit: type=1103 audit(1707769512.646:1632): pid=5599 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:12.892762 sshd[5597]: pam_unix(sshd:session): session closed for user core Feb 12 20:25:12.893000 audit[5597]: USER_END pid=5597 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:12.906898 systemd[1]: sshd@21-172.31.19.54:22-147.75.109.163:47962.service: Deactivated successfully. Feb 12 20:25:12.908314 systemd[1]: session-22.scope: Deactivated successfully. Feb 12 20:25:12.910324 kernel: audit: type=1106 audit(1707769512.893:1633): pid=5597 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:12.910460 kernel: audit: type=1104 audit(1707769512.893:1634): pid=5597 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:12.893000 audit[5597]: CRED_DISP pid=5597 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:12.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.19.54:22-147.75.109.163:47962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:12.920645 systemd-logind[1628]: Session 22 logged out. Waiting for processes to exit. Feb 12 20:25:12.922723 systemd-logind[1628]: Removed session 22. Feb 12 20:25:14.712000 audit[5609]: NETFILTER_CFG table=filter:134 family=2 entries=22 op=nft_register_rule pid=5609 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:14.712000 audit[5609]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffcd981100 a2=0 a3=ffffa43ef6c0 items=0 ppid=2946 pid=5609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:14.712000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:14.720000 audit[5609]: NETFILTER_CFG table=nat:135 family=2 entries=104 op=nft_register_chain pid=5609 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:14.720000 audit[5609]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=47436 a0=3 a1=ffffcd981100 a2=0 a3=ffffa43ef6c0 items=0 ppid=2946 pid=5609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:14.720000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:16.470815 systemd[1]: run-containerd-runc-k8s.io-ccc3138ea94139585d2c5d0f827530663ede048b728368cadb8ebc3744b21b6c-runc.8KCIYI.mount: Deactivated successfully. Feb 12 20:25:17.923805 systemd[1]: Started sshd@22-172.31.19.54:22-147.75.109.163:36068.service. Feb 12 20:25:17.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.19.54:22-147.75.109.163:36068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:17.926845 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 12 20:25:17.926965 kernel: audit: type=1130 audit(1707769517.923:1638): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.19.54:22-147.75.109.163:36068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:18.097000 audit[5635]: USER_ACCT pid=5635 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:18.099517 sshd[5635]: Accepted publickey for core from 147.75.109.163 port 36068 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:25:18.110383 kernel: audit: type=1101 audit(1707769518.097:1639): pid=5635 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:18.110000 audit[5635]: CRED_ACQ pid=5635 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:18.112556 sshd[5635]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:25:18.128304 kernel: audit: type=1103 audit(1707769518.110:1640): pid=5635 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:18.128450 kernel: audit: type=1006 audit(1707769518.110:1641): pid=5635 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 12 20:25:18.110000 audit[5635]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffca6b76c0 a2=3 a3=1 items=0 ppid=1 pid=5635 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:18.138505 kernel: audit: type=1300 audit(1707769518.110:1641): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffca6b76c0 a2=3 a3=1 items=0 ppid=1 pid=5635 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:18.110000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:25:18.143047 kernel: audit: type=1327 audit(1707769518.110:1641): proctitle=737368643A20636F7265205B707269765D Feb 12 20:25:18.149694 systemd-logind[1628]: New session 23 of user core. Feb 12 20:25:18.150932 systemd[1]: Started session-23.scope. Feb 12 20:25:18.159000 audit[5635]: USER_START pid=5635 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:18.163000 audit[5637]: CRED_ACQ pid=5637 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:18.182213 kernel: audit: type=1105 audit(1707769518.159:1642): pid=5635 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:18.182342 kernel: audit: type=1103 audit(1707769518.163:1643): pid=5637 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:18.404538 sshd[5635]: pam_unix(sshd:session): session closed for user core Feb 12 20:25:18.406000 audit[5635]: USER_END pid=5635 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:18.415694 systemd[1]: session-23.scope: Deactivated successfully. Feb 12 20:25:18.416990 systemd[1]: sshd@22-172.31.19.54:22-147.75.109.163:36068.service: Deactivated successfully. Feb 12 20:25:18.420869 systemd-logind[1628]: Session 23 logged out. Waiting for processes to exit. Feb 12 20:25:18.412000 audit[5635]: CRED_DISP pid=5635 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:18.430781 kernel: audit: type=1106 audit(1707769518.406:1644): pid=5635 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:18.430882 kernel: audit: type=1104 audit(1707769518.412:1645): pid=5635 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:18.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.19.54:22-147.75.109.163:36068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:18.432689 systemd-logind[1628]: Removed session 23. Feb 12 20:25:21.719000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:25:21.719000 audit[2497]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=4013f4c840 a2=fc6 a3=0 items=0 ppid=2366 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 key=(null) Feb 12 20:25:21.719000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:25:21.719000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:25:21.719000 audit[2497]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=400410df20 a2=fc6 a3=0 items=0 ppid=2366 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 key=(null) Feb 12 20:25:21.719000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:25:21.720000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:25:21.720000 audit[2497]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=4006992f60 a2=fc6 a3=0 items=0 ppid=2366 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 key=(null) Feb 12 20:25:21.720000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:25:21.749000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:25:21.749000 audit[2497]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=4006993320 a2=fc6 a3=0 items=0 ppid=2366 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 key=(null) Feb 12 20:25:21.749000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:25:21.955000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:25:21.955000 audit[2497]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=401562ff80 a2=fc6 a3=0 items=0 ppid=2366 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 key=(null) Feb 12 20:25:21.955000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:25:21.955000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:25:21.955000 audit[2497]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=400078bad0 a2=fc6 a3=0 items=0 ppid=2366 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c108 key=(null) Feb 12 20:25:21.955000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:25:23.438177 systemd[1]: Started sshd@23-172.31.19.54:22-147.75.109.163:36080.service. Feb 12 20:25:23.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.19.54:22-147.75.109.163:36080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:23.441916 kernel: kauditd_printk_skb: 19 callbacks suppressed Feb 12 20:25:23.442063 kernel: audit: type=1130 audit(1707769523.438:1653): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.19.54:22-147.75.109.163:36080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:23.623341 sshd[5648]: Accepted publickey for core from 147.75.109.163 port 36080 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:25:23.621000 audit[5648]: USER_ACCT pid=5648 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:23.632000 audit[5648]: CRED_ACQ pid=5648 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:23.644259 kernel: audit: type=1101 audit(1707769523.621:1654): pid=5648 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:23.644396 kernel: audit: type=1103 audit(1707769523.632:1655): pid=5648 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:23.634666 sshd[5648]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:25:23.650893 kernel: audit: type=1006 audit(1707769523.632:1656): pid=5648 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 12 20:25:23.632000 audit[5648]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd75c6aa0 a2=3 a3=1 items=0 ppid=1 pid=5648 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:23.652328 kernel: audit: type=1300 audit(1707769523.632:1656): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd75c6aa0 a2=3 a3=1 items=0 ppid=1 pid=5648 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:23.632000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:25:23.666693 kernel: audit: type=1327 audit(1707769523.632:1656): proctitle=737368643A20636F7265205B707269765D Feb 12 20:25:23.672448 systemd-logind[1628]: New session 24 of user core. Feb 12 20:25:23.673692 systemd[1]: Started session-24.scope. Feb 12 20:25:23.683000 audit[5648]: USER_START pid=5648 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:23.696000 audit[5650]: CRED_ACQ pid=5650 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:23.706852 kernel: audit: type=1105 audit(1707769523.683:1657): pid=5648 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:23.706964 kernel: audit: type=1103 audit(1707769523.696:1658): pid=5650 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:23.725000 audit[2551]: AVC avc: denied { watch } for pid=2551 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:25:23.725000 audit[2551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001302780 a2=fc6 a3=0 items=0 ppid=2393 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 key=(null) Feb 12 20:25:23.749229 kernel: audit: type=1400 audit(1707769523.725:1659): avc: denied { watch } for pid=2551 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:25:23.749371 kernel: audit: type=1300 audit(1707769523.725:1659): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001302780 a2=fc6 a3=0 items=0 ppid=2393 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 key=(null) Feb 12 20:25:23.725000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:25:23.735000 audit[2551]: AVC avc: denied { watch } for pid=2551 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:25:23.735000 audit[2551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000cc2520 a2=fc6 a3=0 items=0 ppid=2393 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 key=(null) Feb 12 20:25:23.735000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:25:23.935569 sshd[5648]: pam_unix(sshd:session): session closed for user core Feb 12 20:25:23.936000 audit[5648]: USER_END pid=5648 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:23.936000 audit[5648]: CRED_DISP pid=5648 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:23.940435 systemd-logind[1628]: Session 24 logged out. Waiting for processes to exit. Feb 12 20:25:23.941734 systemd[1]: sshd@23-172.31.19.54:22-147.75.109.163:36080.service: Deactivated successfully. Feb 12 20:25:23.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.19.54:22-147.75.109.163:36080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:23.945029 systemd[1]: session-24.scope: Deactivated successfully. Feb 12 20:25:23.946914 systemd-logind[1628]: Removed session 24. Feb 12 20:25:26.227964 systemd[1]: run-containerd-runc-k8s.io-73c99412070e930d6be43f7770410158e22ef436061cce1355e9abc1e55ced1d-runc.HPcQSi.mount: Deactivated successfully. Feb 12 20:25:26.270000 audit[5677]: NETFILTER_CFG table=filter:136 family=2 entries=9 op=nft_register_rule pid=5677 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:26.270000 audit[5677]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffe1969500 a2=0 a3=ffffb9f6e6c0 items=0 ppid=2946 pid=5677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:26.270000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:26.276000 audit[5677]: NETFILTER_CFG table=nat:137 family=2 entries=51 op=nft_register_chain pid=5677 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:26.276000 audit[5677]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=17716 a0=3 a1=ffffe1969500 a2=0 a3=ffffb9f6e6c0 items=0 ppid=2946 pid=5677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:26.276000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:26.333374 kubelet[2764]: I0212 20:25:26.333316 2764 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-84b8bd5599-mxgvp" podStartSLOduration=28.417061738 podCreationTimestamp="2024-02-12 20:24:55 +0000 UTC" firstStartedPulling="2024-02-12 20:24:56.906535186 +0000 UTC m=+90.492175485" lastFinishedPulling="2024-02-12 20:24:59.822659097 +0000 UTC m=+93.408299408" observedRunningTime="2024-02-12 20:25:00.207240187 +0000 UTC m=+93.792880510" watchObservedRunningTime="2024-02-12 20:25:26.333185661 +0000 UTC m=+119.918825972" Feb 12 20:25:26.373000 audit[5683]: NETFILTER_CFG table=filter:138 family=2 entries=8 op=nft_register_rule pid=5683 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:26.373000 audit[5683]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffe796e750 a2=0 a3=ffff9b5096c0 items=0 ppid=2946 pid=5683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:26.373000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:26.379000 audit[5683]: NETFILTER_CFG table=nat:139 family=2 entries=58 op=nft_register_chain pid=5683 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:26.379000 audit[5683]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19604 a0=3 a1=ffffe796e750 a2=0 a3=ffff9b5096c0 items=0 ppid=2946 pid=5683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:26.379000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:27.204000 audit[2551]: AVC avc: denied { watch } for pid=2551 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:25:27.204000 audit[2551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000fb8a00 a2=fc6 a3=0 items=0 ppid=2393 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 key=(null) Feb 12 20:25:27.204000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:25:27.217000 audit[2551]: AVC avc: denied { watch } for pid=2551 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:25:27.217000 audit[2551]: AVC avc: denied { watch } for pid=2551 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:25:27.217000 audit[2551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000c633a0 a2=fc6 a3=0 items=0 ppid=2393 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 key=(null) Feb 12 20:25:27.217000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:25:27.217000 audit[2551]: AVC avc: denied { watch } for pid=2551 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:25:27.217000 audit[2551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000c633e0 a2=fc6 a3=0 items=0 ppid=2393 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 key=(null) Feb 12 20:25:27.217000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:25:27.217000 audit[2551]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000fb8a20 a2=fc6 a3=0 items=0 ppid=2393 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 key=(null) Feb 12 20:25:27.217000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:25:28.967455 systemd[1]: Started sshd@24-172.31.19.54:22-147.75.109.163:52562.service. Feb 12 20:25:28.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.19.54:22-147.75.109.163:52562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:28.970613 kernel: kauditd_printk_skb: 31 callbacks suppressed Feb 12 20:25:28.970724 kernel: audit: type=1130 audit(1707769528.966:1672): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.19.54:22-147.75.109.163:52562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:29.157000 audit[5688]: USER_ACCT pid=5688 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:29.159708 sshd[5688]: Accepted publickey for core from 147.75.109.163 port 52562 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:25:29.171330 kernel: audit: type=1101 audit(1707769529.157:1673): pid=5688 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:29.170000 audit[5688]: CRED_ACQ pid=5688 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:29.172825 sshd[5688]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:25:29.188685 kernel: audit: type=1103 audit(1707769529.170:1674): pid=5688 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:29.188842 kernel: audit: type=1006 audit(1707769529.170:1675): pid=5688 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 12 20:25:29.170000 audit[5688]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd539b30 a2=3 a3=1 items=0 ppid=1 pid=5688 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:29.201687 kernel: audit: type=1300 audit(1707769529.170:1675): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd539b30 a2=3 a3=1 items=0 ppid=1 pid=5688 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:29.170000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:25:29.209992 kernel: audit: type=1327 audit(1707769529.170:1675): proctitle=737368643A20636F7265205B707269765D Feb 12 20:25:29.210245 systemd-logind[1628]: New session 25 of user core. Feb 12 20:25:29.210429 systemd[1]: Started session-25.scope. Feb 12 20:25:29.224000 audit[5688]: USER_START pid=5688 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:29.236000 audit[5690]: CRED_ACQ pid=5690 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:29.249359 kernel: audit: type=1105 audit(1707769529.224:1676): pid=5688 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:29.249485 kernel: audit: type=1103 audit(1707769529.236:1677): pid=5690 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:29.487888 sshd[5688]: pam_unix(sshd:session): session closed for user core Feb 12 20:25:29.491000 audit[5688]: USER_END pid=5688 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:29.503000 audit[5688]: CRED_DISP pid=5688 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:29.515313 kernel: audit: type=1106 audit(1707769529.491:1678): pid=5688 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:29.515440 kernel: audit: type=1104 audit(1707769529.503:1679): pid=5688 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:29.507166 systemd[1]: session-25.scope: Deactivated successfully. Feb 12 20:25:29.508383 systemd[1]: sshd@24-172.31.19.54:22-147.75.109.163:52562.service: Deactivated successfully. Feb 12 20:25:29.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.19.54:22-147.75.109.163:52562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:29.517174 systemd-logind[1628]: Session 25 logged out. Waiting for processes to exit. Feb 12 20:25:29.519145 systemd-logind[1628]: Removed session 25. Feb 12 20:25:30.335077 systemd[1]: run-containerd-runc-k8s.io-d7c96b36e6a4155fa6e2100fc40341a23845f6e27687d94cd4634d1d6a120475-runc.RWB6S7.mount: Deactivated successfully. Feb 12 20:25:32.654149 systemd[1]: run-containerd-runc-k8s.io-ccc3138ea94139585d2c5d0f827530663ede048b728368cadb8ebc3744b21b6c-runc.cYwvBT.mount: Deactivated successfully. Feb 12 20:25:34.520073 systemd[1]: Started sshd@25-172.31.19.54:22-147.75.109.163:60854.service. Feb 12 20:25:34.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.19.54:22-147.75.109.163:60854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:34.529305 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:25:34.529432 kernel: audit: type=1130 audit(1707769534.519:1681): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.19.54:22-147.75.109.163:60854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:34.693000 audit[5740]: USER_ACCT pid=5740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:34.695384 sshd[5740]: Accepted publickey for core from 147.75.109.163 port 60854 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:25:34.698603 sshd[5740]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:25:34.696000 audit[5740]: CRED_ACQ pid=5740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:34.713757 systemd[1]: Started session-26.scope. Feb 12 20:25:34.715360 systemd-logind[1628]: New session 26 of user core. Feb 12 20:25:34.718559 kernel: audit: type=1101 audit(1707769534.693:1682): pid=5740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:34.718658 kernel: audit: type=1103 audit(1707769534.696:1683): pid=5740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:34.724817 kernel: audit: type=1006 audit(1707769534.696:1684): pid=5740 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 12 20:25:34.696000 audit[5740]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9fac250 a2=3 a3=1 items=0 ppid=1 pid=5740 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:34.738532 kernel: audit: type=1300 audit(1707769534.696:1684): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9fac250 a2=3 a3=1 items=0 ppid=1 pid=5740 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:34.696000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:25:34.746994 kernel: audit: type=1327 audit(1707769534.696:1684): proctitle=737368643A20636F7265205B707269765D Feb 12 20:25:34.734000 audit[5740]: USER_START pid=5740 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:34.758779 kernel: audit: type=1105 audit(1707769534.734:1685): pid=5740 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:34.758963 kernel: audit: type=1103 audit(1707769534.739:1686): pid=5749 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:34.739000 audit[5749]: CRED_ACQ pid=5749 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:34.986082 sshd[5740]: pam_unix(sshd:session): session closed for user core Feb 12 20:25:34.987000 audit[5740]: USER_END pid=5740 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:34.992573 systemd-logind[1628]: Session 26 logged out. Waiting for processes to exit. Feb 12 20:25:34.995631 systemd[1]: session-26.scope: Deactivated successfully. Feb 12 20:25:34.998054 systemd-logind[1628]: Removed session 26. Feb 12 20:25:34.987000 audit[5740]: CRED_DISP pid=5740 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:35.002213 systemd[1]: sshd@25-172.31.19.54:22-147.75.109.163:60854.service: Deactivated successfully. Feb 12 20:25:35.009699 kernel: audit: type=1106 audit(1707769534.987:1687): pid=5740 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:35.009859 kernel: audit: type=1104 audit(1707769534.987:1688): pid=5740 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:34.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.19.54:22-147.75.109.163:60854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:40.018528 systemd[1]: Started sshd@26-172.31.19.54:22-147.75.109.163:60868.service. Feb 12 20:25:40.030585 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:25:40.030743 kernel: audit: type=1130 audit(1707769540.018:1690): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.19.54:22-147.75.109.163:60868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:40.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.19.54:22-147.75.109.163:60868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:40.192000 audit[5762]: USER_ACCT pid=5762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:40.194212 sshd[5762]: Accepted publickey for core from 147.75.109.163 port 60868 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:25:40.205348 kernel: audit: type=1101 audit(1707769540.192:1691): pid=5762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:40.204000 audit[5762]: CRED_ACQ pid=5762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:40.207358 sshd[5762]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:25:40.222891 kernel: audit: type=1103 audit(1707769540.204:1692): pid=5762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:40.223083 kernel: audit: type=1006 audit(1707769540.205:1693): pid=5762 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 12 20:25:40.205000 audit[5762]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffed35bcd0 a2=3 a3=1 items=0 ppid=1 pid=5762 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.233184 kernel: audit: type=1300 audit(1707769540.205:1693): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffed35bcd0 a2=3 a3=1 items=0 ppid=1 pid=5762 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.237225 kernel: audit: type=1327 audit(1707769540.205:1693): proctitle=737368643A20636F7265205B707269765D Feb 12 20:25:40.205000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:25:40.240000 systemd-logind[1628]: New session 27 of user core. Feb 12 20:25:40.241451 systemd[1]: Started session-27.scope. Feb 12 20:25:40.250000 audit[5762]: USER_START pid=5762 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:40.264393 kernel: audit: type=1105 audit(1707769540.250:1694): pid=5762 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:40.263000 audit[5764]: CRED_ACQ pid=5764 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:40.275356 kernel: audit: type=1103 audit(1707769540.263:1695): pid=5764 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:40.508179 sshd[5762]: pam_unix(sshd:session): session closed for user core Feb 12 20:25:40.509000 audit[5762]: USER_END pid=5762 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:40.513967 systemd-logind[1628]: Session 27 logged out. Waiting for processes to exit. Feb 12 20:25:40.517070 systemd[1]: sshd@26-172.31.19.54:22-147.75.109.163:60868.service: Deactivated successfully. Feb 12 20:25:40.518448 systemd[1]: session-27.scope: Deactivated successfully. Feb 12 20:25:40.521909 systemd-logind[1628]: Removed session 27. Feb 12 20:25:40.509000 audit[5762]: CRED_DISP pid=5762 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:40.532051 kernel: audit: type=1106 audit(1707769540.509:1696): pid=5762 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:40.532371 kernel: audit: type=1104 audit(1707769540.509:1697): pid=5762 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:40.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.19.54:22-147.75.109.163:60868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:45.538071 systemd[1]: Started sshd@27-172.31.19.54:22-147.75.109.163:52462.service. Feb 12 20:25:45.550072 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:25:45.550209 kernel: audit: type=1130 audit(1707769545.537:1699): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.19.54:22-147.75.109.163:52462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:45.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.19.54:22-147.75.109.163:52462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:45.715000 audit[5776]: USER_ACCT pid=5776 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:45.716766 sshd[5776]: Accepted publickey for core from 147.75.109.163 port 52462 ssh2: RSA SHA256:ecUhSIJgyplxxRcBUTSxTp+B0aPr5wgDdA3tvIID0Hc Feb 12 20:25:45.729329 kernel: audit: type=1101 audit(1707769545.715:1700): pid=5776 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:45.729000 audit[5776]: CRED_ACQ pid=5776 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:45.731879 sshd[5776]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:25:45.747534 kernel: audit: type=1103 audit(1707769545.729:1701): pid=5776 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:45.747683 kernel: audit: type=1006 audit(1707769545.729:1702): pid=5776 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 12 20:25:45.747735 kernel: audit: type=1300 audit(1707769545.729:1702): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd9d4f7c0 a2=3 a3=1 items=0 ppid=1 pid=5776 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:45.729000 audit[5776]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd9d4f7c0 a2=3 a3=1 items=0 ppid=1 pid=5776 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:45.750920 systemd[1]: Started session-28.scope. Feb 12 20:25:45.753018 systemd-logind[1628]: New session 28 of user core. Feb 12 20:25:45.729000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:25:45.761728 kernel: audit: type=1327 audit(1707769545.729:1702): proctitle=737368643A20636F7265205B707269765D Feb 12 20:25:45.767000 audit[5776]: USER_START pid=5776 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:45.781459 kernel: audit: type=1105 audit(1707769545.767:1703): pid=5776 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:45.781626 kernel: audit: type=1103 audit(1707769545.772:1704): pid=5778 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:45.772000 audit[5778]: CRED_ACQ pid=5778 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:46.019693 sshd[5776]: pam_unix(sshd:session): session closed for user core Feb 12 20:25:46.020000 audit[5776]: USER_END pid=5776 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:46.025060 systemd[1]: session-28.scope: Deactivated successfully. Feb 12 20:25:46.026801 systemd[1]: sshd@27-172.31.19.54:22-147.75.109.163:52462.service: Deactivated successfully. Feb 12 20:25:46.021000 audit[5776]: CRED_DISP pid=5776 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:46.035021 systemd-logind[1628]: Session 28 logged out. Waiting for processes to exit. Feb 12 20:25:46.037103 systemd-logind[1628]: Removed session 28. Feb 12 20:25:46.042463 kernel: audit: type=1106 audit(1707769546.020:1705): pid=5776 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:46.042675 kernel: audit: type=1104 audit(1707769546.021:1706): pid=5776 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:25:46.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.19.54:22-147.75.109.163:52462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:56.220985 systemd[1]: run-containerd-runc-k8s.io-73c99412070e930d6be43f7770410158e22ef436061cce1355e9abc1e55ced1d-runc.dnIUeA.mount: Deactivated successfully. Feb 12 20:25:59.633950 kubelet[2764]: E0212 20:25:59.633872 2764 controller.go:193] "Failed to update lease" err="Put \"https://172.31.19.54:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-19-54?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 12 20:26:00.351264 systemd[1]: run-containerd-runc-k8s.io-d7c96b36e6a4155fa6e2100fc40341a23845f6e27687d94cd4634d1d6a120475-runc.8byz3v.mount: Deactivated successfully. Feb 12 20:26:00.950723 systemd[1]: cri-containerd-800bb18dc6e8a58fbf74f3b3aa14623c26ce6765dca4123967772ea98ca7ac8e.scope: Deactivated successfully. Feb 12 20:26:00.951417 systemd[1]: cri-containerd-800bb18dc6e8a58fbf74f3b3aa14623c26ce6765dca4123967772ea98ca7ac8e.scope: Consumed 6.503s CPU time. Feb 12 20:26:00.956000 audit: BPF prog-id=96 op=UNLOAD Feb 12 20:26:00.959699 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:26:00.959822 kernel: audit: type=1334 audit(1707769560.956:1708): prog-id=96 op=UNLOAD Feb 12 20:26:00.956000 audit: BPF prog-id=109 op=UNLOAD Feb 12 20:26:00.967703 kernel: audit: type=1334 audit(1707769560.956:1709): prog-id=109 op=UNLOAD Feb 12 20:26:01.008415 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-800bb18dc6e8a58fbf74f3b3aa14623c26ce6765dca4123967772ea98ca7ac8e-rootfs.mount: Deactivated successfully. Feb 12 20:26:01.011516 env[1651]: time="2024-02-12T20:26:01.011226870Z" level=info msg="shim disconnected" id=800bb18dc6e8a58fbf74f3b3aa14623c26ce6765dca4123967772ea98ca7ac8e Feb 12 20:26:01.012502 env[1651]: time="2024-02-12T20:26:01.012429354Z" level=warning msg="cleaning up after shim disconnected" id=800bb18dc6e8a58fbf74f3b3aa14623c26ce6765dca4123967772ea98ca7ac8e namespace=k8s.io Feb 12 20:26:01.012742 env[1651]: time="2024-02-12T20:26:01.012698861Z" level=info msg="cleaning up dead shim" Feb 12 20:26:01.028723 env[1651]: time="2024-02-12T20:26:01.028659883Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:26:01Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5852 runtime=io.containerd.runc.v2\n" Feb 12 20:26:01.119000 audit: BPF prog-id=129 op=UNLOAD Feb 12 20:26:01.120424 systemd[1]: cri-containerd-f306bdc88903c3ab952d5bc91762387d0baa6bf6da2d513a8e23e92844622140.scope: Deactivated successfully. Feb 12 20:26:01.121076 systemd[1]: cri-containerd-f306bdc88903c3ab952d5bc91762387d0baa6bf6da2d513a8e23e92844622140.scope: Consumed 12.325s CPU time. Feb 12 20:26:01.127318 kernel: audit: type=1334 audit(1707769561.119:1710): prog-id=129 op=UNLOAD Feb 12 20:26:01.125000 audit: BPF prog-id=132 op=UNLOAD Feb 12 20:26:01.132333 kernel: audit: type=1334 audit(1707769561.125:1711): prog-id=132 op=UNLOAD Feb 12 20:26:01.168079 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f306bdc88903c3ab952d5bc91762387d0baa6bf6da2d513a8e23e92844622140-rootfs.mount: Deactivated successfully. Feb 12 20:26:01.172514 env[1651]: time="2024-02-12T20:26:01.172445842Z" level=info msg="shim disconnected" id=f306bdc88903c3ab952d5bc91762387d0baa6bf6da2d513a8e23e92844622140 Feb 12 20:26:01.172988 env[1651]: time="2024-02-12T20:26:01.172933462Z" level=warning msg="cleaning up after shim disconnected" id=f306bdc88903c3ab952d5bc91762387d0baa6bf6da2d513a8e23e92844622140 namespace=k8s.io Feb 12 20:26:01.173165 env[1651]: time="2024-02-12T20:26:01.173133717Z" level=info msg="cleaning up dead shim" Feb 12 20:26:01.188892 env[1651]: time="2024-02-12T20:26:01.188834903Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:26:01Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5877 runtime=io.containerd.runc.v2\n" Feb 12 20:26:01.391053 kubelet[2764]: I0212 20:26:01.388261 2764 scope.go:115] "RemoveContainer" containerID="800bb18dc6e8a58fbf74f3b3aa14623c26ce6765dca4123967772ea98ca7ac8e" Feb 12 20:26:01.396470 env[1651]: time="2024-02-12T20:26:01.396403161Z" level=info msg="CreateContainer within sandbox \"282e210a4807228453ff2a2916ee8836f1534c6697aec5d666e769c0d8d358ce\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Feb 12 20:26:01.399610 kubelet[2764]: I0212 20:26:01.399567 2764 scope.go:115] "RemoveContainer" containerID="f306bdc88903c3ab952d5bc91762387d0baa6bf6da2d513a8e23e92844622140" Feb 12 20:26:01.405123 env[1651]: time="2024-02-12T20:26:01.405056379Z" level=info msg="CreateContainer within sandbox \"3dd280c4249166b457c65f8c4e42a9cce351d80d3b61d36f47c03035aadd794b\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Feb 12 20:26:01.429504 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2781513162.mount: Deactivated successfully. Feb 12 20:26:01.447682 env[1651]: time="2024-02-12T20:26:01.447586271Z" level=info msg="CreateContainer within sandbox \"282e210a4807228453ff2a2916ee8836f1534c6697aec5d666e769c0d8d358ce\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"10cbec02a4243fb2d70a6accf0934e7d2ea6b424cfa6986ef6606a9c9e4a9c5d\"" Feb 12 20:26:01.448582 env[1651]: time="2024-02-12T20:26:01.448515863Z" level=info msg="StartContainer for \"10cbec02a4243fb2d70a6accf0934e7d2ea6b424cfa6986ef6606a9c9e4a9c5d\"" Feb 12 20:26:01.461688 env[1651]: time="2024-02-12T20:26:01.461604278Z" level=info msg="CreateContainer within sandbox \"3dd280c4249166b457c65f8c4e42a9cce351d80d3b61d36f47c03035aadd794b\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"222b4d6873ce830d2b5c5f911b43bc77ef4e28bce1c5fa139de8b58df5219abf\"" Feb 12 20:26:01.464411 env[1651]: time="2024-02-12T20:26:01.464353009Z" level=info msg="StartContainer for \"222b4d6873ce830d2b5c5f911b43bc77ef4e28bce1c5fa139de8b58df5219abf\"" Feb 12 20:26:01.499141 systemd[1]: Started cri-containerd-10cbec02a4243fb2d70a6accf0934e7d2ea6b424cfa6986ef6606a9c9e4a9c5d.scope. Feb 12 20:26:01.538100 systemd[1]: Started cri-containerd-222b4d6873ce830d2b5c5f911b43bc77ef4e28bce1c5fa139de8b58df5219abf.scope. Feb 12 20:26:01.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566742 kernel: audit: type=1400 audit(1707769561.550:1712): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566956 kernel: audit: type=1400 audit(1707769561.550:1713): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.576012 kernel: audit: type=1400 audit(1707769561.550:1714): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.587313 kernel: audit: type=1400 audit(1707769561.550:1715): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.560000 audit: BPF prog-id=217 op=LOAD Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { bpf } for pid=5897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2393 pid=5897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:01.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130636265633032613432343366623264373061366163636630393334 Feb 12 20:26:01.608401 kernel: audit: type=1400 audit(1707769561.550:1716): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.608479 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { perfmon } for pid=5897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2393 pid=5897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:01.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130636265633032613432343366623264373061366163636630393334 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { bpf } for pid=5897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { bpf } for pid=5897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { bpf } for pid=5897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { perfmon } for pid=5897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { perfmon } for pid=5897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { perfmon } for pid=5897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { perfmon } for pid=5897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { perfmon } for pid=5897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { bpf } for pid=5897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { bpf } for pid=5897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit: BPF prog-id=218 op=LOAD Feb 12 20:26:01.566000 audit[5897]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2393 pid=5897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:01.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130636265633032613432343366623264373061366163636630393334 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { bpf } for pid=5897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { bpf } for pid=5897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { perfmon } for pid=5897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { perfmon } for pid=5897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { perfmon } for pid=5897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { perfmon } for pid=5897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { perfmon } for pid=5897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { bpf } for pid=5897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { bpf } for pid=5897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit: BPF prog-id=219 op=LOAD Feb 12 20:26:01.566000 audit[5897]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2393 pid=5897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:01.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130636265633032613432343366623264373061366163636630393334 Feb 12 20:26:01.566000 audit: BPF prog-id=219 op=UNLOAD Feb 12 20:26:01.566000 audit: BPF prog-id=218 op=UNLOAD Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { bpf } for pid=5897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { bpf } for pid=5897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { bpf } for pid=5897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { perfmon } for pid=5897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { perfmon } for pid=5897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { perfmon } for pid=5897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { perfmon } for pid=5897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { perfmon } for pid=5897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { bpf } for pid=5897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit[5897]: AVC avc: denied { bpf } for pid=5897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.566000 audit: BPF prog-id=220 op=LOAD Feb 12 20:26:01.566000 audit[5897]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2393 pid=5897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:01.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130636265633032613432343366623264373061366163636630393334 Feb 12 20:26:01.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.611000 audit: BPF prog-id=221 op=LOAD Feb 12 20:26:01.613000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.613000 audit[5915]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2849 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:01.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232326234643638373363653833306432623563356639313162343362 Feb 12 20:26:01.613000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.613000 audit[5915]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2849 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:01.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232326234643638373363653833306432623563356639313162343362 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit: BPF prog-id=222 op=LOAD Feb 12 20:26:01.614000 audit[5915]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2849 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:01.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232326234643638373363653833306432623563356639313162343362 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit: BPF prog-id=223 op=LOAD Feb 12 20:26:01.614000 audit[5915]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2849 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:01.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232326234643638373363653833306432623563356639313162343362 Feb 12 20:26:01.614000 audit: BPF prog-id=223 op=UNLOAD Feb 12 20:26:01.614000 audit: BPF prog-id=222 op=UNLOAD Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:01.614000 audit: BPF prog-id=224 op=LOAD Feb 12 20:26:01.614000 audit[5915]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2849 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:01.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232326234643638373363653833306432623563356639313162343362 Feb 12 20:26:01.672953 env[1651]: time="2024-02-12T20:26:01.668309532Z" level=info msg="StartContainer for \"222b4d6873ce830d2b5c5f911b43bc77ef4e28bce1c5fa139de8b58df5219abf\" returns successfully" Feb 12 20:26:01.673699 env[1651]: time="2024-02-12T20:26:01.673440729Z" level=info msg="StartContainer for \"10cbec02a4243fb2d70a6accf0934e7d2ea6b424cfa6986ef6606a9c9e4a9c5d\" returns successfully" Feb 12 20:26:02.665000 audit[5464]: AVC avc: denied { watch } for pid=5464 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_20_24_56.1214017608/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c486 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c113,c486 tclass=file permissive=0 Feb 12 20:26:02.665000 audit[5464]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001c2eb00 a2=fc6 a3=0 items=0 ppid=5393 pid=5464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c486 key=(null) Feb 12 20:26:02.665000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 20:26:04.768000 audit[5917]: AVC avc: denied { watch } for pid=5917 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520986 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:26:04.768000 audit[5917]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000ea2000 a2=fc6 a3=0 items=0 ppid=2393 pid=5917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 key=(null) Feb 12 20:26:04.768000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:26:04.770000 audit[5917]: AVC avc: denied { watch } for pid=5917 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:26:04.770000 audit[5917]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000342440 a2=fc6 a3=0 items=0 ppid=2393 pid=5917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c393,c695 key=(null) Feb 12 20:26:04.770000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:26:06.096697 systemd[1]: cri-containerd-d0982d300617c2d6f87557976a09072bf4081f03503814b08315dc40ed8d89bd.scope: Deactivated successfully. Feb 12 20:26:06.097228 systemd[1]: cri-containerd-d0982d300617c2d6f87557976a09072bf4081f03503814b08315dc40ed8d89bd.scope: Consumed 4.575s CPU time. Feb 12 20:26:06.099000 audit: BPF prog-id=92 op=UNLOAD Feb 12 20:26:06.102564 kernel: kauditd_printk_skb: 119 callbacks suppressed Feb 12 20:26:06.102678 kernel: audit: type=1334 audit(1707769566.099:1750): prog-id=92 op=UNLOAD Feb 12 20:26:06.105477 kernel: audit: type=1334 audit(1707769566.099:1751): prog-id=115 op=UNLOAD Feb 12 20:26:06.099000 audit: BPF prog-id=115 op=UNLOAD Feb 12 20:26:06.144220 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d0982d300617c2d6f87557976a09072bf4081f03503814b08315dc40ed8d89bd-rootfs.mount: Deactivated successfully. Feb 12 20:26:06.148307 env[1651]: time="2024-02-12T20:26:06.148208654Z" level=info msg="shim disconnected" id=d0982d300617c2d6f87557976a09072bf4081f03503814b08315dc40ed8d89bd Feb 12 20:26:06.149077 env[1651]: time="2024-02-12T20:26:06.149022253Z" level=warning msg="cleaning up after shim disconnected" id=d0982d300617c2d6f87557976a09072bf4081f03503814b08315dc40ed8d89bd namespace=k8s.io Feb 12 20:26:06.149478 env[1651]: time="2024-02-12T20:26:06.149432569Z" level=info msg="cleaning up dead shim" Feb 12 20:26:06.165699 env[1651]: time="2024-02-12T20:26:06.165637971Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:26:06Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5999 runtime=io.containerd.runc.v2\n" Feb 12 20:26:06.454319 kubelet[2764]: I0212 20:26:06.454165 2764 scope.go:115] "RemoveContainer" containerID="d0982d300617c2d6f87557976a09072bf4081f03503814b08315dc40ed8d89bd" Feb 12 20:26:06.458528 env[1651]: time="2024-02-12T20:26:06.458458355Z" level=info msg="CreateContainer within sandbox \"3ac5fa9a36efd963c16378fe02bb11ae08dce216a0e9d7b2608455bdcc9159d0\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Feb 12 20:26:06.487789 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3928523266.mount: Deactivated successfully. Feb 12 20:26:06.495789 env[1651]: time="2024-02-12T20:26:06.495700452Z" level=info msg="CreateContainer within sandbox \"3ac5fa9a36efd963c16378fe02bb11ae08dce216a0e9d7b2608455bdcc9159d0\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"739fd66aeb009e905f7cd2e0353c5e3c2a632cc21e0adcfdf996aaa1eff4a435\"" Feb 12 20:26:06.496746 env[1651]: time="2024-02-12T20:26:06.496642727Z" level=info msg="StartContainer for \"739fd66aeb009e905f7cd2e0353c5e3c2a632cc21e0adcfdf996aaa1eff4a435\"" Feb 12 20:26:06.551942 systemd[1]: Started cri-containerd-739fd66aeb009e905f7cd2e0353c5e3c2a632cc21e0adcfdf996aaa1eff4a435.scope. Feb 12 20:26:06.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.602141 kernel: audit: type=1400 audit(1707769566.584:1752): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.602422 kernel: audit: type=1400 audit(1707769566.592:1753): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.610333 kernel: audit: type=1400 audit(1707769566.592:1754): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.611467 kernel: audit: type=1400 audit(1707769566.592:1755): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.627502 kernel: audit: type=1400 audit(1707769566.592:1756): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.635454 kernel: audit: type=1400 audit(1707769566.592:1757): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.635600 kernel: audit: type=1400 audit(1707769566.592:1758): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.643049 kernel: audit: type=1400 audit(1707769566.592:1759): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.592000 audit: BPF prog-id=225 op=LOAD Feb 12 20:26:06.593000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.593000 audit[6019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2397 pid=6019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:06.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733396664363661656230303965393035663763643265303335336335 Feb 12 20:26:06.593000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.593000 audit[6019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2397 pid=6019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:06.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733396664363661656230303965393035663763643265303335336335 Feb 12 20:26:06.593000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.593000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.593000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.593000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.593000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.593000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.593000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.593000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.593000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.593000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.593000 audit: BPF prog-id=226 op=LOAD Feb 12 20:26:06.593000 audit[6019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2397 pid=6019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:06.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733396664363661656230303965393035663763643265303335336335 Feb 12 20:26:06.601000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.601000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.601000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.601000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.601000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.601000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.601000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.601000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.601000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.601000 audit: BPF prog-id=227 op=LOAD Feb 12 20:26:06.601000 audit[6019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2397 pid=6019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:06.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733396664363661656230303965393035663763643265303335336335 Feb 12 20:26:06.601000 audit: BPF prog-id=227 op=UNLOAD Feb 12 20:26:06.601000 audit: BPF prog-id=226 op=UNLOAD Feb 12 20:26:06.601000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.601000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.601000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.601000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.601000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.601000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.601000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.601000 audit[6019]: AVC avc: denied { perfmon } for pid=6019 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.601000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.601000 audit[6019]: AVC avc: denied { bpf } for pid=6019 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.601000 audit: BPF prog-id=228 op=LOAD Feb 12 20:26:06.601000 audit[6019]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2397 pid=6019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:06.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733396664363661656230303965393035663763643265303335336335 Feb 12 20:26:06.683866 env[1651]: time="2024-02-12T20:26:06.681095847Z" level=info msg="StartContainer for \"739fd66aeb009e905f7cd2e0353c5e3c2a632cc21e0adcfdf996aaa1eff4a435\" returns successfully" Feb 12 20:26:09.634301 kubelet[2764]: E0212 20:26:09.634215 2764 controller.go:193] "Failed to update lease" err="Put \"https://172.31.19.54:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-19-54?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 12 20:26:16.593307 kernel: kauditd_printk_skb: 49 callbacks suppressed Feb 12 20:26:16.593481 kernel: audit: type=1130 audit(1707769576.589:1770): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.19.54:22-205.210.31.200:53648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:16.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.19.54:22-205.210.31.200:53648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:16.590918 systemd[1]: Started sshd@28-172.31.19.54:22-205.210.31.200:53648.service. Feb 12 20:26:16.934112 sshd[6071]: kex_exchange_identification: Connection closed by remote host Feb 12 20:26:16.934789 sshd[6071]: Connection closed by 205.210.31.200 port 53648 Feb 12 20:26:16.936097 systemd[1]: sshd@28-172.31.19.54:22-205.210.31.200:53648.service: Deactivated successfully. Feb 12 20:26:16.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.19.54:22-205.210.31.200:53648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:16.946357 kernel: audit: type=1131 audit(1707769576.935:1771): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.19.54:22-205.210.31.200:53648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:26:19.634655 kubelet[2764]: E0212 20:26:19.634600 2764 controller.go:193] "Failed to update lease" err="Put \"https://172.31.19.54:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-19-54?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)"