Feb 13 12:53:39.948618 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Feb 13 12:53:39.948655 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Feb 12 18:07:00 -00 2024 Feb 13 12:53:39.948677 kernel: efi: EFI v2.70 by EDK II Feb 13 12:53:39.948692 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7ac1aa98 MEMRESERVE=0x71a8cf98 Feb 13 12:53:39.948706 kernel: ACPI: Early table checksum verification disabled Feb 13 12:53:39.948719 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Feb 13 12:53:39.948735 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Feb 13 12:53:39.948749 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Feb 13 12:53:39.948763 kernel: ACPI: DSDT 0x0000000078640000 00154F (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Feb 13 12:53:39.948776 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Feb 13 12:53:39.948794 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Feb 13 12:53:39.948808 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Feb 13 12:53:39.948821 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Feb 13 12:53:39.948835 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Feb 13 12:53:39.948851 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Feb 13 12:53:39.948871 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Feb 13 12:53:39.948885 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Feb 13 12:53:39.948900 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Feb 13 12:53:39.948914 kernel: printk: bootconsole [uart0] enabled Feb 13 12:53:39.948928 kernel: NUMA: Failed to initialise from firmware Feb 13 12:53:39.948960 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Feb 13 12:53:39.948981 kernel: NUMA: NODE_DATA [mem 0x4b5841900-0x4b5846fff] Feb 13 12:53:39.948997 kernel: Zone ranges: Feb 13 12:53:39.949012 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Feb 13 12:53:39.949027 kernel: DMA32 empty Feb 13 12:53:39.949041 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Feb 13 12:53:39.949061 kernel: Movable zone start for each node Feb 13 12:53:39.949075 kernel: Early memory node ranges Feb 13 12:53:39.949090 kernel: node 0: [mem 0x0000000040000000-0x00000000786effff] Feb 13 12:53:39.949105 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Feb 13 12:53:39.949119 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Feb 13 12:53:39.949134 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Feb 13 12:53:39.949148 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Feb 13 12:53:39.949162 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Feb 13 12:53:39.949177 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Feb 13 12:53:39.949191 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Feb 13 12:53:39.949205 kernel: psci: probing for conduit method from ACPI. Feb 13 12:53:39.949219 kernel: psci: PSCIv1.0 detected in firmware. Feb 13 12:53:39.949238 kernel: psci: Using standard PSCI v0.2 function IDs Feb 13 12:53:39.949252 kernel: psci: Trusted OS migration not required Feb 13 12:53:39.949273 kernel: psci: SMC Calling Convention v1.1 Feb 13 12:53:39.949289 kernel: ACPI: SRAT not present Feb 13 12:53:39.949304 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 13 12:53:39.949323 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 13 12:53:39.949338 kernel: pcpu-alloc: [0] 0 [0] 1 Feb 13 12:53:39.949353 kernel: Detected PIPT I-cache on CPU0 Feb 13 12:53:39.949368 kernel: CPU features: detected: GIC system register CPU interface Feb 13 12:53:39.949383 kernel: CPU features: detected: Spectre-v2 Feb 13 12:53:39.949398 kernel: CPU features: detected: Spectre-v3a Feb 13 12:53:39.949413 kernel: CPU features: detected: Spectre-BHB Feb 13 12:53:39.949428 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 13 12:53:39.949444 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 13 12:53:39.949458 kernel: CPU features: detected: ARM erratum 1742098 Feb 13 12:53:39.949473 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Feb 13 12:53:39.949492 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Feb 13 12:53:39.949507 kernel: Policy zone: Normal Feb 13 12:53:39.949525 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=0a07ee1673be713cb46dc1305004c8854c4690dc8835a87e3bc71aa6c6a62e40 Feb 13 12:53:39.949541 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 13 12:53:39.949555 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 13 12:53:39.949571 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 13 12:53:39.949586 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 13 12:53:39.949601 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Feb 13 12:53:39.949617 kernel: Memory: 3826316K/4030464K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 204148K reserved, 0K cma-reserved) Feb 13 12:53:39.949632 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 13 12:53:39.949651 kernel: trace event string verifier disabled Feb 13 12:53:39.949666 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 13 12:53:39.949681 kernel: rcu: RCU event tracing is enabled. Feb 13 12:53:39.949697 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 13 12:53:39.949712 kernel: Trampoline variant of Tasks RCU enabled. Feb 13 12:53:39.949727 kernel: Tracing variant of Tasks RCU enabled. Feb 13 12:53:39.949743 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 13 12:53:39.949758 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 13 12:53:39.949773 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 13 12:53:39.949788 kernel: GICv3: 96 SPIs implemented Feb 13 12:53:39.949802 kernel: GICv3: 0 Extended SPIs implemented Feb 13 12:53:39.949817 kernel: GICv3: Distributor has no Range Selector support Feb 13 12:53:39.949836 kernel: Root IRQ handler: gic_handle_irq Feb 13 12:53:39.949851 kernel: GICv3: 16 PPIs implemented Feb 13 12:53:39.949866 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Feb 13 12:53:39.949881 kernel: ACPI: SRAT not present Feb 13 12:53:39.949895 kernel: ITS [mem 0x10080000-0x1009ffff] Feb 13 12:53:39.949910 kernel: ITS@0x0000000010080000: allocated 8192 Devices @4000a0000 (indirect, esz 8, psz 64K, shr 1) Feb 13 12:53:39.949926 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000b0000 (flat, esz 8, psz 64K, shr 1) Feb 13 12:53:39.949941 kernel: GICv3: using LPI property table @0x00000004000c0000 Feb 13 12:53:39.950317 kernel: ITS: Using hypervisor restricted LPI range [128] Feb 13 12:53:39.950335 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Feb 13 12:53:39.950350 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Feb 13 12:53:39.950372 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Feb 13 12:53:39.950388 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Feb 13 12:53:39.950403 kernel: Console: colour dummy device 80x25 Feb 13 12:53:39.950419 kernel: printk: console [tty1] enabled Feb 13 12:53:39.950435 kernel: ACPI: Core revision 20210730 Feb 13 12:53:39.950451 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Feb 13 12:53:39.950467 kernel: pid_max: default: 32768 minimum: 301 Feb 13 12:53:39.950482 kernel: LSM: Security Framework initializing Feb 13 12:53:39.950498 kernel: SELinux: Initializing. Feb 13 12:53:39.950514 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 13 12:53:39.950534 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 13 12:53:39.950549 kernel: rcu: Hierarchical SRCU implementation. Feb 13 12:53:39.950565 kernel: Platform MSI: ITS@0x10080000 domain created Feb 13 12:53:39.950597 kernel: PCI/MSI: ITS@0x10080000 domain created Feb 13 12:53:39.950614 kernel: Remapping and enabling EFI services. Feb 13 12:53:39.950630 kernel: smp: Bringing up secondary CPUs ... Feb 13 12:53:39.950645 kernel: Detected PIPT I-cache on CPU1 Feb 13 12:53:39.950661 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Feb 13 12:53:39.950676 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Feb 13 12:53:39.950697 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Feb 13 12:53:39.950713 kernel: smp: Brought up 1 node, 2 CPUs Feb 13 12:53:39.950728 kernel: SMP: Total of 2 processors activated. Feb 13 12:53:39.950744 kernel: CPU features: detected: 32-bit EL0 Support Feb 13 12:53:39.950759 kernel: CPU features: detected: 32-bit EL1 Support Feb 13 12:53:39.950775 kernel: CPU features: detected: CRC32 instructions Feb 13 12:53:39.950791 kernel: CPU: All CPU(s) started at EL1 Feb 13 12:53:39.950806 kernel: alternatives: patching kernel code Feb 13 12:53:39.950822 kernel: devtmpfs: initialized Feb 13 12:53:39.950841 kernel: KASLR disabled due to lack of seed Feb 13 12:53:39.950857 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 13 12:53:39.950874 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 13 12:53:39.950900 kernel: pinctrl core: initialized pinctrl subsystem Feb 13 12:53:39.950919 kernel: SMBIOS 3.0.0 present. Feb 13 12:53:39.950935 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Feb 13 12:53:39.950973 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 13 12:53:39.950993 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 13 12:53:39.951009 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 13 12:53:39.951025 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 13 12:53:39.951041 kernel: audit: initializing netlink subsys (disabled) Feb 13 12:53:39.951058 kernel: audit: type=2000 audit(0.247:1): state=initialized audit_enabled=0 res=1 Feb 13 12:53:39.951079 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 13 12:53:39.951096 kernel: cpuidle: using governor menu Feb 13 12:53:39.951112 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 13 12:53:39.951128 kernel: ASID allocator initialised with 32768 entries Feb 13 12:53:39.951144 kernel: ACPI: bus type PCI registered Feb 13 12:53:39.951164 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 13 12:53:39.951180 kernel: Serial: AMBA PL011 UART driver Feb 13 12:53:39.951197 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 13 12:53:39.951213 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 13 12:53:39.951229 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 13 12:53:39.951245 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 13 12:53:39.951261 kernel: cryptd: max_cpu_qlen set to 1000 Feb 13 12:53:39.951277 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 13 12:53:39.951293 kernel: ACPI: Added _OSI(Module Device) Feb 13 12:53:39.951314 kernel: ACPI: Added _OSI(Processor Device) Feb 13 12:53:39.951330 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 13 12:53:39.951346 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 13 12:53:39.951362 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 13 12:53:39.951378 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 13 12:53:39.951394 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 13 12:53:39.951410 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 13 12:53:39.951427 kernel: ACPI: Interpreter enabled Feb 13 12:53:39.951443 kernel: ACPI: Using GIC for interrupt routing Feb 13 12:53:39.951463 kernel: ACPI: MCFG table detected, 1 entries Feb 13 12:53:39.951479 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Feb 13 12:53:39.951800 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 13 12:53:39.952059 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Feb 13 12:53:39.952288 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Feb 13 12:53:39.952512 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Feb 13 12:53:39.952735 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Feb 13 12:53:39.952762 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Feb 13 12:53:39.952780 kernel: acpiphp: Slot [1] registered Feb 13 12:53:39.952796 kernel: acpiphp: Slot [2] registered Feb 13 12:53:39.952812 kernel: acpiphp: Slot [3] registered Feb 13 12:53:39.952828 kernel: acpiphp: Slot [4] registered Feb 13 12:53:39.952844 kernel: acpiphp: Slot [5] registered Feb 13 12:53:39.952860 kernel: acpiphp: Slot [6] registered Feb 13 12:53:39.952876 kernel: acpiphp: Slot [7] registered Feb 13 12:53:39.952892 kernel: acpiphp: Slot [8] registered Feb 13 12:53:39.952913 kernel: acpiphp: Slot [9] registered Feb 13 12:53:39.952929 kernel: acpiphp: Slot [10] registered Feb 13 12:53:39.952960 kernel: acpiphp: Slot [11] registered Feb 13 12:53:39.953046 kernel: acpiphp: Slot [12] registered Feb 13 12:53:39.964487 kernel: acpiphp: Slot [13] registered Feb 13 12:53:39.964510 kernel: acpiphp: Slot [14] registered Feb 13 12:53:39.964528 kernel: acpiphp: Slot [15] registered Feb 13 12:53:39.964545 kernel: acpiphp: Slot [16] registered Feb 13 12:53:39.964562 kernel: acpiphp: Slot [17] registered Feb 13 12:53:39.971733 kernel: acpiphp: Slot [18] registered Feb 13 12:53:39.971764 kernel: acpiphp: Slot [19] registered Feb 13 12:53:39.971781 kernel: acpiphp: Slot [20] registered Feb 13 12:53:39.971798 kernel: acpiphp: Slot [21] registered Feb 13 12:53:39.971814 kernel: acpiphp: Slot [22] registered Feb 13 12:53:39.971830 kernel: acpiphp: Slot [23] registered Feb 13 12:53:39.971846 kernel: acpiphp: Slot [24] registered Feb 13 12:53:39.971863 kernel: acpiphp: Slot [25] registered Feb 13 12:53:39.971879 kernel: acpiphp: Slot [26] registered Feb 13 12:53:39.971895 kernel: acpiphp: Slot [27] registered Feb 13 12:53:39.971915 kernel: acpiphp: Slot [28] registered Feb 13 12:53:39.971931 kernel: acpiphp: Slot [29] registered Feb 13 12:53:39.973760 kernel: acpiphp: Slot [30] registered Feb 13 12:53:39.973783 kernel: acpiphp: Slot [31] registered Feb 13 12:53:39.973801 kernel: PCI host bridge to bus 0000:00 Feb 13 12:53:39.974058 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Feb 13 12:53:39.974265 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Feb 13 12:53:39.974447 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Feb 13 12:53:39.974630 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Feb 13 12:53:39.974851 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Feb 13 12:53:39.975094 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Feb 13 12:53:39.975302 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Feb 13 12:53:39.975515 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Feb 13 12:53:39.975714 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Feb 13 12:53:39.975917 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 13 12:53:39.981248 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Feb 13 12:53:39.981466 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Feb 13 12:53:39.981674 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Feb 13 12:53:39.981878 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Feb 13 12:53:39.982121 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 13 12:53:39.982343 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Feb 13 12:53:39.982553 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Feb 13 12:53:39.982754 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Feb 13 12:53:39.982967 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Feb 13 12:53:39.983176 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Feb 13 12:53:39.983367 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Feb 13 12:53:39.983550 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Feb 13 12:53:39.983732 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Feb 13 12:53:39.983760 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Feb 13 12:53:39.983778 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Feb 13 12:53:39.983795 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Feb 13 12:53:39.983811 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Feb 13 12:53:39.983828 kernel: iommu: Default domain type: Translated Feb 13 12:53:39.983844 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 13 12:53:39.983860 kernel: vgaarb: loaded Feb 13 12:53:39.983877 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 13 12:53:39.983893 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 13 12:53:39.983914 kernel: PTP clock support registered Feb 13 12:53:39.983930 kernel: Registered efivars operations Feb 13 12:53:39.983964 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 13 12:53:39.983984 kernel: VFS: Disk quotas dquot_6.6.0 Feb 13 12:53:39.984001 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 13 12:53:39.984017 kernel: pnp: PnP ACPI init Feb 13 12:53:39.984238 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Feb 13 12:53:39.984263 kernel: pnp: PnP ACPI: found 1 devices Feb 13 12:53:39.984280 kernel: NET: Registered PF_INET protocol family Feb 13 12:53:39.984303 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 13 12:53:39.984320 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 13 12:53:39.984337 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 13 12:53:39.984353 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 13 12:53:39.984370 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 13 12:53:39.984386 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 13 12:53:39.984403 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 13 12:53:39.984419 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 13 12:53:39.984436 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 13 12:53:39.984457 kernel: PCI: CLS 0 bytes, default 64 Feb 13 12:53:39.984473 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Feb 13 12:53:39.984489 kernel: kvm [1]: HYP mode not available Feb 13 12:53:39.984506 kernel: Initialise system trusted keyrings Feb 13 12:53:39.984523 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 13 12:53:39.984539 kernel: Key type asymmetric registered Feb 13 12:53:39.984555 kernel: Asymmetric key parser 'x509' registered Feb 13 12:53:39.984571 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 13 12:53:39.984588 kernel: io scheduler mq-deadline registered Feb 13 12:53:39.984609 kernel: io scheduler kyber registered Feb 13 12:53:39.984625 kernel: io scheduler bfq registered Feb 13 12:53:39.984822 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Feb 13 12:53:39.984847 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Feb 13 12:53:39.984863 kernel: ACPI: button: Power Button [PWRB] Feb 13 12:53:39.984880 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 13 12:53:39.984897 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Feb 13 12:53:39.985164 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Feb 13 12:53:39.995977 kernel: printk: console [ttyS0] disabled Feb 13 12:53:39.996013 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Feb 13 12:53:39.996031 kernel: printk: console [ttyS0] enabled Feb 13 12:53:39.996049 kernel: printk: bootconsole [uart0] disabled Feb 13 12:53:39.996065 kernel: thunder_xcv, ver 1.0 Feb 13 12:53:39.996082 kernel: thunder_bgx, ver 1.0 Feb 13 12:53:39.996098 kernel: nicpf, ver 1.0 Feb 13 12:53:39.996114 kernel: nicvf, ver 1.0 Feb 13 12:53:39.996354 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 13 12:53:39.996552 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-13T12:53:39 UTC (1707828819) Feb 13 12:53:39.996576 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 13 12:53:39.996593 kernel: NET: Registered PF_INET6 protocol family Feb 13 12:53:39.996610 kernel: Segment Routing with IPv6 Feb 13 12:53:39.996627 kernel: In-situ OAM (IOAM) with IPv6 Feb 13 12:53:39.996643 kernel: NET: Registered PF_PACKET protocol family Feb 13 12:53:39.996660 kernel: Key type dns_resolver registered Feb 13 12:53:39.996676 kernel: registered taskstats version 1 Feb 13 12:53:39.996697 kernel: Loading compiled-in X.509 certificates Feb 13 12:53:39.996714 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: c8c3faa6fd8ae0112832fff0e3d0e58448a7eb6c' Feb 13 12:53:39.996730 kernel: Key type .fscrypt registered Feb 13 12:53:39.996746 kernel: Key type fscrypt-provisioning registered Feb 13 12:53:39.996763 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 13 12:53:39.996779 kernel: ima: Allocated hash algorithm: sha1 Feb 13 12:53:39.996795 kernel: ima: No architecture policies found Feb 13 12:53:39.996811 kernel: Freeing unused kernel memory: 34688K Feb 13 12:53:39.996827 kernel: Run /init as init process Feb 13 12:53:39.996848 kernel: with arguments: Feb 13 12:53:39.996864 kernel: /init Feb 13 12:53:39.996880 kernel: with environment: Feb 13 12:53:39.996896 kernel: HOME=/ Feb 13 12:53:39.996912 kernel: TERM=linux Feb 13 12:53:39.996927 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 13 12:53:39.996969 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 13 12:53:39.997017 systemd[1]: Detected virtualization amazon. Feb 13 12:53:39.997043 systemd[1]: Detected architecture arm64. Feb 13 12:53:39.997061 systemd[1]: Running in initrd. Feb 13 12:53:39.997079 systemd[1]: No hostname configured, using default hostname. Feb 13 12:53:39.997096 systemd[1]: Hostname set to . Feb 13 12:53:39.997114 systemd[1]: Initializing machine ID from VM UUID. Feb 13 12:53:39.997131 systemd[1]: Queued start job for default target initrd.target. Feb 13 12:53:39.997149 systemd[1]: Started systemd-ask-password-console.path. Feb 13 12:53:39.997166 systemd[1]: Reached target cryptsetup.target. Feb 13 12:53:39.997187 systemd[1]: Reached target paths.target. Feb 13 12:53:39.997205 systemd[1]: Reached target slices.target. Feb 13 12:53:39.997222 systemd[1]: Reached target swap.target. Feb 13 12:53:39.997239 systemd[1]: Reached target timers.target. Feb 13 12:53:39.997257 systemd[1]: Listening on iscsid.socket. Feb 13 12:53:39.997275 systemd[1]: Listening on iscsiuio.socket. Feb 13 12:53:39.997293 systemd[1]: Listening on systemd-journald-audit.socket. Feb 13 12:53:39.997310 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 13 12:53:39.997332 systemd[1]: Listening on systemd-journald.socket. Feb 13 12:53:39.997350 systemd[1]: Listening on systemd-networkd.socket. Feb 13 12:53:39.997368 systemd[1]: Listening on systemd-udevd-control.socket. Feb 13 12:53:39.997386 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 13 12:53:39.997403 systemd[1]: Reached target sockets.target. Feb 13 12:53:39.997421 systemd[1]: Starting kmod-static-nodes.service... Feb 13 12:53:39.997439 systemd[1]: Finished network-cleanup.service. Feb 13 12:53:39.997456 systemd[1]: Starting systemd-fsck-usr.service... Feb 13 12:53:39.997474 systemd[1]: Starting systemd-journald.service... Feb 13 12:53:39.997496 systemd[1]: Starting systemd-modules-load.service... Feb 13 12:53:39.997513 systemd[1]: Starting systemd-resolved.service... Feb 13 12:53:39.997531 systemd[1]: Starting systemd-vconsole-setup.service... Feb 13 12:53:39.997549 systemd[1]: Finished kmod-static-nodes.service. Feb 13 12:53:39.997567 kernel: audit: type=1130 audit(1707828819.962:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:39.997586 systemd[1]: Finished systemd-fsck-usr.service. Feb 13 12:53:39.997604 kernel: audit: type=1130 audit(1707828819.984:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:39.997621 systemd[1]: Finished systemd-vconsole-setup.service. Feb 13 12:53:39.997646 systemd-journald[308]: Journal started Feb 13 12:53:39.997728 systemd-journald[308]: Runtime Journal (/run/log/journal/ec2ddc2f2cd8b9a7458bbc006f401ea5) is 8.0M, max 75.4M, 67.4M free. Feb 13 12:53:39.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:39.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:39.953332 systemd-modules-load[309]: Inserted module 'overlay' Feb 13 12:53:40.011972 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 13 12:53:40.016216 systemd-modules-load[309]: Inserted module 'br_netfilter' Feb 13 12:53:40.021925 kernel: Bridge firewalling registered Feb 13 12:53:40.034655 kernel: audit: type=1130 audit(1707828820.020:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:40.034705 systemd[1]: Started systemd-journald.service. Feb 13 12:53:40.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:40.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:40.044093 kernel: audit: type=1130 audit(1707828820.033:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:40.044397 systemd[1]: Starting dracut-cmdline-ask.service... Feb 13 12:53:40.052831 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 13 12:53:40.074975 kernel: SCSI subsystem initialized Feb 13 12:53:40.078420 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 13 12:53:40.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:40.103469 kernel: audit: type=1130 audit(1707828820.085:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:40.103538 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 13 12:53:40.103570 kernel: device-mapper: uevent: version 1.0.3 Feb 13 12:53:40.106897 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 13 12:53:40.111509 systemd-modules-load[309]: Inserted module 'dm_multipath' Feb 13 12:53:40.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:40.114679 systemd[1]: Finished systemd-modules-load.service. Feb 13 12:53:40.117531 systemd-resolved[310]: Positive Trust Anchors: Feb 13 12:53:40.117545 systemd-resolved[310]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 13 12:53:40.117605 systemd-resolved[310]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 13 12:53:40.117720 systemd[1]: Starting systemd-sysctl.service... Feb 13 12:53:40.152012 kernel: audit: type=1130 audit(1707828820.115:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:40.156260 systemd[1]: Finished dracut-cmdline-ask.service. Feb 13 12:53:40.161054 systemd[1]: Starting dracut-cmdline.service... Feb 13 12:53:40.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:40.178448 kernel: audit: type=1130 audit(1707828820.158:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:40.183040 systemd[1]: Finished systemd-sysctl.service. Feb 13 12:53:40.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:40.192964 dracut-cmdline[329]: dracut-dracut-053 Feb 13 12:53:40.198963 dracut-cmdline[329]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=0a07ee1673be713cb46dc1305004c8854c4690dc8835a87e3bc71aa6c6a62e40 Feb 13 12:53:40.220984 kernel: audit: type=1130 audit(1707828820.184:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:40.304983 kernel: Loading iSCSI transport class v2.0-870. Feb 13 12:53:40.318973 kernel: iscsi: registered transport (tcp) Feb 13 12:53:40.343279 kernel: iscsi: registered transport (qla4xxx) Feb 13 12:53:40.343349 kernel: QLogic iSCSI HBA Driver Feb 13 12:53:40.547979 kernel: random: crng init done Feb 13 12:53:40.547898 systemd-resolved[310]: Defaulting to hostname 'linux'. Feb 13 12:53:40.551288 systemd[1]: Started systemd-resolved.service. Feb 13 12:53:40.554596 systemd[1]: Reached target nss-lookup.target. Feb 13 12:53:40.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:40.564990 kernel: audit: type=1130 audit(1707828820.553:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:40.572600 systemd[1]: Finished dracut-cmdline.service. Feb 13 12:53:40.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:40.577191 systemd[1]: Starting dracut-pre-udev.service... Feb 13 12:53:40.642004 kernel: raid6: neonx8 gen() 6396 MB/s Feb 13 12:53:40.659977 kernel: raid6: neonx8 xor() 4723 MB/s Feb 13 12:53:40.677976 kernel: raid6: neonx4 gen() 6487 MB/s Feb 13 12:53:40.695977 kernel: raid6: neonx4 xor() 4897 MB/s Feb 13 12:53:40.713976 kernel: raid6: neonx2 gen() 5711 MB/s Feb 13 12:53:40.731987 kernel: raid6: neonx2 xor() 4514 MB/s Feb 13 12:53:40.749976 kernel: raid6: neonx1 gen() 4458 MB/s Feb 13 12:53:40.767976 kernel: raid6: neonx1 xor() 3674 MB/s Feb 13 12:53:40.785976 kernel: raid6: int64x8 gen() 3411 MB/s Feb 13 12:53:40.803977 kernel: raid6: int64x8 xor() 2091 MB/s Feb 13 12:53:40.821976 kernel: raid6: int64x4 gen() 3779 MB/s Feb 13 12:53:40.839977 kernel: raid6: int64x4 xor() 2192 MB/s Feb 13 12:53:40.857977 kernel: raid6: int64x2 gen() 3568 MB/s Feb 13 12:53:40.875976 kernel: raid6: int64x2 xor() 1948 MB/s Feb 13 12:53:40.893977 kernel: raid6: int64x1 gen() 2774 MB/s Feb 13 12:53:40.913460 kernel: raid6: int64x1 xor() 1451 MB/s Feb 13 12:53:40.913490 kernel: raid6: using algorithm neonx4 gen() 6487 MB/s Feb 13 12:53:40.913513 kernel: raid6: .... xor() 4897 MB/s, rmw enabled Feb 13 12:53:40.915267 kernel: raid6: using neon recovery algorithm Feb 13 12:53:40.933984 kernel: xor: measuring software checksum speed Feb 13 12:53:40.935976 kernel: 8regs : 9332 MB/sec Feb 13 12:53:40.938977 kernel: 32regs : 11107 MB/sec Feb 13 12:53:40.942821 kernel: arm64_neon : 9617 MB/sec Feb 13 12:53:40.942853 kernel: xor: using function: 32regs (11107 MB/sec) Feb 13 12:53:41.032996 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 13 12:53:41.049614 systemd[1]: Finished dracut-pre-udev.service. Feb 13 12:53:41.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:41.051000 audit: BPF prog-id=7 op=LOAD Feb 13 12:53:41.051000 audit: BPF prog-id=8 op=LOAD Feb 13 12:53:41.054351 systemd[1]: Starting systemd-udevd.service... Feb 13 12:53:41.082440 systemd-udevd[507]: Using default interface naming scheme 'v252'. Feb 13 12:53:41.092793 systemd[1]: Started systemd-udevd.service. Feb 13 12:53:41.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:41.099909 systemd[1]: Starting dracut-pre-trigger.service... Feb 13 12:53:41.134594 dracut-pre-trigger[523]: rd.md=0: removing MD RAID activation Feb 13 12:53:41.195443 systemd[1]: Finished dracut-pre-trigger.service. Feb 13 12:53:41.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:41.198697 systemd[1]: Starting systemd-udev-trigger.service... Feb 13 12:53:41.302796 systemd[1]: Finished systemd-udev-trigger.service. Feb 13 12:53:41.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:41.414510 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Feb 13 12:53:41.414576 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Feb 13 12:53:41.433557 kernel: ena 0000:00:05.0: ENA device version: 0.10 Feb 13 12:53:41.433925 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Feb 13 12:53:41.446735 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Feb 13 12:53:41.446796 kernel: nvme nvme0: pci function 0000:00:04.0 Feb 13 12:53:41.447127 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:da:a3:87:5e:05 Feb 13 12:53:41.453988 kernel: nvme nvme0: 2/0/0 default/read/poll queues Feb 13 12:53:41.460070 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 13 12:53:41.460107 kernel: GPT:9289727 != 16777215 Feb 13 12:53:41.460131 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 13 12:53:41.462242 kernel: GPT:9289727 != 16777215 Feb 13 12:53:41.463526 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 13 12:53:41.466907 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 13 12:53:41.469580 (udev-worker)[560]: Network interface NamePolicy= disabled on kernel command line. Feb 13 12:53:41.639175 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 13 12:53:41.729978 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (559) Feb 13 12:53:41.768024 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 13 12:53:41.784623 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 13 12:53:41.795658 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 13 12:53:41.802308 systemd[1]: Starting disk-uuid.service... Feb 13 12:53:41.818189 disk-uuid[642]: Primary Header is updated. Feb 13 12:53:41.818189 disk-uuid[642]: Secondary Entries is updated. Feb 13 12:53:41.818189 disk-uuid[642]: Secondary Header is updated. Feb 13 12:53:41.888163 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 13 12:53:42.844933 disk-uuid[647]: The operation has completed successfully. Feb 13 12:53:42.847125 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Feb 13 12:53:42.987784 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 13 12:53:42.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:42.988023 systemd[1]: Finished disk-uuid.service. Feb 13 12:53:42.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:43.030662 systemd[1]: Starting verity-setup.service... Feb 13 12:53:43.102991 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 13 12:53:43.230041 systemd[1]: Found device dev-mapper-usr.device. Feb 13 12:53:43.235628 systemd[1]: Mounting sysusr-usr.mount... Feb 13 12:53:43.242934 systemd[1]: Finished verity-setup.service. Feb 13 12:53:43.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:43.322999 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 13 12:53:43.323275 systemd[1]: Mounted sysusr-usr.mount. Feb 13 12:53:43.326303 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 13 12:53:43.329354 systemd[1]: Starting ignition-setup.service... Feb 13 12:53:43.340843 systemd[1]: Starting parse-ip-for-networkd.service... Feb 13 12:53:43.360089 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Feb 13 12:53:43.360156 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 13 12:53:43.360180 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 13 12:53:43.368989 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 13 12:53:43.387241 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 13 12:53:43.475896 systemd[1]: Finished parse-ip-for-networkd.service. Feb 13 12:53:43.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:43.478000 audit: BPF prog-id=9 op=LOAD Feb 13 12:53:43.481455 systemd[1]: Starting systemd-networkd.service... Feb 13 12:53:43.526109 systemd-networkd[1186]: lo: Link UP Feb 13 12:53:43.526572 systemd-networkd[1186]: lo: Gained carrier Feb 13 12:53:43.528107 systemd-networkd[1186]: Enumeration completed Feb 13 12:53:43.528936 systemd-networkd[1186]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 12:53:43.530281 systemd[1]: Started systemd-networkd.service. Feb 13 12:53:43.541087 systemd-networkd[1186]: eth0: Link UP Feb 13 12:53:43.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:43.541178 systemd-networkd[1186]: eth0: Gained carrier Feb 13 12:53:43.544592 systemd[1]: Reached target network.target. Feb 13 12:53:43.550387 systemd[1]: Starting iscsiuio.service... Feb 13 12:53:43.558558 systemd[1]: Finished ignition-setup.service. Feb 13 12:53:43.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:43.561931 systemd[1]: Starting ignition-fetch-offline.service... Feb 13 12:53:43.566219 systemd-networkd[1186]: eth0: DHCPv4 address 172.31.23.232/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 13 12:53:43.573661 systemd[1]: Started iscsiuio.service. Feb 13 12:53:43.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:43.578518 systemd[1]: Starting iscsid.service... Feb 13 12:53:43.586295 iscsid[1193]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 13 12:53:43.586295 iscsid[1193]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 13 12:53:43.586295 iscsid[1193]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 13 12:53:43.586295 iscsid[1193]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 13 12:53:43.586295 iscsid[1193]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 13 12:53:43.606159 iscsid[1193]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 13 12:53:43.608743 systemd[1]: Started iscsid.service. Feb 13 12:53:43.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:43.612784 systemd[1]: Starting dracut-initqueue.service... Feb 13 12:53:43.634127 systemd[1]: Finished dracut-initqueue.service. Feb 13 12:53:43.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:43.636263 systemd[1]: Reached target remote-fs-pre.target. Feb 13 12:53:43.637956 systemd[1]: Reached target remote-cryptsetup.target. Feb 13 12:53:43.639709 systemd[1]: Reached target remote-fs.target. Feb 13 12:53:43.643097 systemd[1]: Starting dracut-pre-mount.service... Feb 13 12:53:43.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:43.664229 systemd[1]: Finished dracut-pre-mount.service. Feb 13 12:53:44.700110 systemd-networkd[1186]: eth0: Gained IPv6LL Feb 13 12:53:46.183510 ignition[1191]: Ignition 2.14.0 Feb 13 12:53:46.184024 ignition[1191]: Stage: fetch-offline Feb 13 12:53:46.184336 ignition[1191]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 12:53:46.184395 ignition[1191]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 13 12:53:46.204477 ignition[1191]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 13 12:53:46.205336 ignition[1191]: Ignition finished successfully Feb 13 12:53:46.210844 systemd[1]: Finished ignition-fetch-offline.service. Feb 13 12:53:46.224426 kernel: kauditd_printk_skb: 18 callbacks suppressed Feb 13 12:53:46.225817 kernel: audit: type=1130 audit(1707828826.211:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:46.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:46.215192 systemd[1]: Starting ignition-fetch.service... Feb 13 12:53:46.231206 ignition[1212]: Ignition 2.14.0 Feb 13 12:53:46.231256 ignition[1212]: Stage: fetch Feb 13 12:53:46.231645 ignition[1212]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 12:53:46.232133 ignition[1212]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 13 12:53:46.246463 ignition[1212]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 13 12:53:46.249070 ignition[1212]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 13 12:53:46.257549 ignition[1212]: INFO : PUT result: OK Feb 13 12:53:46.261160 ignition[1212]: DEBUG : parsed url from cmdline: "" Feb 13 12:53:46.261160 ignition[1212]: INFO : no config URL provided Feb 13 12:53:46.261160 ignition[1212]: INFO : reading system config file "/usr/lib/ignition/user.ign" Feb 13 12:53:46.267458 ignition[1212]: INFO : no config at "/usr/lib/ignition/user.ign" Feb 13 12:53:46.267458 ignition[1212]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 13 12:53:46.267458 ignition[1212]: INFO : PUT result: OK Feb 13 12:53:46.267458 ignition[1212]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Feb 13 12:53:46.275780 ignition[1212]: INFO : GET result: OK Feb 13 12:53:46.277276 ignition[1212]: DEBUG : parsing config with SHA512: 4c2088a967087c357455d0fec246d59fc93bc546e3db5ed78c99cda906e66e0a4962e73abf8418616c4106c2b26667a3750f9e04d1b5446b7f381e3257598113 Feb 13 12:53:46.338596 unknown[1212]: fetched base config from "system" Feb 13 12:53:46.338625 unknown[1212]: fetched base config from "system" Feb 13 12:53:46.338641 unknown[1212]: fetched user config from "aws" Feb 13 12:53:46.344806 ignition[1212]: fetch: fetch complete Feb 13 12:53:46.344835 ignition[1212]: fetch: fetch passed Feb 13 12:53:46.344928 ignition[1212]: Ignition finished successfully Feb 13 12:53:46.351412 systemd[1]: Finished ignition-fetch.service. Feb 13 12:53:46.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:46.355791 systemd[1]: Starting ignition-kargs.service... Feb 13 12:53:46.367565 kernel: audit: type=1130 audit(1707828826.349:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:46.379863 ignition[1218]: Ignition 2.14.0 Feb 13 12:53:46.379892 ignition[1218]: Stage: kargs Feb 13 12:53:46.380228 ignition[1218]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 12:53:46.380287 ignition[1218]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 13 12:53:46.394411 ignition[1218]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 13 12:53:46.397018 ignition[1218]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 13 12:53:46.400260 ignition[1218]: INFO : PUT result: OK Feb 13 12:53:46.405736 ignition[1218]: kargs: kargs passed Feb 13 12:53:46.405848 ignition[1218]: Ignition finished successfully Feb 13 12:53:46.410108 systemd[1]: Finished ignition-kargs.service. Feb 13 12:53:46.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:46.414610 systemd[1]: Starting ignition-disks.service... Feb 13 12:53:46.424333 kernel: audit: type=1130 audit(1707828826.412:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:46.431081 ignition[1224]: Ignition 2.14.0 Feb 13 12:53:46.431110 ignition[1224]: Stage: disks Feb 13 12:53:46.431409 ignition[1224]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 12:53:46.431467 ignition[1224]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 13 12:53:46.446843 ignition[1224]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 13 12:53:46.449322 ignition[1224]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 13 12:53:46.452626 ignition[1224]: INFO : PUT result: OK Feb 13 12:53:46.457789 ignition[1224]: disks: disks passed Feb 13 12:53:46.458785 ignition[1224]: Ignition finished successfully Feb 13 12:53:46.460913 systemd[1]: Finished ignition-disks.service. Feb 13 12:53:46.475232 kernel: audit: type=1130 audit(1707828826.465:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:46.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:46.475262 systemd[1]: Reached target initrd-root-device.target. Feb 13 12:53:46.477095 systemd[1]: Reached target local-fs-pre.target. Feb 13 12:53:46.482679 systemd[1]: Reached target local-fs.target. Feb 13 12:53:46.485760 systemd[1]: Reached target sysinit.target. Feb 13 12:53:46.488650 systemd[1]: Reached target basic.target. Feb 13 12:53:46.494353 systemd[1]: Starting systemd-fsck-root.service... Feb 13 12:53:46.609753 systemd-fsck[1232]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 13 12:53:46.624271 systemd[1]: Finished systemd-fsck-root.service. Feb 13 12:53:46.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:46.627770 systemd[1]: Mounting sysroot.mount... Feb 13 12:53:46.636991 kernel: audit: type=1130 audit(1707828826.625:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:46.658974 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 13 12:53:46.661036 systemd[1]: Mounted sysroot.mount. Feb 13 12:53:46.664578 systemd[1]: Reached target initrd-root-fs.target. Feb 13 12:53:46.672494 systemd[1]: Mounting sysroot-usr.mount... Feb 13 12:53:46.676804 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 13 12:53:46.680806 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 13 12:53:46.684201 systemd[1]: Reached target ignition-diskful.target. Feb 13 12:53:46.689373 systemd[1]: Mounted sysroot-usr.mount. Feb 13 12:53:46.699389 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 13 12:53:46.703837 systemd[1]: Starting initrd-setup-root.service... Feb 13 12:53:46.724600 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1250) Feb 13 12:53:46.730152 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Feb 13 12:53:46.730200 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 13 12:53:46.730226 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 13 12:53:46.741979 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 13 12:53:46.745857 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 13 12:53:46.781315 initrd-setup-root[1255]: cut: /sysroot/etc/passwd: No such file or directory Feb 13 12:53:46.876136 initrd-setup-root[1281]: cut: /sysroot/etc/group: No such file or directory Feb 13 12:53:46.884665 initrd-setup-root[1289]: cut: /sysroot/etc/shadow: No such file or directory Feb 13 12:53:46.893060 initrd-setup-root[1297]: cut: /sysroot/etc/gshadow: No such file or directory Feb 13 12:53:47.574614 systemd[1]: Finished initrd-setup-root.service. Feb 13 12:53:47.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:47.585978 kernel: audit: type=1130 audit(1707828827.575:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:47.586390 systemd[1]: Starting ignition-mount.service... Feb 13 12:53:47.592536 systemd[1]: Starting sysroot-boot.service... Feb 13 12:53:47.605472 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 13 12:53:47.605653 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 13 12:53:47.637195 ignition[1316]: INFO : Ignition 2.14.0 Feb 13 12:53:47.637195 ignition[1316]: INFO : Stage: mount Feb 13 12:53:47.642024 ignition[1316]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 12:53:47.642024 ignition[1316]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 13 12:53:47.647162 systemd[1]: Finished sysroot-boot.service. Feb 13 12:53:47.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:47.660984 kernel: audit: type=1130 audit(1707828827.650:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:47.668891 ignition[1316]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 13 12:53:47.671613 ignition[1316]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 13 12:53:47.674714 ignition[1316]: INFO : PUT result: OK Feb 13 12:53:47.680075 ignition[1316]: INFO : mount: mount passed Feb 13 12:53:47.681772 ignition[1316]: INFO : Ignition finished successfully Feb 13 12:53:47.684047 systemd[1]: Finished ignition-mount.service. Feb 13 12:53:47.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:47.688393 systemd[1]: Starting ignition-files.service... Feb 13 12:53:47.698244 kernel: audit: type=1130 audit(1707828827.685:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:47.703645 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 13 12:53:47.721991 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1325) Feb 13 12:53:47.728111 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Feb 13 12:53:47.728155 kernel: BTRFS info (device nvme0n1p6): using free space tree Feb 13 12:53:47.728179 kernel: BTRFS info (device nvme0n1p6): has skinny extents Feb 13 12:53:47.738993 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Feb 13 12:53:47.742725 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 13 12:53:47.761523 ignition[1344]: INFO : Ignition 2.14.0 Feb 13 12:53:47.761523 ignition[1344]: INFO : Stage: files Feb 13 12:53:47.764815 ignition[1344]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 12:53:47.764815 ignition[1344]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 13 12:53:47.781529 ignition[1344]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 13 12:53:47.784092 ignition[1344]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 13 12:53:47.787499 ignition[1344]: INFO : PUT result: OK Feb 13 12:53:47.792559 ignition[1344]: DEBUG : files: compiled without relabeling support, skipping Feb 13 12:53:47.796269 ignition[1344]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 13 12:53:47.796269 ignition[1344]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 13 12:53:47.894633 ignition[1344]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 13 12:53:47.897789 ignition[1344]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 13 12:53:47.900754 unknown[1344]: wrote ssh authorized keys file for user: core Feb 13 12:53:47.903092 ignition[1344]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 13 12:53:47.905724 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 13 12:53:47.905724 ignition[1344]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-arm64-v1.1.1.tgz: attempt #1 Feb 13 12:53:48.373812 ignition[1344]: INFO : GET result: OK Feb 13 12:53:48.810022 ignition[1344]: DEBUG : file matches expected sum of: 6b5df61a53601926e4b5a9174828123d555f592165439f541bc117c68781f41c8bd30dccd52367e406d104df849bcbcfb72d9c4bafda4b045c59ce95d0ca0742 Feb 13 12:53:48.815273 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 13 12:53:48.815273 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 13 12:53:48.815273 ignition[1344]: INFO : GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Feb 13 12:53:48.891740 ignition[1344]: INFO : GET result: OK Feb 13 12:53:49.014314 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 13 12:53:49.018559 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 13 12:53:49.022456 ignition[1344]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-arm64.tar.gz: attempt #1 Feb 13 12:53:49.411594 ignition[1344]: INFO : GET result: OK Feb 13 12:53:49.651156 ignition[1344]: DEBUG : file matches expected sum of: 4c7e4541123cbd6f1d6fec1f827395cd58d65716c0998de790f965485738b6d6257c0dc46fd7f66403166c299f6d5bf9ff30b6e1ff9afbb071f17005e834518c Feb 13 12:53:49.655976 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 13 12:53:49.655976 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Feb 13 12:53:49.655976 ignition[1344]: INFO : GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubectl: attempt #1 Feb 13 12:53:49.784971 ignition[1344]: INFO : GET result: OK Feb 13 12:53:50.347902 ignition[1344]: DEBUG : file matches expected sum of: 3672fda0beebbbd636a2088f427463cbad32683ea4fbb1df61650552e63846b6a47db803ccb70c3db0a8f24746a23a5632bdc15a3fb78f4f7d833e7f86763c2a Feb 13 12:53:50.355035 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 13 12:53:50.355035 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 13 12:53:50.355035 ignition[1344]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 13 12:53:50.371310 ignition[1344]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1279901694" Feb 13 12:53:50.371310 ignition[1344]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1279901694": device or resource busy Feb 13 12:53:50.371310 ignition[1344]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1279901694", trying btrfs: device or resource busy Feb 13 12:53:50.371310 ignition[1344]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1279901694" Feb 13 12:53:50.389609 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1344) Feb 13 12:53:50.389643 ignition[1344]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1279901694" Feb 13 12:53:50.442982 ignition[1344]: INFO : op(3): [started] unmounting "/mnt/oem1279901694" Feb 13 12:53:50.445415 ignition[1344]: INFO : op(3): [finished] unmounting "/mnt/oem1279901694" Feb 13 12:53:50.448183 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Feb 13 12:53:50.448183 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 13 12:53:50.448183 ignition[1344]: INFO : GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubeadm: attempt #1 Feb 13 12:53:50.459442 systemd[1]: mnt-oem1279901694.mount: Deactivated successfully. Feb 13 12:53:50.516512 ignition[1344]: INFO : GET result: OK Feb 13 12:53:51.028500 ignition[1344]: DEBUG : file matches expected sum of: 46c9f489062bdb84574703f7339d140d7e42c9c71b367cd860071108a3c1d38fabda2ef69f9c0ff88f7c80e88d38f96ab2248d4c9a6c9c60b0a4c20fd640d0db Feb 13 12:53:51.033176 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 13 12:53:51.033176 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/bin/kubelet" Feb 13 12:53:51.033176 ignition[1344]: INFO : GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubelet: attempt #1 Feb 13 12:53:51.095865 ignition[1344]: INFO : GET result: OK Feb 13 12:53:52.444359 ignition[1344]: DEBUG : file matches expected sum of: 0e4ee1f23bf768c49d09beb13a6b5fad6efc8e3e685e7c5610188763e3af55923fb46158b5e76973a0f9a055f9b30d525b467c53415f965536adc2f04d9cf18d Feb 13 12:53:52.450271 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 13 12:53:52.450271 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 13 12:53:52.450271 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 13 12:53:52.450271 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" Feb 13 12:53:52.450271 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" Feb 13 12:53:52.450271 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 13 12:53:52.450271 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 13 12:53:52.450271 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 13 12:53:52.450271 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 13 12:53:52.450271 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 13 12:53:52.450271 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 13 12:53:52.450271 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 13 12:53:52.450271 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 13 12:53:52.450271 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 13 12:53:52.450271 ignition[1344]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 13 12:53:52.512887 ignition[1344]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2513894501" Feb 13 12:53:52.512887 ignition[1344]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2513894501": device or resource busy Feb 13 12:53:52.512887 ignition[1344]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2513894501", trying btrfs: device or resource busy Feb 13 12:53:52.512887 ignition[1344]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2513894501" Feb 13 12:53:52.526228 ignition[1344]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2513894501" Feb 13 12:53:52.526228 ignition[1344]: INFO : op(6): [started] unmounting "/mnt/oem2513894501" Feb 13 12:53:52.526228 ignition[1344]: INFO : op(6): [finished] unmounting "/mnt/oem2513894501" Feb 13 12:53:52.526228 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 13 12:53:52.526228 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 13 12:53:52.526228 ignition[1344]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 13 12:53:52.549733 systemd[1]: mnt-oem2513894501.mount: Deactivated successfully. Feb 13 12:53:52.564000 ignition[1344]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1820949901" Feb 13 12:53:52.567063 ignition[1344]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1820949901": device or resource busy Feb 13 12:53:52.567063 ignition[1344]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1820949901", trying btrfs: device or resource busy Feb 13 12:53:52.567063 ignition[1344]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1820949901" Feb 13 12:53:52.567063 ignition[1344]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1820949901" Feb 13 12:53:52.567063 ignition[1344]: INFO : op(9): [started] unmounting "/mnt/oem1820949901" Feb 13 12:53:52.582538 ignition[1344]: INFO : op(9): [finished] unmounting "/mnt/oem1820949901" Feb 13 12:53:52.582538 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Feb 13 12:53:52.582538 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 13 12:53:52.592039 ignition[1344]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Feb 13 12:53:52.612991 ignition[1344]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1390684599" Feb 13 12:53:52.616108 ignition[1344]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1390684599": device or resource busy Feb 13 12:53:52.616108 ignition[1344]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1390684599", trying btrfs: device or resource busy Feb 13 12:53:52.616108 ignition[1344]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1390684599" Feb 13 12:53:52.616108 ignition[1344]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1390684599" Feb 13 12:53:52.616108 ignition[1344]: INFO : op(c): [started] unmounting "/mnt/oem1390684599" Feb 13 12:53:52.616108 ignition[1344]: INFO : op(c): [finished] unmounting "/mnt/oem1390684599" Feb 13 12:53:52.656837 kernel: audit: type=1130 audit(1707828832.630:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:52.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:52.656994 ignition[1344]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Feb 13 12:53:52.656994 ignition[1344]: INFO : files: op(13): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 13 12:53:52.656994 ignition[1344]: INFO : files: op(13): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 13 12:53:52.656994 ignition[1344]: INFO : files: op(14): [started] processing unit "amazon-ssm-agent.service" Feb 13 12:53:52.656994 ignition[1344]: INFO : files: op(14): op(15): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 13 12:53:52.656994 ignition[1344]: INFO : files: op(14): op(15): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Feb 13 12:53:52.656994 ignition[1344]: INFO : files: op(14): [finished] processing unit "amazon-ssm-agent.service" Feb 13 12:53:52.656994 ignition[1344]: INFO : files: op(16): [started] processing unit "nvidia.service" Feb 13 12:53:52.656994 ignition[1344]: INFO : files: op(16): [finished] processing unit "nvidia.service" Feb 13 12:53:52.656994 ignition[1344]: INFO : files: op(17): [started] processing unit "prepare-helm.service" Feb 13 12:53:52.656994 ignition[1344]: INFO : files: op(17): op(18): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 13 12:53:52.656994 ignition[1344]: INFO : files: op(17): op(18): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 13 12:53:52.656994 ignition[1344]: INFO : files: op(17): [finished] processing unit "prepare-helm.service" Feb 13 12:53:52.656994 ignition[1344]: INFO : files: op(19): [started] processing unit "prepare-cni-plugins.service" Feb 13 12:53:52.656994 ignition[1344]: INFO : files: op(19): op(1a): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 13 12:53:52.656994 ignition[1344]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 13 12:53:52.656994 ignition[1344]: INFO : files: op(19): [finished] processing unit "prepare-cni-plugins.service" Feb 13 12:53:52.656994 ignition[1344]: INFO : files: op(1b): [started] processing unit "prepare-critools.service" Feb 13 12:53:52.656994 ignition[1344]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 13 12:53:52.629385 systemd[1]: Finished ignition-files.service. Feb 13 12:53:52.736847 ignition[1344]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 13 12:53:52.736847 ignition[1344]: INFO : files: op(1b): [finished] processing unit "prepare-critools.service" Feb 13 12:53:52.736847 ignition[1344]: INFO : files: op(1d): [started] setting preset to enabled for "prepare-critools.service" Feb 13 12:53:52.736847 ignition[1344]: INFO : files: op(1d): [finished] setting preset to enabled for "prepare-critools.service" Feb 13 12:53:52.736847 ignition[1344]: INFO : files: op(1e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 13 12:53:52.736847 ignition[1344]: INFO : files: op(1e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 13 12:53:52.736847 ignition[1344]: INFO : files: op(1f): [started] setting preset to enabled for "amazon-ssm-agent.service" Feb 13 12:53:52.736847 ignition[1344]: INFO : files: op(1f): [finished] setting preset to enabled for "amazon-ssm-agent.service" Feb 13 12:53:52.736847 ignition[1344]: INFO : files: op(20): [started] setting preset to enabled for "nvidia.service" Feb 13 12:53:52.736847 ignition[1344]: INFO : files: op(20): [finished] setting preset to enabled for "nvidia.service" Feb 13 12:53:52.736847 ignition[1344]: INFO : files: op(21): [started] setting preset to enabled for "prepare-helm.service" Feb 13 12:53:52.736847 ignition[1344]: INFO : files: op(21): [finished] setting preset to enabled for "prepare-helm.service" Feb 13 12:53:52.736847 ignition[1344]: INFO : files: op(22): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 13 12:53:52.736847 ignition[1344]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 13 12:53:52.736847 ignition[1344]: INFO : files: createResultFile: createFiles: op(23): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 13 12:53:52.736847 ignition[1344]: INFO : files: createResultFile: createFiles: op(23): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 13 12:53:52.736847 ignition[1344]: INFO : files: files passed Feb 13 12:53:52.736847 ignition[1344]: INFO : Ignition finished successfully Feb 13 12:53:52.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:52.802522 kernel: audit: type=1130 audit(1707828832.789:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:52.642392 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 13 12:53:52.818619 kernel: audit: type=1130 audit(1707828832.801:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:52.820320 kernel: audit: type=1131 audit(1707828832.801:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:52.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:52.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:52.820593 initrd-setup-root-after-ignition[1368]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 13 12:53:52.680478 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 13 12:53:52.695314 systemd[1]: Starting ignition-quench.service... Feb 13 12:53:52.783538 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 13 12:53:52.800491 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 13 12:53:52.800690 systemd[1]: Finished ignition-quench.service. Feb 13 12:53:52.802894 systemd[1]: Reached target ignition-complete.target. Feb 13 12:53:52.873834 kernel: audit: type=1130 audit(1707828832.853:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:52.873872 kernel: audit: type=1131 audit(1707828832.853:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:52.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:52.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:52.821883 systemd[1]: Starting initrd-parse-etc.service... Feb 13 12:53:52.854135 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 13 12:53:52.854367 systemd[1]: Finished initrd-parse-etc.service. Feb 13 12:53:52.865148 systemd[1]: Reached target initrd-fs.target. Feb 13 12:53:52.873876 systemd[1]: Reached target initrd.target. Feb 13 12:53:52.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:52.875481 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 13 12:53:52.877318 systemd[1]: Starting dracut-pre-pivot.service... Feb 13 12:53:52.902094 systemd[1]: Finished dracut-pre-pivot.service. Feb 13 12:53:52.937716 kernel: audit: type=1130 audit(1707828832.903:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:52.914524 systemd[1]: Starting initrd-cleanup.service... Feb 13 12:53:52.934262 systemd[1]: Stopped target nss-lookup.target. Feb 13 12:53:52.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:52.938345 systemd[1]: Stopped target remote-cryptsetup.target. Feb 13 12:53:52.961039 kernel: audit: type=1131 audit(1707828832.944:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:52.941517 systemd[1]: Stopped target timers.target. Feb 13 12:53:52.943276 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 13 12:53:52.943568 systemd[1]: Stopped dracut-pre-pivot.service. Feb 13 12:53:53.003338 kernel: audit: type=1131 audit(1707828832.978:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.003379 kernel: audit: type=1131 audit(1707828832.983:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:52.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:52.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:52.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:52.945712 systemd[1]: Stopped target initrd.target. Feb 13 12:53:52.947505 systemd[1]: Stopped target basic.target. Feb 13 12:53:52.949555 systemd[1]: Stopped target ignition-complete.target. Feb 13 12:53:52.959866 systemd[1]: Stopped target ignition-diskful.target. Feb 13 12:53:52.963031 systemd[1]: Stopped target initrd-root-device.target. Feb 13 12:53:52.965083 systemd[1]: Stopped target remote-fs.target. Feb 13 12:53:52.967287 systemd[1]: Stopped target remote-fs-pre.target. Feb 13 12:53:52.970042 systemd[1]: Stopped target sysinit.target. Feb 13 12:53:52.972376 systemd[1]: Stopped target local-fs.target. Feb 13 12:53:52.975339 systemd[1]: Stopped target local-fs-pre.target. Feb 13 12:53:52.977279 systemd[1]: Stopped target swap.target. Feb 13 12:53:52.978922 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 13 12:53:52.979233 systemd[1]: Stopped dracut-pre-mount.service. Feb 13 12:53:52.981295 systemd[1]: Stopped target cryptsetup.target. Feb 13 12:53:52.983103 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 13 12:53:52.983372 systemd[1]: Stopped dracut-initqueue.service. Feb 13 12:53:52.985395 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 13 12:53:52.985670 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 13 12:53:52.988277 systemd[1]: ignition-files.service: Deactivated successfully. Feb 13 12:53:52.988541 systemd[1]: Stopped ignition-files.service. Feb 13 12:53:53.039517 systemd[1]: Stopping ignition-mount.service... Feb 13 12:53:53.046728 systemd[1]: Stopping iscsid.service... Feb 13 12:53:53.046876 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 13 12:53:53.052854 systemd[1]: Stopped kmod-static-nodes.service. Feb 13 12:53:53.056882 ignition[1382]: INFO : Ignition 2.14.0 Feb 13 12:53:53.057709 ignition[1382]: INFO : Stage: umount Feb 13 12:53:53.058847 ignition[1382]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 12:53:53.059233 ignition[1382]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Feb 13 12:53:53.074120 ignition[1382]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Feb 13 12:53:53.074692 ignition[1382]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Feb 13 12:53:53.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.079253 iscsid[1193]: iscsid shutting down. Feb 13 12:53:53.082706 ignition[1382]: INFO : PUT result: OK Feb 13 12:53:53.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.086295 systemd[1]: Stopping sysroot-boot.service... Feb 13 12:53:53.089094 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 13 12:53:53.091193 ignition[1382]: INFO : umount: umount passed Feb 13 12:53:53.091193 ignition[1382]: INFO : Ignition finished successfully Feb 13 12:53:53.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.091271 systemd[1]: Stopped systemd-udev-trigger.service. Feb 13 12:53:53.097891 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 13 12:53:53.098164 systemd[1]: Stopped dracut-pre-trigger.service. Feb 13 12:53:53.134321 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 13 12:53:53.137382 systemd[1]: iscsid.service: Deactivated successfully. Feb 13 12:53:53.139204 systemd[1]: Stopped iscsid.service. Feb 13 12:53:53.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.142866 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 13 12:53:53.144856 systemd[1]: Stopped ignition-mount.service. Feb 13 12:53:53.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.149333 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 13 12:53:53.151291 systemd[1]: Stopped sysroot-boot.service. Feb 13 12:53:53.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.155148 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 13 12:53:53.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.155326 systemd[1]: Stopped ignition-disks.service. Feb 13 12:53:53.159172 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 13 12:53:53.159270 systemd[1]: Stopped ignition-kargs.service. Feb 13 12:53:53.163990 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 13 12:53:53.164074 systemd[1]: Stopped ignition-fetch.service. Feb 13 12:53:53.165722 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 13 12:53:53.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.165799 systemd[1]: Stopped ignition-fetch-offline.service. Feb 13 12:53:53.167614 systemd[1]: Stopped target paths.target. Feb 13 12:53:53.169061 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 13 12:53:53.173016 systemd[1]: Stopped systemd-ask-password-console.path. Feb 13 12:53:53.176146 systemd[1]: Stopped target slices.target. Feb 13 12:53:53.177702 systemd[1]: Stopped target sockets.target. Feb 13 12:53:53.179382 systemd[1]: iscsid.socket: Deactivated successfully. Feb 13 12:53:53.179453 systemd[1]: Closed iscsid.socket. Feb 13 12:53:53.181376 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 13 12:53:53.181461 systemd[1]: Stopped ignition-setup.service. Feb 13 12:53:53.185802 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 13 12:53:53.185886 systemd[1]: Stopped initrd-setup-root.service. Feb 13 12:53:53.187727 systemd[1]: Stopping iscsiuio.service... Feb 13 12:53:53.189573 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 13 12:53:53.189758 systemd[1]: Finished initrd-cleanup.service. Feb 13 12:53:53.222926 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 13 12:53:53.223439 systemd[1]: Stopped iscsiuio.service. Feb 13 12:53:53.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.230482 systemd[1]: Stopped target network.target. Feb 13 12:53:53.233068 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 13 12:53:53.233257 systemd[1]: Closed iscsiuio.socket. Feb 13 12:53:53.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.236077 systemd[1]: Stopping systemd-networkd.service... Feb 13 12:53:53.238028 systemd[1]: Stopping systemd-resolved.service... Feb 13 12:53:53.245000 audit: BPF prog-id=6 op=UNLOAD Feb 13 12:53:53.242763 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 13 12:53:53.243133 systemd[1]: Stopped systemd-resolved.service. Feb 13 12:53:53.251732 systemd-networkd[1186]: eth0: DHCPv6 lease lost Feb 13 12:53:53.255255 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 13 12:53:53.255585 systemd[1]: Stopped systemd-networkd.service. Feb 13 12:53:53.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.258000 audit: BPF prog-id=9 op=UNLOAD Feb 13 12:53:53.261269 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 13 12:53:53.261371 systemd[1]: Closed systemd-networkd.socket. Feb 13 12:53:53.267415 systemd[1]: Stopping network-cleanup.service... Feb 13 12:53:53.272131 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 13 12:53:53.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.272267 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 13 12:53:53.275666 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 13 12:53:53.275751 systemd[1]: Stopped systemd-sysctl.service. Feb 13 12:53:53.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.277668 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 13 12:53:53.277753 systemd[1]: Stopped systemd-modules-load.service. Feb 13 12:53:53.281897 systemd[1]: Stopping systemd-udevd.service... Feb 13 12:53:53.291106 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 13 12:53:53.293076 systemd[1]: Stopped network-cleanup.service. Feb 13 12:53:53.305222 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 13 12:53:53.307380 systemd[1]: Stopped systemd-udevd.service. Feb 13 12:53:53.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.310822 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 13 12:53:53.310918 systemd[1]: Closed systemd-udevd-control.socket. Feb 13 12:53:53.315986 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 13 12:53:53.316076 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 13 12:53:53.319615 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 13 12:53:53.323160 systemd[1]: Stopped dracut-pre-udev.service. Feb 13 12:53:53.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.326323 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 13 12:53:53.326407 systemd[1]: Stopped dracut-cmdline.service. Feb 13 12:53:53.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.331523 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 13 12:53:53.331603 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 13 12:53:53.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.338079 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 13 12:53:53.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:53:53.351066 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 13 12:53:53.351195 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 13 12:53:53.356784 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 13 12:53:53.356989 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 13 12:53:53.359044 systemd[1]: Reached target initrd-switch-root.target. Feb 13 12:53:53.362084 systemd[1]: Starting initrd-switch-root.service... Feb 13 12:53:53.377295 systemd[1]: Switching root. Feb 13 12:53:53.413593 systemd-journald[308]: Journal stopped Feb 13 12:54:07.386222 systemd-journald[308]: Received SIGTERM from PID 1 (systemd). Feb 13 12:54:07.386358 kernel: SELinux: Class mctp_socket not defined in policy. Feb 13 12:54:07.386404 kernel: SELinux: Class anon_inode not defined in policy. Feb 13 12:54:07.386438 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 13 12:54:07.386471 kernel: SELinux: policy capability network_peer_controls=1 Feb 13 12:54:07.386511 kernel: SELinux: policy capability open_perms=1 Feb 13 12:54:07.386543 kernel: SELinux: policy capability extended_socket_class=1 Feb 13 12:54:07.386579 kernel: SELinux: policy capability always_check_network=0 Feb 13 12:54:07.386608 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 13 12:54:07.386638 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 13 12:54:07.386685 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 13 12:54:07.386714 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 13 12:54:07.386746 systemd[1]: Successfully loaded SELinux policy in 308.336ms. Feb 13 12:54:07.386799 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 19.521ms. Feb 13 12:54:07.386834 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 13 12:54:07.386866 systemd[1]: Detected virtualization amazon. Feb 13 12:54:07.386895 systemd[1]: Detected architecture arm64. Feb 13 12:54:07.386927 systemd[1]: Detected first boot. Feb 13 12:54:07.386986 systemd[1]: Initializing machine ID from VM UUID. Feb 13 12:54:07.387023 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 13 12:54:07.387054 kernel: kauditd_printk_skb: 39 callbacks suppressed Feb 13 12:54:07.387090 kernel: audit: type=1400 audit(1707828838.068:86): avc: denied { associate } for pid=1415 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 13 12:54:07.387132 kernel: audit: type=1300 audit(1707828838.068:86): arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458ac a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1398 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:07.387164 kernel: audit: type=1327 audit(1707828838.068:86): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 13 12:54:07.387196 kernel: audit: type=1400 audit(1707828838.072:87): avc: denied { associate } for pid=1415 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 13 12:54:07.387230 kernel: audit: type=1300 audit(1707828838.072:87): arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145985 a2=1ed a3=0 items=2 ppid=1398 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:07.387261 kernel: audit: type=1307 audit(1707828838.072:87): cwd="/" Feb 13 12:54:07.387290 kernel: audit: type=1302 audit(1707828838.072:87): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 12:54:07.387321 kernel: audit: type=1302 audit(1707828838.072:87): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 12:54:07.387352 kernel: audit: type=1327 audit(1707828838.072:87): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 13 12:54:07.387382 systemd[1]: Populated /etc with preset unit settings. Feb 13 12:54:07.387421 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 13 12:54:07.387453 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 13 12:54:07.387486 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 13 12:54:07.387518 kernel: audit: type=1334 audit(1707828846.936:88): prog-id=12 op=LOAD Feb 13 12:54:07.387547 kernel: audit: type=1334 audit(1707828846.936:89): prog-id=3 op=UNLOAD Feb 13 12:54:07.387574 kernel: audit: type=1334 audit(1707828846.939:90): prog-id=13 op=LOAD Feb 13 12:54:07.387604 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 13 12:54:07.387633 systemd[1]: Stopped initrd-switch-root.service. Feb 13 12:54:07.387667 kernel: audit: type=1334 audit(1707828846.941:91): prog-id=14 op=LOAD Feb 13 12:54:07.387698 kernel: audit: type=1334 audit(1707828846.941:92): prog-id=4 op=UNLOAD Feb 13 12:54:07.387727 kernel: audit: type=1334 audit(1707828846.941:93): prog-id=5 op=UNLOAD Feb 13 12:54:07.387757 kernel: audit: type=1131 audit(1707828846.943:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.387784 kernel: audit: type=1334 audit(1707828846.949:95): prog-id=12 op=UNLOAD Feb 13 12:54:07.387814 kernel: audit: type=1130 audit(1707828846.968:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.387843 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 13 12:54:07.387877 kernel: audit: type=1131 audit(1707828846.968:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.387909 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 13 12:54:07.387941 systemd[1]: Created slice system-addon\x2drun.slice. Feb 13 12:54:07.388025 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 13 12:54:07.388060 systemd[1]: Created slice system-getty.slice. Feb 13 12:54:07.388090 systemd[1]: Created slice system-modprobe.slice. Feb 13 12:54:07.388123 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 13 12:54:07.388153 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 13 12:54:07.388189 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 13 12:54:07.388219 systemd[1]: Created slice user.slice. Feb 13 12:54:07.388250 systemd[1]: Started systemd-ask-password-console.path. Feb 13 12:54:07.388279 systemd[1]: Started systemd-ask-password-wall.path. Feb 13 12:54:07.388308 systemd[1]: Set up automount boot.automount. Feb 13 12:54:07.388338 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 13 12:54:07.388367 systemd[1]: Stopped target initrd-switch-root.target. Feb 13 12:54:07.388397 systemd[1]: Stopped target initrd-fs.target. Feb 13 12:54:07.388428 systemd[1]: Stopped target initrd-root-fs.target. Feb 13 12:54:07.388461 systemd[1]: Reached target integritysetup.target. Feb 13 12:54:07.388490 systemd[1]: Reached target remote-cryptsetup.target. Feb 13 12:54:07.388521 systemd[1]: Reached target remote-fs.target. Feb 13 12:54:07.388551 systemd[1]: Reached target slices.target. Feb 13 12:54:07.388580 systemd[1]: Reached target swap.target. Feb 13 12:54:07.388609 systemd[1]: Reached target torcx.target. Feb 13 12:54:07.388641 systemd[1]: Reached target veritysetup.target. Feb 13 12:54:07.388673 systemd[1]: Listening on systemd-coredump.socket. Feb 13 12:54:07.388704 systemd[1]: Listening on systemd-initctl.socket. Feb 13 12:54:07.388743 systemd[1]: Listening on systemd-networkd.socket. Feb 13 12:54:07.388781 systemd[1]: Listening on systemd-udevd-control.socket. Feb 13 12:54:07.388810 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 13 12:54:07.388839 systemd[1]: Listening on systemd-userdbd.socket. Feb 13 12:54:07.388871 systemd[1]: Mounting dev-hugepages.mount... Feb 13 12:54:07.388900 systemd[1]: Mounting dev-mqueue.mount... Feb 13 12:54:07.388929 systemd[1]: Mounting media.mount... Feb 13 12:54:07.388995 systemd[1]: Mounting sys-kernel-debug.mount... Feb 13 12:54:07.389028 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 13 12:54:07.389059 systemd[1]: Mounting tmp.mount... Feb 13 12:54:07.389093 systemd[1]: Starting flatcar-tmpfiles.service... Feb 13 12:54:07.389125 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 13 12:54:07.389154 systemd[1]: Starting kmod-static-nodes.service... Feb 13 12:54:07.389184 systemd[1]: Starting modprobe@configfs.service... Feb 13 12:54:07.389215 systemd[1]: Starting modprobe@dm_mod.service... Feb 13 12:54:07.389245 systemd[1]: Starting modprobe@drm.service... Feb 13 12:54:07.389273 systemd[1]: Starting modprobe@efi_pstore.service... Feb 13 12:54:07.389302 systemd[1]: Starting modprobe@fuse.service... Feb 13 12:54:07.389331 systemd[1]: Starting modprobe@loop.service... Feb 13 12:54:07.389366 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 13 12:54:07.389400 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 13 12:54:07.389429 systemd[1]: Stopped systemd-fsck-root.service. Feb 13 12:54:07.389462 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 13 12:54:07.389493 systemd[1]: Stopped systemd-fsck-usr.service. Feb 13 12:54:07.389522 systemd[1]: Stopped systemd-journald.service. Feb 13 12:54:07.389553 systemd[1]: Starting systemd-journald.service... Feb 13 12:54:07.389582 systemd[1]: Starting systemd-modules-load.service... Feb 13 12:54:07.389612 systemd[1]: Starting systemd-network-generator.service... Feb 13 12:54:07.389647 systemd[1]: Starting systemd-remount-fs.service... Feb 13 12:54:07.389677 systemd[1]: Starting systemd-udev-trigger.service... Feb 13 12:54:07.389708 systemd[1]: verity-setup.service: Deactivated successfully. Feb 13 12:54:07.389739 systemd[1]: Stopped verity-setup.service. Feb 13 12:54:07.389769 systemd[1]: Finished kmod-static-nodes.service. Feb 13 12:54:07.389797 kernel: fuse: init (API version 7.34) Feb 13 12:54:07.389828 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 13 12:54:07.389869 systemd[1]: Finished modprobe@configfs.service. Feb 13 12:54:07.389901 kernel: loop: module loaded Feb 13 12:54:07.389930 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 13 12:54:07.390046 systemd[1]: Finished modprobe@dm_mod.service. Feb 13 12:54:07.390078 systemd[1]: Mounted dev-hugepages.mount. Feb 13 12:54:07.390121 systemd[1]: Mounted dev-mqueue.mount. Feb 13 12:54:07.390156 systemd[1]: Mounted media.mount. Feb 13 12:54:07.390191 systemd[1]: Mounted sys-kernel-debug.mount. Feb 13 12:54:07.390222 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 13 12:54:07.390254 systemd[1]: Mounted tmp.mount. Feb 13 12:54:07.390283 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 13 12:54:07.390312 systemd[1]: Finished modprobe@drm.service. Feb 13 12:54:07.390346 systemd[1]: Finished flatcar-tmpfiles.service. Feb 13 12:54:07.390376 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 13 12:54:07.390407 systemd[1]: Finished modprobe@efi_pstore.service. Feb 13 12:54:07.390471 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 13 12:54:07.390507 systemd[1]: Finished modprobe@fuse.service. Feb 13 12:54:07.390545 systemd-journald[1501]: Journal started Feb 13 12:54:07.390638 systemd-journald[1501]: Runtime Journal (/run/log/journal/ec2ddc2f2cd8b9a7458bbc006f401ea5) is 8.0M, max 75.4M, 67.4M free. Feb 13 12:53:57.029000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 13 12:53:57.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 13 12:53:57.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 13 12:53:57.530000 audit: BPF prog-id=10 op=LOAD Feb 13 12:53:57.530000 audit: BPF prog-id=10 op=UNLOAD Feb 13 12:53:57.531000 audit: BPF prog-id=11 op=LOAD Feb 13 12:53:57.531000 audit: BPF prog-id=11 op=UNLOAD Feb 13 12:53:58.068000 audit[1415]: AVC avc: denied { associate } for pid=1415 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 13 12:53:58.068000 audit[1415]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458ac a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1398 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:53:58.068000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 13 12:53:58.072000 audit[1415]: AVC avc: denied { associate } for pid=1415 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 13 12:53:58.072000 audit[1415]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145985 a2=1ed a3=0 items=2 ppid=1398 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:53:58.072000 audit: CWD cwd="/" Feb 13 12:53:58.072000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 12:53:58.072000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 12:53:58.072000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 13 12:54:06.936000 audit: BPF prog-id=12 op=LOAD Feb 13 12:54:06.936000 audit: BPF prog-id=3 op=UNLOAD Feb 13 12:54:06.939000 audit: BPF prog-id=13 op=LOAD Feb 13 12:54:06.941000 audit: BPF prog-id=14 op=LOAD Feb 13 12:54:06.941000 audit: BPF prog-id=4 op=UNLOAD Feb 13 12:54:06.941000 audit: BPF prog-id=5 op=UNLOAD Feb 13 12:54:06.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:06.949000 audit: BPF prog-id=12 op=UNLOAD Feb 13 12:54:06.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:06.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.231000 audit: BPF prog-id=15 op=LOAD Feb 13 12:54:07.232000 audit: BPF prog-id=16 op=LOAD Feb 13 12:54:07.232000 audit: BPF prog-id=17 op=LOAD Feb 13 12:54:07.232000 audit: BPF prog-id=13 op=UNLOAD Feb 13 12:54:07.232000 audit: BPF prog-id=14 op=UNLOAD Feb 13 12:54:07.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.382000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 13 12:54:07.382000 audit[1501]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=fffffcae6d40 a2=4000 a3=1 items=0 ppid=1 pid=1501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:07.382000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 13 12:54:06.933084 systemd[1]: Queued start job for default target multi-user.target. Feb 13 12:53:58.057489 /usr/lib/systemd/system-generators/torcx-generator[1415]: time="2024-02-13T12:53:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 13 12:54:06.944019 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 13 12:53:58.058110 /usr/lib/systemd/system-generators/torcx-generator[1415]: time="2024-02-13T12:53:58Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 13 12:53:58.058178 /usr/lib/systemd/system-generators/torcx-generator[1415]: time="2024-02-13T12:53:58Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 13 12:53:58.058247 /usr/lib/systemd/system-generators/torcx-generator[1415]: time="2024-02-13T12:53:58Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 13 12:53:58.058274 /usr/lib/systemd/system-generators/torcx-generator[1415]: time="2024-02-13T12:53:58Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 13 12:53:58.058331 /usr/lib/systemd/system-generators/torcx-generator[1415]: time="2024-02-13T12:53:58Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 13 12:53:58.058361 /usr/lib/systemd/system-generators/torcx-generator[1415]: time="2024-02-13T12:53:58Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 13 12:53:58.058752 /usr/lib/systemd/system-generators/torcx-generator[1415]: time="2024-02-13T12:53:58Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 13 12:53:58.058828 /usr/lib/systemd/system-generators/torcx-generator[1415]: time="2024-02-13T12:53:58Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 13 12:53:58.058864 /usr/lib/systemd/system-generators/torcx-generator[1415]: time="2024-02-13T12:53:58Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 13 12:53:58.059842 /usr/lib/systemd/system-generators/torcx-generator[1415]: time="2024-02-13T12:53:58Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 13 12:53:58.059924 /usr/lib/systemd/system-generators/torcx-generator[1415]: time="2024-02-13T12:53:58Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 13 12:53:58.059987 /usr/lib/systemd/system-generators/torcx-generator[1415]: time="2024-02-13T12:53:58Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 13 12:53:58.060028 /usr/lib/systemd/system-generators/torcx-generator[1415]: time="2024-02-13T12:53:58Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 13 12:53:58.060073 /usr/lib/systemd/system-generators/torcx-generator[1415]: time="2024-02-13T12:53:58Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 13 12:53:58.060111 /usr/lib/systemd/system-generators/torcx-generator[1415]: time="2024-02-13T12:53:58Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 13 12:54:07.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:05.507778 /usr/lib/systemd/system-generators/torcx-generator[1415]: time="2024-02-13T12:54:05Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 12:54:05.508356 /usr/lib/systemd/system-generators/torcx-generator[1415]: time="2024-02-13T12:54:05Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 12:54:05.508591 /usr/lib/systemd/system-generators/torcx-generator[1415]: time="2024-02-13T12:54:05Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 12:54:05.509070 /usr/lib/systemd/system-generators/torcx-generator[1415]: time="2024-02-13T12:54:05Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 12:54:05.509179 /usr/lib/systemd/system-generators/torcx-generator[1415]: time="2024-02-13T12:54:05Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 13 12:54:05.509317 /usr/lib/systemd/system-generators/torcx-generator[1415]: time="2024-02-13T12:54:05Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 13 12:54:07.404858 systemd[1]: Started systemd-journald.service. Feb 13 12:54:07.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.404641 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 13 12:54:07.405120 systemd[1]: Finished modprobe@loop.service. Feb 13 12:54:07.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.408247 systemd[1]: Finished systemd-modules-load.service. Feb 13 12:54:07.410894 systemd[1]: Finished systemd-network-generator.service. Feb 13 12:54:07.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.413403 systemd[1]: Finished systemd-remount-fs.service. Feb 13 12:54:07.416522 systemd[1]: Reached target network-pre.target. Feb 13 12:54:07.420664 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 13 12:54:07.429152 systemd[1]: Mounting sys-kernel-config.mount... Feb 13 12:54:07.430812 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 13 12:54:07.439086 systemd[1]: Starting systemd-hwdb-update.service... Feb 13 12:54:07.445761 systemd[1]: Starting systemd-journal-flush.service... Feb 13 12:54:07.448230 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 13 12:54:07.450427 systemd[1]: Starting systemd-random-seed.service... Feb 13 12:54:07.452202 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 13 12:54:07.454561 systemd[1]: Starting systemd-sysctl.service... Feb 13 12:54:07.458699 systemd[1]: Starting systemd-sysusers.service... Feb 13 12:54:07.463110 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 13 12:54:07.465302 systemd[1]: Mounted sys-kernel-config.mount. Feb 13 12:54:07.481748 systemd-journald[1501]: Time spent on flushing to /var/log/journal/ec2ddc2f2cd8b9a7458bbc006f401ea5 is 68.379ms for 1173 entries. Feb 13 12:54:07.481748 systemd-journald[1501]: System Journal (/var/log/journal/ec2ddc2f2cd8b9a7458bbc006f401ea5) is 8.0M, max 195.6M, 187.6M free. Feb 13 12:54:07.641850 systemd-journald[1501]: Received client request to flush runtime journal. Feb 13 12:54:07.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.503511 systemd[1]: Finished systemd-random-seed.service. Feb 13 12:54:07.505560 systemd[1]: Reached target first-boot-complete.target. Feb 13 12:54:07.643916 udevadm[1534]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 13 12:54:07.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:07.529282 systemd[1]: Finished systemd-sysctl.service. Feb 13 12:54:07.602913 systemd[1]: Finished systemd-udev-trigger.service. Feb 13 12:54:07.606914 systemd[1]: Starting systemd-udev-settle.service... Feb 13 12:54:07.643852 systemd[1]: Finished systemd-journal-flush.service. Feb 13 12:54:08.087981 systemd[1]: Finished systemd-sysusers.service. Feb 13 12:54:08.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:08.989506 systemd[1]: Finished systemd-hwdb-update.service. Feb 13 12:54:08.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:08.992000 audit: BPF prog-id=18 op=LOAD Feb 13 12:54:08.992000 audit: BPF prog-id=19 op=LOAD Feb 13 12:54:08.992000 audit: BPF prog-id=7 op=UNLOAD Feb 13 12:54:08.992000 audit: BPF prog-id=8 op=UNLOAD Feb 13 12:54:08.994561 systemd[1]: Starting systemd-udevd.service... Feb 13 12:54:09.032099 systemd-udevd[1535]: Using default interface naming scheme 'v252'. Feb 13 12:54:09.215870 systemd[1]: Started systemd-udevd.service. Feb 13 12:54:09.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:09.218000 audit: BPF prog-id=20 op=LOAD Feb 13 12:54:09.220634 systemd[1]: Starting systemd-networkd.service... Feb 13 12:54:09.227000 audit: BPF prog-id=21 op=LOAD Feb 13 12:54:09.227000 audit: BPF prog-id=22 op=LOAD Feb 13 12:54:09.227000 audit: BPF prog-id=23 op=LOAD Feb 13 12:54:09.230128 systemd[1]: Starting systemd-userdbd.service... Feb 13 12:54:09.296637 (udev-worker)[1536]: Network interface NamePolicy= disabled on kernel command line. Feb 13 12:54:09.328771 systemd[1]: Started systemd-userdbd.service. Feb 13 12:54:09.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:09.349796 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 13 12:54:09.597600 systemd-networkd[1541]: lo: Link UP Feb 13 12:54:09.597621 systemd-networkd[1541]: lo: Gained carrier Feb 13 12:54:09.598671 systemd-networkd[1541]: Enumeration completed Feb 13 12:54:09.598848 systemd[1]: Started systemd-networkd.service. Feb 13 12:54:09.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:09.602084 systemd-networkd[1541]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 12:54:09.607910 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 13 12:54:09.614031 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1547) Feb 13 12:54:09.614184 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 13 12:54:09.614802 systemd-networkd[1541]: eth0: Link UP Feb 13 12:54:09.615125 systemd-networkd[1541]: eth0: Gained carrier Feb 13 12:54:09.638241 systemd-networkd[1541]: eth0: DHCPv4 address 172.31.23.232/20, gateway 172.31.16.1 acquired from 172.31.16.1 Feb 13 12:54:09.724683 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 13 12:54:09.727281 systemd[1]: Finished systemd-udev-settle.service. Feb 13 12:54:09.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:09.731392 systemd[1]: Starting lvm2-activation-early.service... Feb 13 12:54:09.827982 lvm[1654]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 13 12:54:09.867523 systemd[1]: Finished lvm2-activation-early.service. Feb 13 12:54:09.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:09.869667 systemd[1]: Reached target cryptsetup.target. Feb 13 12:54:09.886396 systemd[1]: Starting lvm2-activation.service... Feb 13 12:54:09.895278 lvm[1655]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 13 12:54:09.932621 systemd[1]: Finished lvm2-activation.service. Feb 13 12:54:09.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:09.934620 systemd[1]: Reached target local-fs-pre.target. Feb 13 12:54:09.936399 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 13 12:54:09.936450 systemd[1]: Reached target local-fs.target. Feb 13 12:54:09.938150 systemd[1]: Reached target machines.target. Feb 13 12:54:09.942056 systemd[1]: Starting ldconfig.service... Feb 13 12:54:09.944890 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 13 12:54:09.945014 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 12:54:09.947228 systemd[1]: Starting systemd-boot-update.service... Feb 13 12:54:09.950977 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 13 12:54:09.955830 systemd[1]: Starting systemd-machine-id-commit.service... Feb 13 12:54:09.958793 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 13 12:54:09.958940 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 13 12:54:09.962828 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 13 12:54:10.019628 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 13 12:54:10.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:10.075916 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1657 (bootctl) Feb 13 12:54:10.078260 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 13 12:54:10.110651 systemd-tmpfiles[1661]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 13 12:54:10.116558 systemd-tmpfiles[1661]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 13 12:54:10.168993 systemd-fsck[1665]: fsck.fat 4.2 (2021-01-31) Feb 13 12:54:10.168993 systemd-fsck[1665]: /dev/nvme0n1p1: 236 files, 113719/258078 clusters Feb 13 12:54:10.173296 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 13 12:54:10.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:10.177836 systemd[1]: Mounting boot.mount... Feb 13 12:54:10.200026 systemd[1]: Mounted boot.mount. Feb 13 12:54:10.219429 systemd-tmpfiles[1661]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 13 12:54:10.230656 systemd[1]: Finished systemd-boot-update.service. Feb 13 12:54:10.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:10.589763 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 13 12:54:10.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:10.594191 systemd[1]: Starting audit-rules.service... Feb 13 12:54:10.598596 systemd[1]: Starting clean-ca-certificates.service... Feb 13 12:54:10.605522 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 13 12:54:10.618000 audit: BPF prog-id=24 op=LOAD Feb 13 12:54:10.623000 audit: BPF prog-id=25 op=LOAD Feb 13 12:54:10.621031 systemd[1]: Starting systemd-resolved.service... Feb 13 12:54:10.626575 systemd[1]: Starting systemd-timesyncd.service... Feb 13 12:54:10.632570 systemd[1]: Starting systemd-update-utmp.service... Feb 13 12:54:10.635422 systemd[1]: Finished clean-ca-certificates.service. Feb 13 12:54:10.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:10.638815 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 13 12:54:10.654000 audit[1691]: SYSTEM_BOOT pid=1691 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 13 12:54:10.659169 systemd[1]: Finished systemd-update-utmp.service. Feb 13 12:54:10.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:10.698429 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 13 12:54:10.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:10.756592 systemd[1]: Started systemd-timesyncd.service. Feb 13 12:54:10.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:10.758676 systemd[1]: Reached target time-set.target. Feb 13 12:54:10.772000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 13 12:54:10.772000 audit[1701]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffefb95350 a2=420 a3=0 items=0 ppid=1680 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:10.772000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 13 12:54:10.773832 augenrules[1701]: No rules Feb 13 12:54:10.775032 systemd[1]: Finished audit-rules.service. Feb 13 12:54:10.851425 systemd-resolved[1689]: Positive Trust Anchors: Feb 13 12:54:10.851455 systemd-resolved[1689]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 13 12:54:10.851508 systemd-resolved[1689]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 13 12:54:10.872524 systemd-timesyncd[1690]: Contacted time server 5.161.184.148:123 (0.flatcar.pool.ntp.org). Feb 13 12:54:10.873251 systemd-timesyncd[1690]: Initial clock synchronization to Tue 2024-02-13 12:54:11.068757 UTC. Feb 13 12:54:10.997818 systemd-resolved[1689]: Defaulting to hostname 'linux'. Feb 13 12:54:11.000749 systemd[1]: Started systemd-resolved.service. Feb 13 12:54:11.002671 systemd[1]: Reached target network.target. Feb 13 12:54:11.004340 systemd[1]: Reached target nss-lookup.target. Feb 13 12:54:11.517909 systemd-networkd[1541]: eth0: Gained IPv6LL Feb 13 12:54:11.520782 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 13 12:54:11.523037 systemd[1]: Reached target network-online.target. Feb 13 12:54:12.565397 ldconfig[1656]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 13 12:54:12.801003 systemd[1]: Finished ldconfig.service. Feb 13 12:54:12.805602 systemd[1]: Starting systemd-update-done.service... Feb 13 12:54:12.819757 systemd[1]: Finished systemd-update-done.service. Feb 13 12:54:12.822000 systemd[1]: Reached target sysinit.target. Feb 13 12:54:12.823959 systemd[1]: Started motdgen.path. Feb 13 12:54:12.825747 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 13 12:54:12.831865 systemd[1]: Started logrotate.timer. Feb 13 12:54:12.833635 systemd[1]: Started mdadm.timer. Feb 13 12:54:12.835180 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 13 12:54:12.837045 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 13 12:54:12.837105 systemd[1]: Reached target paths.target. Feb 13 12:54:12.838653 systemd[1]: Reached target timers.target. Feb 13 12:54:12.847732 systemd[1]: Listening on dbus.socket. Feb 13 12:54:12.851283 systemd[1]: Starting docker.socket... Feb 13 12:54:12.858112 systemd[1]: Listening on sshd.socket. Feb 13 12:54:12.859948 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 12:54:12.860855 systemd[1]: Listening on docker.socket. Feb 13 12:54:12.862648 systemd[1]: Reached target sockets.target. Feb 13 12:54:12.864399 systemd[1]: Reached target basic.target. Feb 13 12:54:12.866095 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 13 12:54:12.866165 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 13 12:54:12.868336 systemd[1]: Started amazon-ssm-agent.service. Feb 13 12:54:12.873822 systemd[1]: Starting containerd.service... Feb 13 12:54:12.878243 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 13 12:54:12.886259 systemd[1]: Starting dbus.service... Feb 13 12:54:12.890312 systemd[1]: Starting enable-oem-cloudinit.service... Feb 13 12:54:12.894855 systemd[1]: Starting extend-filesystems.service... Feb 13 12:54:12.898186 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 13 12:54:12.901161 systemd[1]: Starting motdgen.service... Feb 13 12:54:12.905644 systemd[1]: Started nvidia.service. Feb 13 12:54:12.910688 systemd[1]: Starting prepare-cni-plugins.service... Feb 13 12:54:12.914726 systemd[1]: Starting prepare-critools.service... Feb 13 12:54:12.919489 systemd[1]: Starting prepare-helm.service... Feb 13 12:54:12.923460 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 13 12:54:12.927568 systemd[1]: Starting sshd-keygen.service... Feb 13 12:54:12.935125 systemd[1]: Starting systemd-logind.service... Feb 13 12:54:12.937673 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 12:54:12.937805 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 13 12:54:12.938731 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 13 12:54:13.021296 jq[1732]: true Feb 13 12:54:12.940246 systemd[1]: Starting update-engine.service... Feb 13 12:54:13.040580 jq[1721]: false Feb 13 12:54:12.946220 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 13 12:54:13.035017 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 13 12:54:13.035372 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 13 12:54:13.052307 tar[1735]: linux-arm64/helm Feb 13 12:54:13.037806 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 13 12:54:13.059263 tar[1736]: ./ Feb 13 12:54:13.059263 tar[1736]: ./macvlan Feb 13 12:54:13.038138 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 13 12:54:13.072876 jq[1741]: true Feb 13 12:54:13.112245 tar[1737]: crictl Feb 13 12:54:13.222695 dbus-daemon[1720]: [system] SELinux support is enabled Feb 13 12:54:13.223593 systemd[1]: Started dbus.service. Feb 13 12:54:13.228339 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 13 12:54:13.228385 systemd[1]: Reached target system-config.target. Feb 13 12:54:13.230352 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 13 12:54:13.230382 systemd[1]: Reached target user-config.target. Feb 13 12:54:13.254582 systemd[1]: motdgen.service: Deactivated successfully. Feb 13 12:54:13.254938 systemd[1]: Finished motdgen.service. Feb 13 12:54:13.298817 extend-filesystems[1722]: Found nvme0n1 Feb 13 12:54:13.303132 extend-filesystems[1722]: Found nvme0n1p1 Feb 13 12:54:13.307315 extend-filesystems[1722]: Found nvme0n1p2 Feb 13 12:54:13.311452 extend-filesystems[1722]: Found nvme0n1p3 Feb 13 12:54:13.315307 extend-filesystems[1722]: Found usr Feb 13 12:54:13.319149 extend-filesystems[1722]: Found nvme0n1p4 Feb 13 12:54:13.323368 extend-filesystems[1722]: Found nvme0n1p6 Feb 13 12:54:13.329006 extend-filesystems[1722]: Found nvme0n1p7 Feb 13 12:54:13.333721 extend-filesystems[1722]: Found nvme0n1p9 Feb 13 12:54:13.340223 extend-filesystems[1722]: Checking size of /dev/nvme0n1p9 Feb 13 12:54:13.348599 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 13 12:54:13.352039 systemd[1]: Finished systemd-machine-id-commit.service. Feb 13 12:54:13.357494 dbus-daemon[1720]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1541 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Feb 13 12:54:13.364399 systemd[1]: Starting systemd-hostnamed.service... Feb 13 12:54:13.403666 amazon-ssm-agent[1717]: 2024/02/13 12:54:13 Failed to load instance info from vault. RegistrationKey does not exist. Feb 13 12:54:13.405809 amazon-ssm-agent[1717]: Initializing new seelog logger Feb 13 12:54:13.411799 amazon-ssm-agent[1717]: New Seelog Logger Creation Complete Feb 13 12:54:13.412146 amazon-ssm-agent[1717]: 2024/02/13 12:54:13 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Feb 13 12:54:13.412268 amazon-ssm-agent[1717]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Feb 13 12:54:13.412724 amazon-ssm-agent[1717]: 2024/02/13 12:54:13 processing appconfig overrides Feb 13 12:54:13.428862 update_engine[1731]: I0213 12:54:13.428469 1731 main.cc:92] Flatcar Update Engine starting Feb 13 12:54:13.469467 bash[1780]: Updated "/home/core/.ssh/authorized_keys" Feb 13 12:54:13.471783 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 13 12:54:13.488497 systemd[1]: Started update-engine.service. Feb 13 12:54:13.488983 update_engine[1731]: I0213 12:54:13.488569 1731 update_check_scheduler.cc:74] Next update check in 2m5s Feb 13 12:54:13.495616 systemd[1]: Started locksmithd.service. Feb 13 12:54:13.504898 extend-filesystems[1722]: Resized partition /dev/nvme0n1p9 Feb 13 12:54:13.514526 extend-filesystems[1796]: resize2fs 1.46.5 (30-Dec-2021) Feb 13 12:54:13.519577 env[1734]: time="2024-02-13T12:54:13.518547285Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 13 12:54:13.550018 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Feb 13 12:54:13.558042 systemd-logind[1730]: Watching system buttons on /dev/input/event0 (Power Button) Feb 13 12:54:13.561524 systemd-logind[1730]: New seat seat0. Feb 13 12:54:13.569840 systemd[1]: Started systemd-logind.service. Feb 13 12:54:13.611026 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Feb 13 12:54:13.635487 extend-filesystems[1796]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Feb 13 12:54:13.635487 extend-filesystems[1796]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 13 12:54:13.635487 extend-filesystems[1796]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Feb 13 12:54:13.668166 extend-filesystems[1722]: Resized filesystem in /dev/nvme0n1p9 Feb 13 12:54:13.642222 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 13 12:54:13.642585 systemd[1]: Finished extend-filesystems.service. Feb 13 12:54:13.682258 tar[1736]: ./static Feb 13 12:54:13.728685 systemd[1]: nvidia.service: Deactivated successfully. Feb 13 12:54:13.742819 env[1734]: time="2024-02-13T12:54:13.742666493Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 13 12:54:13.743085 env[1734]: time="2024-02-13T12:54:13.743038101Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 13 12:54:13.752280 env[1734]: time="2024-02-13T12:54:13.752197173Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 13 12:54:13.752280 env[1734]: time="2024-02-13T12:54:13.752269157Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 13 12:54:13.752708 env[1734]: time="2024-02-13T12:54:13.752656230Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 13 12:54:13.752792 env[1734]: time="2024-02-13T12:54:13.752703653Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 13 12:54:13.752792 env[1734]: time="2024-02-13T12:54:13.752737603Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 13 12:54:13.752792 env[1734]: time="2024-02-13T12:54:13.752762654Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 13 12:54:13.753003 env[1734]: time="2024-02-13T12:54:13.752952944Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 13 12:54:13.753477 env[1734]: time="2024-02-13T12:54:13.753420120Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 13 12:54:13.753750 env[1734]: time="2024-02-13T12:54:13.753696246Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 13 12:54:13.753835 env[1734]: time="2024-02-13T12:54:13.753746053Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 13 12:54:13.753922 env[1734]: time="2024-02-13T12:54:13.753879996Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 13 12:54:13.754102 env[1734]: time="2024-02-13T12:54:13.753924179Z" level=info msg="metadata content store policy set" policy=shared Feb 13 12:54:13.762706 env[1734]: time="2024-02-13T12:54:13.762631382Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 13 12:54:13.762861 env[1734]: time="2024-02-13T12:54:13.762713281Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 13 12:54:13.762861 env[1734]: time="2024-02-13T12:54:13.762748551Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 13 12:54:13.762861 env[1734]: time="2024-02-13T12:54:13.762813958Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 13 12:54:13.762861 env[1734]: time="2024-02-13T12:54:13.762852860Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 13 12:54:13.763156 env[1734]: time="2024-02-13T12:54:13.762886016Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 13 12:54:13.763156 env[1734]: time="2024-02-13T12:54:13.762918047Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 13 12:54:13.763574 env[1734]: time="2024-02-13T12:54:13.763514776Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 13 12:54:13.763682 env[1734]: time="2024-02-13T12:54:13.763578312Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 13 12:54:13.763682 env[1734]: time="2024-02-13T12:54:13.763644685Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 13 12:54:13.763815 env[1734]: time="2024-02-13T12:54:13.763677596Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 13 12:54:13.763815 env[1734]: time="2024-02-13T12:54:13.763709358Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 13 12:54:13.763990 env[1734]: time="2024-02-13T12:54:13.763938526Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 13 12:54:13.764190 env[1734]: time="2024-02-13T12:54:13.764143598Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 13 12:54:13.764594 env[1734]: time="2024-02-13T12:54:13.764546687Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 13 12:54:13.764693 env[1734]: time="2024-02-13T12:54:13.764609709Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 13 12:54:13.764693 env[1734]: time="2024-02-13T12:54:13.764643379Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 13 12:54:13.764824 env[1734]: time="2024-02-13T12:54:13.764745291Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 13 12:54:13.764824 env[1734]: time="2024-02-13T12:54:13.764776931Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 13 12:54:13.764824 env[1734]: time="2024-02-13T12:54:13.764807825Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 13 12:54:13.764990 env[1734]: time="2024-02-13T12:54:13.764837765Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 13 12:54:13.764990 env[1734]: time="2024-02-13T12:54:13.764869087Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 13 12:54:13.764990 env[1734]: time="2024-02-13T12:54:13.764900996Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 13 12:54:13.764990 env[1734]: time="2024-02-13T12:54:13.764929836Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 13 12:54:13.764990 env[1734]: time="2024-02-13T12:54:13.764958933Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 13 12:54:13.765306 env[1734]: time="2024-02-13T12:54:13.765015635Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 13 12:54:13.765378 env[1734]: time="2024-02-13T12:54:13.765297483Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 13 12:54:13.765378 env[1734]: time="2024-02-13T12:54:13.765332228Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 13 12:54:13.765378 env[1734]: time="2024-02-13T12:54:13.765362290Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 13 12:54:13.765582 env[1734]: time="2024-02-13T12:54:13.765392353Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 13 12:54:13.765582 env[1734]: time="2024-02-13T12:54:13.765425753Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 13 12:54:13.765582 env[1734]: time="2024-02-13T12:54:13.765456293Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 13 12:54:13.765582 env[1734]: time="2024-02-13T12:54:13.765492480Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 13 12:54:13.765582 env[1734]: time="2024-02-13T12:54:13.765555931Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 13 12:54:13.766002 env[1734]: time="2024-02-13T12:54:13.765886840Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 13 12:54:13.767279 env[1734]: time="2024-02-13T12:54:13.766013778Z" level=info msg="Connect containerd service" Feb 13 12:54:13.767279 env[1734]: time="2024-02-13T12:54:13.766079992Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 13 12:54:13.771788 env[1734]: time="2024-02-13T12:54:13.771708517Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 13 12:54:13.772303 env[1734]: time="2024-02-13T12:54:13.772249474Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 13 12:54:13.772426 env[1734]: time="2024-02-13T12:54:13.772377769Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 13 12:54:13.772581 systemd[1]: Started containerd.service. Feb 13 12:54:13.809801 env[1734]: time="2024-02-13T12:54:13.809727145Z" level=info msg="containerd successfully booted in 0.298113s" Feb 13 12:54:13.810178 tar[1736]: ./vlan Feb 13 12:54:13.811822 env[1734]: time="2024-02-13T12:54:13.809068652Z" level=info msg="Start subscribing containerd event" Feb 13 12:54:13.851237 env[1734]: time="2024-02-13T12:54:13.851166718Z" level=info msg="Start recovering state" Feb 13 12:54:13.851435 env[1734]: time="2024-02-13T12:54:13.851381190Z" level=info msg="Start event monitor" Feb 13 12:54:13.851506 env[1734]: time="2024-02-13T12:54:13.851446316Z" level=info msg="Start snapshots syncer" Feb 13 12:54:13.851506 env[1734]: time="2024-02-13T12:54:13.851474643Z" level=info msg="Start cni network conf syncer for default" Feb 13 12:54:13.851506 env[1734]: time="2024-02-13T12:54:13.851498910Z" level=info msg="Start streaming server" Feb 13 12:54:13.968226 dbus-daemon[1720]: [system] Successfully activated service 'org.freedesktop.hostname1' Feb 13 12:54:13.968465 systemd[1]: Started systemd-hostnamed.service. Feb 13 12:54:13.973907 dbus-daemon[1720]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1781 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Feb 13 12:54:13.978524 systemd[1]: Starting polkit.service... Feb 13 12:54:14.020908 polkitd[1828]: Started polkitd version 121 Feb 13 12:54:14.044996 tar[1736]: ./portmap Feb 13 12:54:14.072584 polkitd[1828]: Loading rules from directory /etc/polkit-1/rules.d Feb 13 12:54:14.073030 polkitd[1828]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 13 12:54:14.076785 polkitd[1828]: Finished loading, compiling and executing 2 rules Feb 13 12:54:14.084930 dbus-daemon[1720]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Feb 13 12:54:14.085208 systemd[1]: Started polkit.service. Feb 13 12:54:14.092052 polkitd[1828]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 13 12:54:14.163276 systemd-hostnamed[1781]: Hostname set to (transient) Feb 13 12:54:14.163440 systemd-resolved[1689]: System hostname changed to 'ip-172-31-23-232'. Feb 13 12:54:14.222441 tar[1736]: ./host-local Feb 13 12:54:14.370329 coreos-metadata[1719]: Feb 13 12:54:14.369 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Feb 13 12:54:14.377197 coreos-metadata[1719]: Feb 13 12:54:14.376 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Feb 13 12:54:14.383595 coreos-metadata[1719]: Feb 13 12:54:14.383 INFO Fetch successful Feb 13 12:54:14.384078 coreos-metadata[1719]: Feb 13 12:54:14.383 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Feb 13 12:54:14.384390 tar[1736]: ./vrf Feb 13 12:54:14.385565 coreos-metadata[1719]: Feb 13 12:54:14.385 INFO Fetch successful Feb 13 12:54:14.439661 unknown[1719]: wrote ssh authorized keys file for user: core Feb 13 12:54:14.465478 update-ssh-keys[1886]: Updated "/home/core/.ssh/authorized_keys" Feb 13 12:54:14.466713 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 13 12:54:14.487456 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO Create new startup processor Feb 13 12:54:14.496857 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [LongRunningPluginsManager] registered plugins: {} Feb 13 12:54:14.499640 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO Initializing bookkeeping folders Feb 13 12:54:14.499782 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO removing the completed state files Feb 13 12:54:14.499782 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO Initializing bookkeeping folders for long running plugins Feb 13 12:54:14.499782 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Feb 13 12:54:14.499782 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO Initializing healthcheck folders for long running plugins Feb 13 12:54:14.500022 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO Initializing locations for inventory plugin Feb 13 12:54:14.500022 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO Initializing default location for custom inventory Feb 13 12:54:14.500022 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO Initializing default location for file inventory Feb 13 12:54:14.500022 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO Initializing default location for role inventory Feb 13 12:54:14.500022 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO Init the cloudwatchlogs publisher Feb 13 12:54:14.500022 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [instanceID=i-03ab91e2ddf7da708] Successfully loaded platform independent plugin aws:runDocument Feb 13 12:54:14.500022 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [instanceID=i-03ab91e2ddf7da708] Successfully loaded platform independent plugin aws:runPowerShellScript Feb 13 12:54:14.500365 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [instanceID=i-03ab91e2ddf7da708] Successfully loaded platform independent plugin aws:configurePackage Feb 13 12:54:14.500365 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [instanceID=i-03ab91e2ddf7da708] Successfully loaded platform independent plugin aws:downloadContent Feb 13 12:54:14.500365 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [instanceID=i-03ab91e2ddf7da708] Successfully loaded platform independent plugin aws:runDockerAction Feb 13 12:54:14.500365 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [instanceID=i-03ab91e2ddf7da708] Successfully loaded platform independent plugin aws:refreshAssociation Feb 13 12:54:14.500365 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [instanceID=i-03ab91e2ddf7da708] Successfully loaded platform independent plugin aws:softwareInventory Feb 13 12:54:14.500365 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [instanceID=i-03ab91e2ddf7da708] Successfully loaded platform independent plugin aws:updateSsmAgent Feb 13 12:54:14.500365 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [instanceID=i-03ab91e2ddf7da708] Successfully loaded platform independent plugin aws:configureDocker Feb 13 12:54:14.500365 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [instanceID=i-03ab91e2ddf7da708] Successfully loaded platform dependent plugin aws:runShellScript Feb 13 12:54:14.500365 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Feb 13 12:54:14.500365 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO OS: linux, Arch: arm64 Feb 13 12:54:14.512720 amazon-ssm-agent[1717]: datastore file /var/lib/amazon/ssm/i-03ab91e2ddf7da708/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Feb 13 12:54:14.594819 tar[1736]: ./bridge Feb 13 12:54:14.597176 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [MessageGatewayService] Starting session document processing engine... Feb 13 12:54:14.692282 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [MessageGatewayService] [EngineProcessor] Starting Feb 13 12:54:14.786733 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Feb 13 12:54:14.833010 tar[1736]: ./tuning Feb 13 12:54:14.881188 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-03ab91e2ddf7da708, requestId: 1dd8070b-eedd-46c0-b9bb-d032753362ea Feb 13 12:54:14.974343 tar[1736]: ./firewall Feb 13 12:54:14.976086 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [MessagingDeliveryService] Starting document processing engine... Feb 13 12:54:15.071111 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [MessagingDeliveryService] [EngineProcessor] Starting Feb 13 12:54:15.138312 tar[1736]: ./host-device Feb 13 12:54:15.166187 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Feb 13 12:54:15.261527 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [MessagingDeliveryService] Starting message polling Feb 13 12:54:15.280178 tar[1736]: ./sbr Feb 13 12:54:15.357186 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [MessagingDeliveryService] Starting send replies to MDS Feb 13 12:54:15.410924 tar[1736]: ./loopback Feb 13 12:54:15.446071 systemd[1]: Finished prepare-critools.service. Feb 13 12:54:15.452830 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [instanceID=i-03ab91e2ddf7da708] Starting association polling Feb 13 12:54:15.464517 tar[1735]: linux-arm64/LICENSE Feb 13 12:54:15.465067 tar[1735]: linux-arm64/README.md Feb 13 12:54:15.473743 systemd[1]: Finished prepare-helm.service. Feb 13 12:54:15.502676 tar[1736]: ./dhcp Feb 13 12:54:15.548747 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Feb 13 12:54:15.644918 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [MessagingDeliveryService] [Association] Launching response handler Feb 13 12:54:15.649018 tar[1736]: ./ptp Feb 13 12:54:15.711350 tar[1736]: ./ipvlan Feb 13 12:54:15.741171 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Feb 13 12:54:15.774197 tar[1736]: ./bandwidth Feb 13 12:54:15.837763 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Feb 13 12:54:15.851913 systemd[1]: Finished prepare-cni-plugins.service. Feb 13 12:54:15.934537 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Feb 13 12:54:16.031404 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [MessageGatewayService] listening reply. Feb 13 12:54:16.128455 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [HealthCheck] HealthCheck reporting agent health. Feb 13 12:54:16.225564 locksmithd[1792]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 13 12:54:16.226196 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [OfflineService] Starting document processing engine... Feb 13 12:54:16.323499 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [OfflineService] [EngineProcessor] Starting Feb 13 12:54:16.421833 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [OfflineService] [EngineProcessor] Initial processing Feb 13 12:54:16.520097 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [OfflineService] Starting message polling Feb 13 12:54:16.618173 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [OfflineService] Starting send replies to MDS Feb 13 12:54:16.716650 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [LongRunningPluginsManager] starting long running plugin manager Feb 13 12:54:16.815595 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Feb 13 12:54:16.914457 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Feb 13 12:54:17.013675 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [StartupProcessor] Executing startup processor tasks Feb 13 12:54:17.112841 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Feb 13 12:54:17.130599 sshd_keygen[1752]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 13 12:54:17.166487 systemd[1]: Finished sshd-keygen.service. Feb 13 12:54:17.171182 systemd[1]: Starting issuegen.service... Feb 13 12:54:17.181193 systemd[1]: issuegen.service: Deactivated successfully. Feb 13 12:54:17.181537 systemd[1]: Finished issuegen.service. Feb 13 12:54:17.186375 systemd[1]: Starting systemd-user-sessions.service... Feb 13 12:54:17.199731 systemd[1]: Finished systemd-user-sessions.service. Feb 13 12:54:17.204697 systemd[1]: Started getty@tty1.service. Feb 13 12:54:17.209320 systemd[1]: Started serial-getty@ttyS0.service. Feb 13 12:54:17.211553 systemd[1]: Reached target getty.target. Feb 13 12:54:17.213653 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Feb 13 12:54:17.213472 systemd[1]: Reached target multi-user.target. Feb 13 12:54:17.218250 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 13 12:54:17.232076 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 13 12:54:17.232458 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 13 12:54:17.234704 systemd[1]: Startup finished in 1.130s (kernel) + 17.116s (initrd) + 20.526s (userspace) = 38.773s. Feb 13 12:54:17.313107 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.2 Feb 13 12:54:17.413033 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-03ab91e2ddf7da708?role=subscribe&stream=input Feb 13 12:54:17.513091 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-03ab91e2ddf7da708?role=subscribe&stream=input Feb 13 12:54:17.613328 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [MessageGatewayService] Starting receiving message from control channel Feb 13 12:54:17.713564 amazon-ssm-agent[1717]: 2024-02-13 12:54:14 INFO [MessageGatewayService] [EngineProcessor] Initial processing Feb 13 12:54:20.120849 systemd[1]: Created slice system-sshd.slice. Feb 13 12:54:20.123226 systemd[1]: Started sshd@0-172.31.23.232:22-147.75.109.163:33982.service. Feb 13 12:54:20.304307 sshd[1950]: Accepted publickey for core from 147.75.109.163 port 33982 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:54:20.308761 sshd[1950]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:54:20.326852 systemd[1]: Created slice user-500.slice. Feb 13 12:54:20.329398 systemd[1]: Starting user-runtime-dir@500.service... Feb 13 12:54:20.337136 systemd-logind[1730]: New session 1 of user core. Feb 13 12:54:20.349169 systemd[1]: Finished user-runtime-dir@500.service. Feb 13 12:54:20.352408 systemd[1]: Starting user@500.service... Feb 13 12:54:20.358881 (systemd)[1953]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:54:20.623973 systemd[1953]: Queued start job for default target default.target. Feb 13 12:54:20.625003 systemd[1953]: Reached target paths.target. Feb 13 12:54:20.625057 systemd[1953]: Reached target sockets.target. Feb 13 12:54:20.625089 systemd[1953]: Reached target timers.target. Feb 13 12:54:20.625119 systemd[1953]: Reached target basic.target. Feb 13 12:54:20.625212 systemd[1953]: Reached target default.target. Feb 13 12:54:20.625277 systemd[1953]: Startup finished in 254ms. Feb 13 12:54:20.625291 systemd[1]: Started user@500.service. Feb 13 12:54:20.627246 systemd[1]: Started session-1.scope. Feb 13 12:54:20.772948 systemd[1]: Started sshd@1-172.31.23.232:22-147.75.109.163:33998.service. Feb 13 12:54:20.947029 sshd[1962]: Accepted publickey for core from 147.75.109.163 port 33998 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:54:20.949407 sshd[1962]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:54:20.958391 systemd[1]: Started session-2.scope. Feb 13 12:54:20.959315 systemd-logind[1730]: New session 2 of user core. Feb 13 12:54:21.089575 sshd[1962]: pam_unix(sshd:session): session closed for user core Feb 13 12:54:21.094297 systemd[1]: session-2.scope: Deactivated successfully. Feb 13 12:54:21.094505 systemd-logind[1730]: Session 2 logged out. Waiting for processes to exit. Feb 13 12:54:21.095475 systemd[1]: sshd@1-172.31.23.232:22-147.75.109.163:33998.service: Deactivated successfully. Feb 13 12:54:21.097444 systemd-logind[1730]: Removed session 2. Feb 13 12:54:21.118303 systemd[1]: Started sshd@2-172.31.23.232:22-147.75.109.163:34014.service. Feb 13 12:54:21.291045 sshd[1968]: Accepted publickey for core from 147.75.109.163 port 34014 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:54:21.293542 sshd[1968]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:54:21.302127 systemd[1]: Started session-3.scope. Feb 13 12:54:21.303321 systemd-logind[1730]: New session 3 of user core. Feb 13 12:54:21.425097 sshd[1968]: pam_unix(sshd:session): session closed for user core Feb 13 12:54:21.429809 systemd[1]: sshd@2-172.31.23.232:22-147.75.109.163:34014.service: Deactivated successfully. Feb 13 12:54:21.431056 systemd[1]: session-3.scope: Deactivated successfully. Feb 13 12:54:21.432346 systemd-logind[1730]: Session 3 logged out. Waiting for processes to exit. Feb 13 12:54:21.434574 systemd-logind[1730]: Removed session 3. Feb 13 12:54:21.452530 systemd[1]: Started sshd@3-172.31.23.232:22-147.75.109.163:34030.service. Feb 13 12:54:21.624323 sshd[1974]: Accepted publickey for core from 147.75.109.163 port 34030 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:54:21.627328 sshd[1974]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:54:21.635884 systemd[1]: Started session-4.scope. Feb 13 12:54:21.637056 systemd-logind[1730]: New session 4 of user core. Feb 13 12:54:21.766857 sshd[1974]: pam_unix(sshd:session): session closed for user core Feb 13 12:54:21.772134 systemd-logind[1730]: Session 4 logged out. Waiting for processes to exit. Feb 13 12:54:21.772692 systemd[1]: sshd@3-172.31.23.232:22-147.75.109.163:34030.service: Deactivated successfully. Feb 13 12:54:21.773915 systemd[1]: session-4.scope: Deactivated successfully. Feb 13 12:54:21.775421 systemd-logind[1730]: Removed session 4. Feb 13 12:54:21.796007 systemd[1]: Started sshd@4-172.31.23.232:22-147.75.109.163:34042.service. Feb 13 12:54:21.970052 sshd[1980]: Accepted publickey for core from 147.75.109.163 port 34042 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:54:21.972935 sshd[1980]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:54:21.980716 systemd-logind[1730]: New session 5 of user core. Feb 13 12:54:21.981608 systemd[1]: Started session-5.scope. Feb 13 12:54:22.099803 sudo[1983]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 13 12:54:22.100852 sudo[1983]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 12:54:22.118238 dbus-daemon[1720]: avc: received setenforce notice (enforcing=1) Feb 13 12:54:22.120890 sudo[1983]: pam_unix(sudo:session): session closed for user root Feb 13 12:54:22.145636 sshd[1980]: pam_unix(sshd:session): session closed for user core Feb 13 12:54:22.150405 systemd[1]: session-5.scope: Deactivated successfully. Feb 13 12:54:22.151612 systemd-logind[1730]: Session 5 logged out. Waiting for processes to exit. Feb 13 12:54:22.152048 systemd[1]: sshd@4-172.31.23.232:22-147.75.109.163:34042.service: Deactivated successfully. Feb 13 12:54:22.154363 systemd-logind[1730]: Removed session 5. Feb 13 12:54:22.175589 systemd[1]: Started sshd@5-172.31.23.232:22-147.75.109.163:34046.service. Feb 13 12:54:22.349370 sshd[1987]: Accepted publickey for core from 147.75.109.163 port 34046 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:54:22.352506 sshd[1987]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:54:22.361089 systemd[1]: Started session-6.scope. Feb 13 12:54:22.363030 systemd-logind[1730]: New session 6 of user core. Feb 13 12:54:22.470093 sudo[1991]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 13 12:54:22.470590 sudo[1991]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 12:54:22.475984 sudo[1991]: pam_unix(sudo:session): session closed for user root Feb 13 12:54:22.485129 sudo[1990]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 13 12:54:22.486152 sudo[1990]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 12:54:22.505025 systemd[1]: Stopping audit-rules.service... Feb 13 12:54:22.504000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 13 12:54:22.506041 auditctl[1994]: No rules Feb 13 12:54:22.507727 kernel: kauditd_printk_skb: 65 callbacks suppressed Feb 13 12:54:22.507821 kernel: audit: type=1305 audit(1707828862.504:159): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 13 12:54:22.508408 systemd[1]: audit-rules.service: Deactivated successfully. Feb 13 12:54:22.508743 systemd[1]: Stopped audit-rules.service. Feb 13 12:54:22.504000 audit[1994]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffc6adde0 a2=420 a3=0 items=0 ppid=1 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:22.516340 systemd[1]: Starting audit-rules.service... Feb 13 12:54:22.524715 kernel: audit: type=1300 audit(1707828862.504:159): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffc6adde0 a2=420 a3=0 items=0 ppid=1 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:22.531528 kernel: audit: type=1327 audit(1707828862.504:159): proctitle=2F7362696E2F617564697463746C002D44 Feb 13 12:54:22.504000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 13 12:54:22.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:22.539620 kernel: audit: type=1131 audit(1707828862.507:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:22.552633 augenrules[2011]: No rules Feb 13 12:54:22.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:22.554167 systemd[1]: Finished audit-rules.service. Feb 13 12:54:22.562704 sudo[1990]: pam_unix(sudo:session): session closed for user root Feb 13 12:54:22.561000 audit[1990]: USER_END pid=1990 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 12:54:22.573256 kernel: audit: type=1130 audit(1707828862.553:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:22.573322 kernel: audit: type=1106 audit(1707828862.561:162): pid=1990 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 12:54:22.562000 audit[1990]: CRED_DISP pid=1990 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 12:54:22.581858 kernel: audit: type=1104 audit(1707828862.562:163): pid=1990 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 12:54:22.586208 sshd[1987]: pam_unix(sshd:session): session closed for user core Feb 13 12:54:22.587000 audit[1987]: USER_END pid=1987 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:54:22.591355 systemd-logind[1730]: Session 6 logged out. Waiting for processes to exit. Feb 13 12:54:22.592661 systemd[1]: session-6.scope: Deactivated successfully. Feb 13 12:54:22.593726 systemd[1]: sshd@5-172.31.23.232:22-147.75.109.163:34046.service: Deactivated successfully. Feb 13 12:54:22.596300 systemd-logind[1730]: Removed session 6. Feb 13 12:54:22.587000 audit[1987]: CRED_DISP pid=1987 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:54:22.611069 kernel: audit: type=1106 audit(1707828862.587:164): pid=1987 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:54:22.611294 kernel: audit: type=1104 audit(1707828862.587:165): pid=1987 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:54:22.611371 kernel: audit: type=1131 audit(1707828862.593:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.23.232:22-147.75.109.163:34046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:22.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.23.232:22-147.75.109.163:34046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:22.621443 systemd[1]: Started sshd@6-172.31.23.232:22-147.75.109.163:34048.service. Feb 13 12:54:22.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.23.232:22-147.75.109.163:34048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:22.787000 audit[2017]: USER_ACCT pid=2017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:54:22.789126 sshd[2017]: Accepted publickey for core from 147.75.109.163 port 34048 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:54:22.789000 audit[2017]: CRED_ACQ pid=2017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:54:22.789000 audit[2017]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff9ee88f0 a2=3 a3=1 items=0 ppid=1 pid=2017 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:22.789000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 12:54:22.791594 sshd[2017]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:54:22.799685 systemd[1]: Started session-7.scope. Feb 13 12:54:22.800465 systemd-logind[1730]: New session 7 of user core. Feb 13 12:54:22.809000 audit[2017]: USER_START pid=2017 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:54:22.811000 audit[2019]: CRED_ACQ pid=2019 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:54:22.904000 audit[2020]: USER_ACCT pid=2020 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 12:54:22.906054 sudo[2020]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 13 12:54:22.905000 audit[2020]: CRED_REFR pid=2020 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 12:54:22.906562 sudo[2020]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 12:54:22.908000 audit[2020]: USER_START pid=2020 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 12:54:23.879441 systemd[1]: Starting docker.service... Feb 13 12:54:23.950685 env[2035]: time="2024-02-13T12:54:23.950594695Z" level=info msg="Starting up" Feb 13 12:54:23.953423 env[2035]: time="2024-02-13T12:54:23.953376073Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 13 12:54:23.953616 env[2035]: time="2024-02-13T12:54:23.953587654Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 13 12:54:23.953755 env[2035]: time="2024-02-13T12:54:23.953722031Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 13 12:54:23.953869 env[2035]: time="2024-02-13T12:54:23.953842106Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 13 12:54:23.957710 env[2035]: time="2024-02-13T12:54:23.957664905Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 13 12:54:23.957905 env[2035]: time="2024-02-13T12:54:23.957876848Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 13 12:54:23.958087 env[2035]: time="2024-02-13T12:54:23.958052046Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 13 12:54:23.958230 env[2035]: time="2024-02-13T12:54:23.958202751Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 13 12:54:23.966670 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport609485590-merged.mount: Deactivated successfully. Feb 13 12:54:24.432914 env[2035]: time="2024-02-13T12:54:24.432283859Z" level=info msg="Loading containers: start." Feb 13 12:54:24.588000 audit[2066]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=2066 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:24.588000 audit[2066]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffd25fc9c0 a2=0 a3=1 items=0 ppid=2035 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:24.588000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 13 12:54:24.592000 audit[2068]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2068 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:24.592000 audit[2068]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffe620bd80 a2=0 a3=1 items=0 ppid=2035 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:24.592000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 13 12:54:24.596000 audit[2070]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=2070 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:24.596000 audit[2070]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe4971050 a2=0 a3=1 items=0 ppid=2035 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:24.596000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 13 12:54:24.600000 audit[2072]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=2072 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:24.600000 audit[2072]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe7667090 a2=0 a3=1 items=0 ppid=2035 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:24.600000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 13 12:54:24.605000 audit[2074]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2074 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:24.605000 audit[2074]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc3b019f0 a2=0 a3=1 items=0 ppid=2035 pid=2074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:24.605000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 13 12:54:24.632000 audit[2079]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=2079 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:24.632000 audit[2079]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff311faf0 a2=0 a3=1 items=0 ppid=2035 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:24.632000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 13 12:54:24.645000 audit[2081]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=2081 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:24.645000 audit[2081]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd3a000e0 a2=0 a3=1 items=0 ppid=2035 pid=2081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:24.645000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 13 12:54:24.649000 audit[2083]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2083 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:24.649000 audit[2083]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=fffff1142450 a2=0 a3=1 items=0 ppid=2035 pid=2083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:24.649000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 13 12:54:24.652000 audit[2085]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2085 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:24.652000 audit[2085]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffcfd80bd0 a2=0 a3=1 items=0 ppid=2035 pid=2085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:24.652000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 13 12:54:24.667000 audit[2089]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2089 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:24.667000 audit[2089]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffec1659d0 a2=0 a3=1 items=0 ppid=2035 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:24.667000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 13 12:54:24.669000 audit[2090]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2090 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:24.669000 audit[2090]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffe2077f60 a2=0 a3=1 items=0 ppid=2035 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:24.669000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 13 12:54:24.748002 kernel: Initializing XFRM netlink socket Feb 13 12:54:24.875601 env[2035]: time="2024-02-13T12:54:24.875555157Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 13 12:54:24.878904 (udev-worker)[2045]: Network interface NamePolicy= disabled on kernel command line. Feb 13 12:54:24.974000 audit[2098]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2098 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:24.974000 audit[2098]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffe98ae3a0 a2=0 a3=1 items=0 ppid=2035 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:24.974000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 13 12:54:24.987000 audit[2101]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2101 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:24.987000 audit[2101]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=fffff8e74e60 a2=0 a3=1 items=0 ppid=2035 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:24.987000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 13 12:54:24.994000 audit[2104]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2104 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:24.994000 audit[2104]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffffc7527c0 a2=0 a3=1 items=0 ppid=2035 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:24.994000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 13 12:54:24.998000 audit[2106]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2106 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:24.998000 audit[2106]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff2a30880 a2=0 a3=1 items=0 ppid=2035 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:24.998000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 13 12:54:25.002000 audit[2108]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2108 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:25.002000 audit[2108]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffdb210ca0 a2=0 a3=1 items=0 ppid=2035 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:25.002000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 13 12:54:25.006000 audit[2110]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2110 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:25.006000 audit[2110]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffc668b460 a2=0 a3=1 items=0 ppid=2035 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:25.006000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 13 12:54:25.010000 audit[2112]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2112 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:25.010000 audit[2112]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffc6ef0c20 a2=0 a3=1 items=0 ppid=2035 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:25.010000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 13 12:54:25.023000 audit[2115]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2115 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:25.023000 audit[2115]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=fffff88bb5c0 a2=0 a3=1 items=0 ppid=2035 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:25.023000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 13 12:54:25.028000 audit[2117]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2117 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:25.028000 audit[2117]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=fffff738b890 a2=0 a3=1 items=0 ppid=2035 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:25.028000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 13 12:54:25.032000 audit[2119]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2119 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:25.032000 audit[2119]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffd6a11900 a2=0 a3=1 items=0 ppid=2035 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:25.032000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 13 12:54:25.035000 audit[2121]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2121 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:25.035000 audit[2121]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff6c85bc0 a2=0 a3=1 items=0 ppid=2035 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:25.035000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 13 12:54:25.037613 systemd-networkd[1541]: docker0: Link UP Feb 13 12:54:25.053000 audit[2125]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2125 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:25.053000 audit[2125]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffef443ea0 a2=0 a3=1 items=0 ppid=2035 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:25.053000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 13 12:54:25.055000 audit[2126]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2126 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:25.055000 audit[2126]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffd70d1540 a2=0 a3=1 items=0 ppid=2035 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:25.055000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 13 12:54:25.057706 env[2035]: time="2024-02-13T12:54:25.057641747Z" level=info msg="Loading containers: done." Feb 13 12:54:25.077727 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck436934029-merged.mount: Deactivated successfully. Feb 13 12:54:25.099160 env[2035]: time="2024-02-13T12:54:25.099080357Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 13 12:54:25.099559 env[2035]: time="2024-02-13T12:54:25.099507451Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 13 12:54:25.099823 env[2035]: time="2024-02-13T12:54:25.099779232Z" level=info msg="Daemon has completed initialization" Feb 13 12:54:25.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:25.128244 systemd[1]: Started docker.service. Feb 13 12:54:25.146971 env[2035]: time="2024-02-13T12:54:25.146591887Z" level=info msg="API listen on /run/docker.sock" Feb 13 12:54:25.180851 systemd[1]: Reloading. Feb 13 12:54:25.305434 /usr/lib/systemd/system-generators/torcx-generator[2175]: time="2024-02-13T12:54:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 13 12:54:25.306175 /usr/lib/systemd/system-generators/torcx-generator[2175]: time="2024-02-13T12:54:25Z" level=info msg="torcx already run" Feb 13 12:54:25.458223 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 13 12:54:25.458263 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 13 12:54:25.496437 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 13 12:54:25.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.656000 audit: BPF prog-id=34 op=LOAD Feb 13 12:54:25.656000 audit: BPF prog-id=29 op=UNLOAD Feb 13 12:54:25.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.656000 audit: BPF prog-id=35 op=LOAD Feb 13 12:54:25.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.656000 audit: BPF prog-id=36 op=LOAD Feb 13 12:54:25.656000 audit: BPF prog-id=30 op=UNLOAD Feb 13 12:54:25.656000 audit: BPF prog-id=31 op=UNLOAD Feb 13 12:54:25.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.657000 audit: BPF prog-id=37 op=LOAD Feb 13 12:54:25.657000 audit: BPF prog-id=15 op=UNLOAD Feb 13 12:54:25.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.658000 audit: BPF prog-id=38 op=LOAD Feb 13 12:54:25.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.658000 audit: BPF prog-id=39 op=LOAD Feb 13 12:54:25.658000 audit: BPF prog-id=16 op=UNLOAD Feb 13 12:54:25.658000 audit: BPF prog-id=17 op=UNLOAD Feb 13 12:54:25.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.659000 audit: BPF prog-id=40 op=LOAD Feb 13 12:54:25.659000 audit: BPF prog-id=24 op=UNLOAD Feb 13 12:54:25.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.664000 audit: BPF prog-id=41 op=LOAD Feb 13 12:54:25.664000 audit: BPF prog-id=25 op=UNLOAD Feb 13 12:54:25.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.666000 audit: BPF prog-id=42 op=LOAD Feb 13 12:54:25.667000 audit: BPF prog-id=21 op=UNLOAD Feb 13 12:54:25.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.667000 audit: BPF prog-id=43 op=LOAD Feb 13 12:54:25.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.667000 audit: BPF prog-id=44 op=LOAD Feb 13 12:54:25.667000 audit: BPF prog-id=22 op=UNLOAD Feb 13 12:54:25.667000 audit: BPF prog-id=23 op=UNLOAD Feb 13 12:54:25.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.670000 audit: BPF prog-id=45 op=LOAD Feb 13 12:54:25.670000 audit: BPF prog-id=26 op=UNLOAD Feb 13 12:54:25.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.670000 audit: BPF prog-id=46 op=LOAD Feb 13 12:54:25.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.670000 audit: BPF prog-id=47 op=LOAD Feb 13 12:54:25.670000 audit: BPF prog-id=27 op=UNLOAD Feb 13 12:54:25.670000 audit: BPF prog-id=28 op=UNLOAD Feb 13 12:54:25.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.676000 audit: BPF prog-id=48 op=LOAD Feb 13 12:54:25.676000 audit: BPF prog-id=20 op=UNLOAD Feb 13 12:54:25.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.677000 audit: BPF prog-id=49 op=LOAD Feb 13 12:54:25.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.677000 audit: BPF prog-id=50 op=LOAD Feb 13 12:54:25.677000 audit: BPF prog-id=18 op=UNLOAD Feb 13 12:54:25.677000 audit: BPF prog-id=19 op=UNLOAD Feb 13 12:54:25.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:25.681000 audit: BPF prog-id=51 op=LOAD Feb 13 12:54:25.681000 audit: BPF prog-id=32 op=UNLOAD Feb 13 12:54:25.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:25.718836 systemd[1]: Started kubelet.service. Feb 13 12:54:25.871592 kubelet[2227]: E0213 12:54:25.871486 2227 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 13 12:54:25.876150 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 13 12:54:25.876480 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 13 12:54:25.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 13 12:54:27.153412 env[1734]: time="2024-02-13T12:54:27.153329085Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\"" Feb 13 12:54:27.926022 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount405085939.mount: Deactivated successfully. Feb 13 12:54:31.174271 env[1734]: time="2024-02-13T12:54:31.174187385Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:31.177386 env[1734]: time="2024-02-13T12:54:31.177323709Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d88fbf485621d26e515136c1848b666d7dfe0fa84ca7ebd826447b039d306d88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:31.180780 env[1734]: time="2024-02-13T12:54:31.180721524Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:31.184283 env[1734]: time="2024-02-13T12:54:31.184223617Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:31.186066 env[1734]: time="2024-02-13T12:54:31.186005207Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:d88fbf485621d26e515136c1848b666d7dfe0fa84ca7ebd826447b039d306d88\"" Feb 13 12:54:31.203647 env[1734]: time="2024-02-13T12:54:31.203594787Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\"" Feb 13 12:54:34.439922 env[1734]: time="2024-02-13T12:54:34.439864015Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:34.443486 env[1734]: time="2024-02-13T12:54:34.443436769Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:71d8e883014e0849ca9a3161bd1feac09ad210dea2f4140732e218f04a6826c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:34.447624 env[1734]: time="2024-02-13T12:54:34.447563221Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:34.451437 env[1734]: time="2024-02-13T12:54:34.451386508Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:34.453464 env[1734]: time="2024-02-13T12:54:34.453418318Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:71d8e883014e0849ca9a3161bd1feac09ad210dea2f4140732e218f04a6826c2\"" Feb 13 12:54:34.470427 env[1734]: time="2024-02-13T12:54:34.470365027Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\"" Feb 13 12:54:35.930022 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 13 12:54:35.941408 kernel: kauditd_printk_skb: 292 callbacks suppressed Feb 13 12:54:35.941500 kernel: audit: type=1130 audit(1707828875.929:409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:35.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:35.930354 systemd[1]: Stopped kubelet.service. Feb 13 12:54:35.933006 systemd[1]: Started kubelet.service. Feb 13 12:54:35.951699 kernel: audit: type=1131 audit(1707828875.929:410): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:35.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:35.964991 kernel: audit: type=1130 audit(1707828875.931:411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:35.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:36.069037 kubelet[2255]: E0213 12:54:36.068932 2255 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 13 12:54:36.077233 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 13 12:54:36.077569 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 13 12:54:36.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 13 12:54:36.086990 kernel: audit: type=1131 audit(1707828876.077:412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 13 12:54:36.447992 env[1734]: time="2024-02-13T12:54:36.447751515Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:36.452021 env[1734]: time="2024-02-13T12:54:36.451928116Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a636f3d6300bad4775ea80ad544e38f486a039732c4871bddc1db3a5336c871a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:36.464672 env[1734]: time="2024-02-13T12:54:36.464619219Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:36.469752 env[1734]: time="2024-02-13T12:54:36.469702285Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:36.471814 env[1734]: time="2024-02-13T12:54:36.471758019Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:a636f3d6300bad4775ea80ad544e38f486a039732c4871bddc1db3a5336c871a\"" Feb 13 12:54:36.480312 amazon-ssm-agent[1717]: 2024-02-13 12:54:36 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Feb 13 12:54:36.496085 env[1734]: time="2024-02-13T12:54:36.495997609Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 13 12:54:38.119914 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1888168857.mount: Deactivated successfully. Feb 13 12:54:38.845565 env[1734]: time="2024-02-13T12:54:38.845479287Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:38.849023 env[1734]: time="2024-02-13T12:54:38.848939490Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:38.851717 env[1734]: time="2024-02-13T12:54:38.851672513Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:38.853936 env[1734]: time="2024-02-13T12:54:38.853874025Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:38.854912 env[1734]: time="2024-02-13T12:54:38.854869008Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926\"" Feb 13 12:54:38.871014 env[1734]: time="2024-02-13T12:54:38.870930474Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 13 12:54:39.349789 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount114925680.mount: Deactivated successfully. Feb 13 12:54:39.360181 env[1734]: time="2024-02-13T12:54:39.360106149Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:39.364542 env[1734]: time="2024-02-13T12:54:39.364479173Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:39.368674 env[1734]: time="2024-02-13T12:54:39.368610988Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:39.372788 env[1734]: time="2024-02-13T12:54:39.372726977Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:39.374127 env[1734]: time="2024-02-13T12:54:39.374065458Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Feb 13 12:54:39.390733 env[1734]: time="2024-02-13T12:54:39.390684656Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Feb 13 12:54:40.447590 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3838925916.mount: Deactivated successfully. Feb 13 12:54:43.961886 env[1734]: time="2024-02-13T12:54:43.961827009Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:43.965292 env[1734]: time="2024-02-13T12:54:43.965243127Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ef245802824036d4a23ba6f8b3f04c055416f9dc73a54d546b1f98ad16f6b8cb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:43.968124 env[1734]: time="2024-02-13T12:54:43.968076156Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:43.970883 env[1734]: time="2024-02-13T12:54:43.970828274Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:43.973796 env[1734]: time="2024-02-13T12:54:43.973741999Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:ef245802824036d4a23ba6f8b3f04c055416f9dc73a54d546b1f98ad16f6b8cb\"" Feb 13 12:54:43.989998 env[1734]: time="2024-02-13T12:54:43.989928230Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Feb 13 12:54:44.196787 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 13 12:54:44.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:44.205999 kernel: audit: type=1131 audit(1707828884.196:413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:44.228000 audit: BPF prog-id=36 op=UNLOAD Feb 13 12:54:44.228000 audit: BPF prog-id=35 op=UNLOAD Feb 13 12:54:44.234276 kernel: audit: type=1334 audit(1707828884.228:414): prog-id=36 op=UNLOAD Feb 13 12:54:44.234359 kernel: audit: type=1334 audit(1707828884.228:415): prog-id=35 op=UNLOAD Feb 13 12:54:44.234413 kernel: audit: type=1334 audit(1707828884.228:416): prog-id=34 op=UNLOAD Feb 13 12:54:44.228000 audit: BPF prog-id=34 op=UNLOAD Feb 13 12:54:44.517437 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3762222434.mount: Deactivated successfully. Feb 13 12:54:45.313111 env[1734]: time="2024-02-13T12:54:45.313044061Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:45.316282 env[1734]: time="2024-02-13T12:54:45.316197741Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b19406328e70dd2f6a36d6dbe4e867b0684ced2fdeb2f02ecb54ead39ec0bac0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:45.320082 env[1734]: time="2024-02-13T12:54:45.320036569Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:45.323013 env[1734]: time="2024-02-13T12:54:45.322904270Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:45.324256 env[1734]: time="2024-02-13T12:54:45.324208792Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:b19406328e70dd2f6a36d6dbe4e867b0684ced2fdeb2f02ecb54ead39ec0bac0\"" Feb 13 12:54:46.180000 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 13 12:54:46.180330 systemd[1]: Stopped kubelet.service. Feb 13 12:54:46.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:46.183183 systemd[1]: Started kubelet.service. Feb 13 12:54:46.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:46.199568 kernel: audit: type=1130 audit(1707828886.179:417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:46.199664 kernel: audit: type=1131 audit(1707828886.179:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:46.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:46.217976 kernel: audit: type=1130 audit(1707828886.182:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:46.316059 kubelet[2338]: E0213 12:54:46.315986 2338 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 13 12:54:46.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 13 12:54:46.320411 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 13 12:54:46.320722 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 13 12:54:46.330058 kernel: audit: type=1131 audit(1707828886.320:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 13 12:54:53.195514 systemd[1]: Stopped kubelet.service. Feb 13 12:54:53.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:53.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:53.212862 kernel: audit: type=1130 audit(1707828893.195:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:53.212979 kernel: audit: type=1131 audit(1707828893.195:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:53.234644 systemd[1]: Reloading. Feb 13 12:54:53.350786 /usr/lib/systemd/system-generators/torcx-generator[2369]: time="2024-02-13T12:54:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 13 12:54:53.351591 /usr/lib/systemd/system-generators/torcx-generator[2369]: time="2024-02-13T12:54:53Z" level=info msg="torcx already run" Feb 13 12:54:53.510498 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 13 12:54:53.510541 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 13 12:54:53.548442 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 13 12:54:53.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.718233 kernel: audit: type=1400 audit(1707828893.699:423): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.718356 kernel: audit: type=1400 audit(1707828893.699:424): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.722055 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 13 12:54:53.730107 kernel: audit: type=1400 audit(1707828893.699:425): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.730171 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 13 12:54:53.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.739813 kernel: audit: type=1400 audit(1707828893.699:426): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.739864 kernel: audit: backlog limit exceeded Feb 13 12:54:53.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.748624 kernel: audit: type=1400 audit(1707828893.699:427): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.707000 audit: BPF prog-id=52 op=LOAD Feb 13 12:54:53.707000 audit: BPF prog-id=37 op=UNLOAD Feb 13 12:54:53.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.707000 audit: BPF prog-id=53 op=LOAD Feb 13 12:54:53.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.707000 audit: BPF prog-id=54 op=LOAD Feb 13 12:54:53.707000 audit: BPF prog-id=38 op=UNLOAD Feb 13 12:54:53.707000 audit: BPF prog-id=39 op=UNLOAD Feb 13 12:54:53.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.708000 audit: BPF prog-id=55 op=LOAD Feb 13 12:54:53.708000 audit: BPF prog-id=40 op=UNLOAD Feb 13 12:54:53.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.717000 audit: BPF prog-id=56 op=LOAD Feb 13 12:54:53.717000 audit: BPF prog-id=41 op=UNLOAD Feb 13 12:54:53.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.741000 audit: BPF prog-id=57 op=LOAD Feb 13 12:54:53.741000 audit: BPF prog-id=42 op=UNLOAD Feb 13 12:54:53.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.747000 audit: BPF prog-id=43 op=UNLOAD Feb 13 12:54:53.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit: BPF prog-id=60 op=LOAD Feb 13 12:54:53.750000 audit: BPF prog-id=45 op=UNLOAD Feb 13 12:54:53.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit: BPF prog-id=61 op=LOAD Feb 13 12:54:53.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.750000 audit: BPF prog-id=62 op=LOAD Feb 13 12:54:53.751000 audit: BPF prog-id=46 op=UNLOAD Feb 13 12:54:53.751000 audit: BPF prog-id=47 op=UNLOAD Feb 13 12:54:53.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.755000 audit: BPF prog-id=63 op=LOAD Feb 13 12:54:53.755000 audit: BPF prog-id=48 op=UNLOAD Feb 13 12:54:53.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.756000 audit: BPF prog-id=64 op=LOAD Feb 13 12:54:53.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.756000 audit: BPF prog-id=65 op=LOAD Feb 13 12:54:53.756000 audit: BPF prog-id=49 op=UNLOAD Feb 13 12:54:53.756000 audit: BPF prog-id=50 op=UNLOAD Feb 13 12:54:53.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:53.759000 audit: BPF prog-id=66 op=LOAD Feb 13 12:54:53.759000 audit: BPF prog-id=51 op=UNLOAD Feb 13 12:54:53.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:54:53.790639 systemd[1]: Started kubelet.service. Feb 13 12:54:53.893440 kubelet[2425]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 13 12:54:53.893440 kubelet[2425]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 13 12:54:53.894032 kubelet[2425]: I0213 12:54:53.893565 2425 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 13 12:54:53.896010 kubelet[2425]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 13 12:54:53.896010 kubelet[2425]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 13 12:54:55.098491 kubelet[2425]: I0213 12:54:55.098450 2425 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 13 12:54:55.099060 kubelet[2425]: I0213 12:54:55.099025 2425 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 13 12:54:55.099457 kubelet[2425]: I0213 12:54:55.099411 2425 server.go:836] "Client rotation is on, will bootstrap in background" Feb 13 12:54:55.106287 kubelet[2425]: E0213 12:54:55.106252 2425 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.23.232:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.23.232:6443: connect: connection refused Feb 13 12:54:55.106526 kubelet[2425]: I0213 12:54:55.106501 2425 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 13 12:54:55.109548 kubelet[2425]: W0213 12:54:55.109513 2425 machine.go:65] Cannot read vendor id correctly, set empty. Feb 13 12:54:55.110749 kubelet[2425]: I0213 12:54:55.110714 2425 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 13 12:54:55.111317 kubelet[2425]: I0213 12:54:55.111291 2425 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 13 12:54:55.111447 kubelet[2425]: I0213 12:54:55.111418 2425 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 13 12:54:55.111609 kubelet[2425]: I0213 12:54:55.111464 2425 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 13 12:54:55.111609 kubelet[2425]: I0213 12:54:55.111492 2425 container_manager_linux.go:308] "Creating device plugin manager" Feb 13 12:54:55.111749 kubelet[2425]: I0213 12:54:55.111676 2425 state_mem.go:36] "Initialized new in-memory state store" Feb 13 12:54:55.117458 kubelet[2425]: I0213 12:54:55.117416 2425 kubelet.go:398] "Attempting to sync node with API server" Feb 13 12:54:55.117458 kubelet[2425]: I0213 12:54:55.117462 2425 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 13 12:54:55.117680 kubelet[2425]: I0213 12:54:55.117547 2425 kubelet.go:297] "Adding apiserver pod source" Feb 13 12:54:55.117680 kubelet[2425]: I0213 12:54:55.117570 2425 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 13 12:54:55.118876 kubelet[2425]: W0213 12:54:55.118792 2425 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.23.232:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-23-232&limit=500&resourceVersion=0": dial tcp 172.31.23.232:6443: connect: connection refused Feb 13 12:54:55.118876 kubelet[2425]: E0213 12:54:55.118880 2425 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.23.232:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-23-232&limit=500&resourceVersion=0": dial tcp 172.31.23.232:6443: connect: connection refused Feb 13 12:54:55.119114 kubelet[2425]: W0213 12:54:55.119009 2425 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.23.232:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.23.232:6443: connect: connection refused Feb 13 12:54:55.119114 kubelet[2425]: E0213 12:54:55.119059 2425 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.23.232:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.23.232:6443: connect: connection refused Feb 13 12:54:55.119244 kubelet[2425]: I0213 12:54:55.119221 2425 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 13 12:54:55.119854 kubelet[2425]: W0213 12:54:55.119810 2425 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 13 12:54:55.120631 kubelet[2425]: I0213 12:54:55.120580 2425 server.go:1186] "Started kubelet" Feb 13 12:54:55.122000 audit[2425]: AVC avc: denied { mac_admin } for pid=2425 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:55.122000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 12:54:55.122000 audit[2425]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000927a10 a1=40004df380 a2=40009279e0 a3=25 items=0 ppid=1 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.122000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 12:54:55.122000 audit[2425]: AVC avc: denied { mac_admin } for pid=2425 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:55.122000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 12:54:55.122000 audit[2425]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400094eb80 a1=40004df398 a2=4000927aa0 a3=25 items=0 ppid=1 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.122000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 12:54:55.124165 kubelet[2425]: I0213 12:54:55.123437 2425 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 13 12:54:55.124165 kubelet[2425]: I0213 12:54:55.123515 2425 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 13 12:54:55.124165 kubelet[2425]: I0213 12:54:55.123633 2425 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 13 12:54:55.128512 kubelet[2425]: E0213 12:54:55.128301 2425 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-23-232.17b36d54e6cee056", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-23-232", UID:"ip-172-31-23-232", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-23-232"}, FirstTimestamp:time.Date(2024, time.February, 13, 12, 54, 55, 120547926, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 12, 54, 55, 120547926, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://172.31.23.232:6443/api/v1/namespaces/default/events": dial tcp 172.31.23.232:6443: connect: connection refused'(may retry after sleeping) Feb 13 12:54:55.128000 audit[2435]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:55.128000 audit[2435]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffcfc8a2e0 a2=0 a3=1 items=0 ppid=2425 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.128000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 13 12:54:55.129447 kubelet[2425]: I0213 12:54:55.129397 2425 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 13 12:54:55.129827 kubelet[2425]: E0213 12:54:55.129797 2425 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 13 12:54:55.130032 kubelet[2425]: E0213 12:54:55.130010 2425 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 13 12:54:55.130897 kubelet[2425]: I0213 12:54:55.130845 2425 server.go:451] "Adding debug handlers to kubelet server" Feb 13 12:54:55.132224 kubelet[2425]: I0213 12:54:55.132180 2425 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 13 12:54:55.133000 audit[2436]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:55.133000 audit[2436]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdb16e8a0 a2=0 a3=1 items=0 ppid=2425 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.133000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 13 12:54:55.134867 kubelet[2425]: I0213 12:54:55.134766 2425 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 13 12:54:55.135365 kubelet[2425]: E0213 12:54:55.135328 2425 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://172.31.23.232:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-23-232?timeout=10s": dial tcp 172.31.23.232:6443: connect: connection refused Feb 13 12:54:55.136806 kubelet[2425]: W0213 12:54:55.136739 2425 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.23.232:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.23.232:6443: connect: connection refused Feb 13 12:54:55.137035 kubelet[2425]: E0213 12:54:55.137010 2425 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.23.232:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.23.232:6443: connect: connection refused Feb 13 12:54:55.141000 audit[2438]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:55.141000 audit[2438]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff3b39bb0 a2=0 a3=1 items=0 ppid=2425 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.141000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 13 12:54:55.148000 audit[2440]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:55.148000 audit[2440]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffef4d0d20 a2=0 a3=1 items=0 ppid=2425 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.148000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 13 12:54:55.167000 audit[2447]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:55.167000 audit[2447]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffedbb7ea0 a2=0 a3=1 items=0 ppid=2425 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.167000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 13 12:54:55.170000 audit[2448]: NETFILTER_CFG table=nat:31 family=2 entries=1 op=nft_register_chain pid=2448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:55.170000 audit[2448]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffeb85d670 a2=0 a3=1 items=0 ppid=2425 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.170000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 13 12:54:55.185000 audit[2451]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_rule pid=2451 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:55.185000 audit[2451]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffcc8c2260 a2=0 a3=1 items=0 ppid=2425 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.185000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 13 12:54:55.195613 kubelet[2425]: I0213 12:54:55.195578 2425 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 13 12:54:55.195832 kubelet[2425]: I0213 12:54:55.195811 2425 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 13 12:54:55.196320 kubelet[2425]: I0213 12:54:55.196275 2425 state_mem.go:36] "Initialized new in-memory state store" Feb 13 12:54:55.199000 audit[2454]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:55.199000 audit[2454]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffc5601440 a2=0 a3=1 items=0 ppid=2425 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.199000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 13 12:54:55.201000 audit[2455]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:55.201000 audit[2455]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff34d0d50 a2=0 a3=1 items=0 ppid=2425 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.201000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 13 12:54:55.202886 kubelet[2425]: I0213 12:54:55.202853 2425 policy_none.go:49] "None policy: Start" Feb 13 12:54:55.204247 kubelet[2425]: I0213 12:54:55.204206 2425 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 13 12:54:55.204386 kubelet[2425]: I0213 12:54:55.204254 2425 state_mem.go:35] "Initializing new in-memory state store" Feb 13 12:54:55.205000 audit[2456]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=2456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:55.205000 audit[2456]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff8b42290 a2=0 a3=1 items=0 ppid=2425 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.205000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 13 12:54:55.214658 systemd[1]: Created slice kubepods.slice. Feb 13 12:54:55.220000 audit[2458]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=2458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:55.220000 audit[2458]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffc0c4ffd0 a2=0 a3=1 items=0 ppid=2425 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.220000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 13 12:54:55.223689 systemd[1]: Created slice kubepods-besteffort.slice. Feb 13 12:54:55.230000 audit[2461]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=2461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:55.230000 audit[2461]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffec5d54c0 a2=0 a3=1 items=0 ppid=2425 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.230000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 13 12:54:55.236379 systemd[1]: Created slice kubepods-burstable.slice. Feb 13 12:54:55.237896 kubelet[2425]: I0213 12:54:55.237785 2425 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-23-232" Feb 13 12:54:55.238504 kubelet[2425]: E0213 12:54:55.238466 2425 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.23.232:6443/api/v1/nodes\": dial tcp 172.31.23.232:6443: connect: connection refused" node="ip-172-31-23-232" Feb 13 12:54:55.238879 kubelet[2425]: I0213 12:54:55.238846 2425 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 13 12:54:55.237000 audit[2425]: AVC avc: denied { mac_admin } for pid=2425 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:55.237000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 12:54:55.237000 audit[2425]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40010f2240 a1=40010cb7e8 a2=40010f2210 a3=25 items=0 ppid=1 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.237000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 12:54:55.239491 kubelet[2425]: I0213 12:54:55.238977 2425 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 13 12:54:55.239491 kubelet[2425]: I0213 12:54:55.239269 2425 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 13 12:54:55.241723 kubelet[2425]: E0213 12:54:55.241691 2425 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-23-232\" not found" Feb 13 12:54:55.249000 audit[2463]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=2463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:55.249000 audit[2463]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffd6fc70e0 a2=0 a3=1 items=0 ppid=2425 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.249000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 13 12:54:55.253000 audit[2465]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=2465 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:55.253000 audit[2465]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=ffffe5de11b0 a2=0 a3=1 items=0 ppid=2425 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.253000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 13 12:54:55.258000 audit[2467]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=2467 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:55.258000 audit[2467]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=540 a0=3 a1=fffffd2f7940 a2=0 a3=1 items=0 ppid=2425 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.258000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 13 12:54:55.260470 kubelet[2425]: I0213 12:54:55.260441 2425 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 13 12:54:55.261000 audit[2468]: NETFILTER_CFG table=mangle:41 family=10 entries=2 op=nft_register_chain pid=2468 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:54:55.261000 audit[2468]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdb845ac0 a2=0 a3=1 items=0 ppid=2425 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.261000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 13 12:54:55.262000 audit[2469]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=2469 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:55.262000 audit[2469]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd1e49970 a2=0 a3=1 items=0 ppid=2425 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.262000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 13 12:54:55.263000 audit[2470]: NETFILTER_CFG table=nat:43 family=10 entries=2 op=nft_register_chain pid=2470 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:54:55.263000 audit[2470]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffcacdc580 a2=0 a3=1 items=0 ppid=2425 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.263000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 13 12:54:55.264000 audit[2471]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2471 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:55.264000 audit[2471]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffc9d27f0 a2=0 a3=1 items=0 ppid=2425 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.264000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 13 12:54:55.266000 audit[2473]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=2473 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:54:55.266000 audit[2473]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff18961c0 a2=0 a3=1 items=0 ppid=2425 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.266000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 13 12:54:55.269000 audit[2474]: NETFILTER_CFG table=nat:46 family=10 entries=1 op=nft_register_rule pid=2474 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:54:55.269000 audit[2474]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffc55e6d60 a2=0 a3=1 items=0 ppid=2425 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.269000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 13 12:54:55.271000 audit[2475]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=2475 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:54:55.271000 audit[2475]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=fffffb01a240 a2=0 a3=1 items=0 ppid=2425 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.271000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 13 12:54:55.276000 audit[2477]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2477 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:54:55.276000 audit[2477]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=fffffc455cb0 a2=0 a3=1 items=0 ppid=2425 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.276000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 13 12:54:55.278000 audit[2478]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=2478 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:54:55.278000 audit[2478]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe0374cd0 a2=0 a3=1 items=0 ppid=2425 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.278000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 13 12:54:55.280000 audit[2479]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_chain pid=2479 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:54:55.280000 audit[2479]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff1218460 a2=0 a3=1 items=0 ppid=2425 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.280000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 13 12:54:55.284000 audit[2481]: NETFILTER_CFG table=nat:51 family=10 entries=1 op=nft_register_rule pid=2481 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:54:55.284000 audit[2481]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff2003a00 a2=0 a3=1 items=0 ppid=2425 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.284000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 13 12:54:55.289000 audit[2483]: NETFILTER_CFG table=nat:52 family=10 entries=2 op=nft_register_chain pid=2483 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:54:55.289000 audit[2483]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe4c16de0 a2=0 a3=1 items=0 ppid=2425 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.289000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 13 12:54:55.293000 audit[2485]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_rule pid=2485 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:54:55.293000 audit[2485]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=fffff7b6be00 a2=0 a3=1 items=0 ppid=2425 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.293000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 13 12:54:55.297000 audit[2487]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=2487 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:54:55.297000 audit[2487]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=fffffcbcd9b0 a2=0 a3=1 items=0 ppid=2425 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.297000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 13 12:54:55.304000 audit[2489]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=2489 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:54:55.304000 audit[2489]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=556 a0=3 a1=ffffc7d8d6a0 a2=0 a3=1 items=0 ppid=2425 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.304000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 13 12:54:55.306467 kubelet[2425]: I0213 12:54:55.306439 2425 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 13 12:54:55.306610 kubelet[2425]: I0213 12:54:55.306589 2425 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 13 12:54:55.306739 kubelet[2425]: I0213 12:54:55.306718 2425 kubelet.go:2113] "Starting kubelet main sync loop" Feb 13 12:54:55.306923 kubelet[2425]: E0213 12:54:55.306903 2425 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 13 12:54:55.307000 audit[2490]: NETFILTER_CFG table=mangle:56 family=10 entries=1 op=nft_register_chain pid=2490 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:54:55.307000 audit[2490]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc1663ed0 a2=0 a3=1 items=0 ppid=2425 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.307000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 13 12:54:55.308879 kubelet[2425]: W0213 12:54:55.308835 2425 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.23.232:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.23.232:6443: connect: connection refused Feb 13 12:54:55.309093 kubelet[2425]: E0213 12:54:55.309070 2425 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.23.232:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.23.232:6443: connect: connection refused Feb 13 12:54:55.309000 audit[2491]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=2491 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:54:55.309000 audit[2491]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdb6260b0 a2=0 a3=1 items=0 ppid=2425 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.309000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 13 12:54:55.312000 audit[2492]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=2492 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:54:55.312000 audit[2492]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcb8077c0 a2=0 a3=1 items=0 ppid=2425 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:55.312000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 13 12:54:55.336004 kubelet[2425]: E0213 12:54:55.335916 2425 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://172.31.23.232:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-23-232?timeout=10s": dial tcp 172.31.23.232:6443: connect: connection refused Feb 13 12:54:55.408861 kubelet[2425]: I0213 12:54:55.407390 2425 topology_manager.go:210] "Topology Admit Handler" Feb 13 12:54:55.409884 kubelet[2425]: I0213 12:54:55.409840 2425 topology_manager.go:210] "Topology Admit Handler" Feb 13 12:54:55.412673 kubelet[2425]: I0213 12:54:55.412520 2425 status_manager.go:698] "Failed to get status for pod" podUID=b405545fda2522d41658b6f3de530a2b pod="kube-system/kube-apiserver-ip-172-31-23-232" err="Get \"https://172.31.23.232:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ip-172-31-23-232\": dial tcp 172.31.23.232:6443: connect: connection refused" Feb 13 12:54:55.414734 kubelet[2425]: I0213 12:54:55.414700 2425 topology_manager.go:210] "Topology Admit Handler" Feb 13 12:54:55.421003 kubelet[2425]: I0213 12:54:55.420463 2425 status_manager.go:698] "Failed to get status for pod" podUID=e084071abfb714c8b8365746b705155c pod="kube-system/kube-controller-manager-ip-172-31-23-232" err="Get \"https://172.31.23.232:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ip-172-31-23-232\": dial tcp 172.31.23.232:6443: connect: connection refused" Feb 13 12:54:55.421003 kubelet[2425]: I0213 12:54:55.420834 2425 status_manager.go:698] "Failed to get status for pod" podUID=7b30cfd5ab8e16813f71e829772cc65b pod="kube-system/kube-scheduler-ip-172-31-23-232" err="Get \"https://172.31.23.232:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ip-172-31-23-232\": dial tcp 172.31.23.232:6443: connect: connection refused" Feb 13 12:54:55.425838 systemd[1]: Created slice kubepods-burstable-podb405545fda2522d41658b6f3de530a2b.slice. Feb 13 12:54:55.437721 kubelet[2425]: I0213 12:54:55.437684 2425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e084071abfb714c8b8365746b705155c-k8s-certs\") pod \"kube-controller-manager-ip-172-31-23-232\" (UID: \"e084071abfb714c8b8365746b705155c\") " pod="kube-system/kube-controller-manager-ip-172-31-23-232" Feb 13 12:54:55.438011 kubelet[2425]: I0213 12:54:55.437987 2425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e084071abfb714c8b8365746b705155c-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-23-232\" (UID: \"e084071abfb714c8b8365746b705155c\") " pod="kube-system/kube-controller-manager-ip-172-31-23-232" Feb 13 12:54:55.438277 kubelet[2425]: I0213 12:54:55.438146 2425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7b30cfd5ab8e16813f71e829772cc65b-kubeconfig\") pod \"kube-scheduler-ip-172-31-23-232\" (UID: \"7b30cfd5ab8e16813f71e829772cc65b\") " pod="kube-system/kube-scheduler-ip-172-31-23-232" Feb 13 12:54:55.440041 kubelet[2425]: I0213 12:54:55.439996 2425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/e084071abfb714c8b8365746b705155c-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-23-232\" (UID: \"e084071abfb714c8b8365746b705155c\") " pod="kube-system/kube-controller-manager-ip-172-31-23-232" Feb 13 12:54:55.440608 kubelet[2425]: I0213 12:54:55.440578 2425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e084071abfb714c8b8365746b705155c-kubeconfig\") pod \"kube-controller-manager-ip-172-31-23-232\" (UID: \"e084071abfb714c8b8365746b705155c\") " pod="kube-system/kube-controller-manager-ip-172-31-23-232" Feb 13 12:54:55.440825 kubelet[2425]: I0213 12:54:55.440800 2425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b405545fda2522d41658b6f3de530a2b-ca-certs\") pod \"kube-apiserver-ip-172-31-23-232\" (UID: \"b405545fda2522d41658b6f3de530a2b\") " pod="kube-system/kube-apiserver-ip-172-31-23-232" Feb 13 12:54:55.441043 kubelet[2425]: I0213 12:54:55.441020 2425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b405545fda2522d41658b6f3de530a2b-k8s-certs\") pod \"kube-apiserver-ip-172-31-23-232\" (UID: \"b405545fda2522d41658b6f3de530a2b\") " pod="kube-system/kube-apiserver-ip-172-31-23-232" Feb 13 12:54:55.441198 kubelet[2425]: I0213 12:54:55.441177 2425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b405545fda2522d41658b6f3de530a2b-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-23-232\" (UID: \"b405545fda2522d41658b6f3de530a2b\") " pod="kube-system/kube-apiserver-ip-172-31-23-232" Feb 13 12:54:55.441364 kubelet[2425]: I0213 12:54:55.441342 2425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e084071abfb714c8b8365746b705155c-ca-certs\") pod \"kube-controller-manager-ip-172-31-23-232\" (UID: \"e084071abfb714c8b8365746b705155c\") " pod="kube-system/kube-controller-manager-ip-172-31-23-232" Feb 13 12:54:55.441897 kubelet[2425]: I0213 12:54:55.441870 2425 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-23-232" Feb 13 12:54:55.442655 systemd[1]: Created slice kubepods-burstable-pode084071abfb714c8b8365746b705155c.slice. Feb 13 12:54:55.442861 kubelet[2425]: E0213 12:54:55.442645 2425 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.23.232:6443/api/v1/nodes\": dial tcp 172.31.23.232:6443: connect: connection refused" node="ip-172-31-23-232" Feb 13 12:54:55.460256 systemd[1]: Created slice kubepods-burstable-pod7b30cfd5ab8e16813f71e829772cc65b.slice. Feb 13 12:54:55.736876 kubelet[2425]: E0213 12:54:55.736817 2425 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://172.31.23.232:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-23-232?timeout=10s": dial tcp 172.31.23.232:6443: connect: connection refused Feb 13 12:54:55.738053 env[1734]: time="2024-02-13T12:54:55.737667176Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-23-232,Uid:b405545fda2522d41658b6f3de530a2b,Namespace:kube-system,Attempt:0,}" Feb 13 12:54:55.750454 env[1734]: time="2024-02-13T12:54:55.750114812Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-23-232,Uid:e084071abfb714c8b8365746b705155c,Namespace:kube-system,Attempt:0,}" Feb 13 12:54:55.767044 env[1734]: time="2024-02-13T12:54:55.766936558Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-23-232,Uid:7b30cfd5ab8e16813f71e829772cc65b,Namespace:kube-system,Attempt:0,}" Feb 13 12:54:55.845920 kubelet[2425]: I0213 12:54:55.845354 2425 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-23-232" Feb 13 12:54:55.846158 kubelet[2425]: E0213 12:54:55.846041 2425 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.23.232:6443/api/v1/nodes\": dial tcp 172.31.23.232:6443: connect: connection refused" node="ip-172-31-23-232" Feb 13 12:54:55.928752 kubelet[2425]: W0213 12:54:55.928581 2425 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.23.232:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-23-232&limit=500&resourceVersion=0": dial tcp 172.31.23.232:6443: connect: connection refused Feb 13 12:54:55.928752 kubelet[2425]: E0213 12:54:55.928706 2425 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.23.232:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-23-232&limit=500&resourceVersion=0": dial tcp 172.31.23.232:6443: connect: connection refused Feb 13 12:54:55.979139 kubelet[2425]: W0213 12:54:55.978993 2425 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.23.232:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.23.232:6443: connect: connection refused Feb 13 12:54:55.979139 kubelet[2425]: E0213 12:54:55.979108 2425 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.23.232:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.23.232:6443: connect: connection refused Feb 13 12:54:56.218313 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1108335472.mount: Deactivated successfully. Feb 13 12:54:56.227910 env[1734]: time="2024-02-13T12:54:56.227835214Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:56.233261 env[1734]: time="2024-02-13T12:54:56.233213554Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:56.235887 env[1734]: time="2024-02-13T12:54:56.235814843Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:56.237375 env[1734]: time="2024-02-13T12:54:56.237323675Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:56.240453 env[1734]: time="2024-02-13T12:54:56.240315402Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:56.242166 env[1734]: time="2024-02-13T12:54:56.242122037Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:56.243854 env[1734]: time="2024-02-13T12:54:56.243811072Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:56.245562 env[1734]: time="2024-02-13T12:54:56.245522253Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:56.251457 env[1734]: time="2024-02-13T12:54:56.251371195Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:56.254132 env[1734]: time="2024-02-13T12:54:56.254063402Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:56.258531 env[1734]: time="2024-02-13T12:54:56.258479260Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:56.289218 env[1734]: time="2024-02-13T12:54:56.289094536Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:54:56.300909 env[1734]: time="2024-02-13T12:54:56.300506284Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 12:54:56.300909 env[1734]: time="2024-02-13T12:54:56.300578886Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 12:54:56.300909 env[1734]: time="2024-02-13T12:54:56.300604427Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 12:54:56.302146 env[1734]: time="2024-02-13T12:54:56.301044303Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b65a974d08c8ee363403772476cb2ee70d43bd680feb3326719ac3da87d91d5b pid=2501 runtime=io.containerd.runc.v2 Feb 13 12:54:56.345924 systemd[1]: Started cri-containerd-b65a974d08c8ee363403772476cb2ee70d43bd680feb3326719ac3da87d91d5b.scope. Feb 13 12:54:56.346933 env[1734]: time="2024-02-13T12:54:56.346831278Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 12:54:56.347174 env[1734]: time="2024-02-13T12:54:56.347125097Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 12:54:56.347359 env[1734]: time="2024-02-13T12:54:56.347310810Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 12:54:56.361203 env[1734]: time="2024-02-13T12:54:56.360795814Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 12:54:56.361203 env[1734]: time="2024-02-13T12:54:56.360882915Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 12:54:56.361203 env[1734]: time="2024-02-13T12:54:56.360909464Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 12:54:56.362284 env[1734]: time="2024-02-13T12:54:56.362199925Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/419a249eeba6f98d1c980edd9ff840f04c49ec10bd56a23d95f5682bf5ff0c8d pid=2528 runtime=io.containerd.runc.v2 Feb 13 12:54:56.367791 env[1734]: time="2024-02-13T12:54:56.362056808Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f302b8c07e0b99faacabafed20f6bc530631406a9de9be3dca4f7d36b0e11da8 pid=2541 runtime=io.containerd.runc.v2 Feb 13 12:54:56.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.391000 audit: BPF prog-id=67 op=LOAD Feb 13 12:54:56.391000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.391000 audit[2511]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2501 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236356139373464303863386565333633343033373732343736636232 Feb 13 12:54:56.391000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.391000 audit[2511]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2501 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236356139373464303863386565333633343033373732343736636232 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit: BPF prog-id=68 op=LOAD Feb 13 12:54:56.392000 audit[2511]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2501 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236356139373464303863386565333633343033373732343736636232 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit: BPF prog-id=69 op=LOAD Feb 13 12:54:56.392000 audit[2511]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2501 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236356139373464303863386565333633343033373732343736636232 Feb 13 12:54:56.392000 audit: BPF prog-id=69 op=UNLOAD Feb 13 12:54:56.392000 audit: BPF prog-id=68 op=UNLOAD Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.392000 audit: BPF prog-id=70 op=LOAD Feb 13 12:54:56.392000 audit[2511]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2501 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236356139373464303863386565333633343033373732343736636232 Feb 13 12:54:56.424297 systemd[1]: Started cri-containerd-419a249eeba6f98d1c980edd9ff840f04c49ec10bd56a23d95f5682bf5ff0c8d.scope. Feb 13 12:54:56.448758 systemd[1]: Started cri-containerd-f302b8c07e0b99faacabafed20f6bc530631406a9de9be3dca4f7d36b0e11da8.scope. Feb 13 12:54:56.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.472000 audit: BPF prog-id=71 op=LOAD Feb 13 12:54:56.477000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.477000 audit[2563]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bfb38 a2=10 a3=0 items=0 ppid=2528 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431396132343965656261366639386431633938306564643966663834 Feb 13 12:54:56.478000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.478000 audit[2563]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bf5a0 a2=3c a3=0 items=0 ppid=2528 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431396132343965656261366639386431633938306564643966663834 Feb 13 12:54:56.479000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.479000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.479000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.479000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.479000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.479000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.479000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.479000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.479000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.479000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.479000 audit: BPF prog-id=72 op=LOAD Feb 13 12:54:56.479000 audit[2563]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bf8e0 a2=78 a3=0 items=0 ppid=2528 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431396132343965656261366639386431633938306564643966663834 Feb 13 12:54:56.482000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.482000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.482000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.482000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.482000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.482000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.482000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.482000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.482000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.482000 audit: BPF prog-id=73 op=LOAD Feb 13 12:54:56.482000 audit[2563]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bf670 a2=78 a3=0 items=0 ppid=2528 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431396132343965656261366639386431633938306564643966663834 Feb 13 12:54:56.483000 audit: BPF prog-id=73 op=UNLOAD Feb 13 12:54:56.484000 audit: BPF prog-id=72 op=UNLOAD Feb 13 12:54:56.484000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.484000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.484000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.484000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.484000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.484000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.484000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.484000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.484000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.484000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.484000 audit: BPF prog-id=74 op=LOAD Feb 13 12:54:56.484000 audit[2563]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bfb40 a2=78 a3=0 items=0 ppid=2528 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431396132343965656261366639386431633938306564643966663834 Feb 13 12:54:56.492555 env[1734]: time="2024-02-13T12:54:56.492500040Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-23-232,Uid:e084071abfb714c8b8365746b705155c,Namespace:kube-system,Attempt:0,} returns sandbox id \"b65a974d08c8ee363403772476cb2ee70d43bd680feb3326719ac3da87d91d5b\"" Feb 13 12:54:56.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.503000 audit: BPF prog-id=75 op=LOAD Feb 13 12:54:56.505000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.505000 audit[2558]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2541 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633303262386330376530623939666161636162616665643230663662 Feb 13 12:54:56.505000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.505000 audit[2558]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2541 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633303262386330376530623939666161636162616665643230663662 Feb 13 12:54:56.505000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.505000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.505000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.505000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.505000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.505000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.505000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.505000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.505000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.505000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.505000 audit: BPF prog-id=76 op=LOAD Feb 13 12:54:56.505000 audit[2558]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2541 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633303262386330376530623939666161636162616665643230663662 Feb 13 12:54:56.506000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.506000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.506000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.506000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.506000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.506000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.506000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.506000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.506000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.506000 audit: BPF prog-id=77 op=LOAD Feb 13 12:54:56.506000 audit[2558]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2541 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633303262386330376530623939666161636162616665643230663662 Feb 13 12:54:56.506000 audit: BPF prog-id=77 op=UNLOAD Feb 13 12:54:56.506000 audit: BPF prog-id=76 op=UNLOAD Feb 13 12:54:56.506000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.506000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.506000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.506000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.506000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.506000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.506000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.506000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.506000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.506000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.506000 audit: BPF prog-id=78 op=LOAD Feb 13 12:54:56.506000 audit[2558]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2541 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633303262386330376530623939666161636162616665643230663662 Feb 13 12:54:56.515867 env[1734]: time="2024-02-13T12:54:56.511187226Z" level=info msg="CreateContainer within sandbox \"b65a974d08c8ee363403772476cb2ee70d43bd680feb3326719ac3da87d91d5b\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 13 12:54:56.538030 kubelet[2425]: E0213 12:54:56.537942 2425 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://172.31.23.232:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-23-232?timeout=10s": dial tcp 172.31.23.232:6443: connect: connection refused Feb 13 12:54:56.547150 env[1734]: time="2024-02-13T12:54:56.547046464Z" level=info msg="CreateContainer within sandbox \"b65a974d08c8ee363403772476cb2ee70d43bd680feb3326719ac3da87d91d5b\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"b694bafc8928b5484ccfb56e0b0a81b167dead77cdf9b74c72e5189b28030137\"" Feb 13 12:54:56.548330 env[1734]: time="2024-02-13T12:54:56.548282782Z" level=info msg="StartContainer for \"b694bafc8928b5484ccfb56e0b0a81b167dead77cdf9b74c72e5189b28030137\"" Feb 13 12:54:56.555409 kubelet[2425]: W0213 12:54:56.555301 2425 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.23.232:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.23.232:6443: connect: connection refused Feb 13 12:54:56.555409 kubelet[2425]: E0213 12:54:56.555362 2425 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.23.232:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.23.232:6443: connect: connection refused Feb 13 12:54:56.564296 kubelet[2425]: W0213 12:54:56.564123 2425 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.23.232:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.23.232:6443: connect: connection refused Feb 13 12:54:56.564296 kubelet[2425]: E0213 12:54:56.564231 2425 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.23.232:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.23.232:6443: connect: connection refused Feb 13 12:54:56.591238 env[1734]: time="2024-02-13T12:54:56.587073591Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-23-232,Uid:b405545fda2522d41658b6f3de530a2b,Namespace:kube-system,Attempt:0,} returns sandbox id \"f302b8c07e0b99faacabafed20f6bc530631406a9de9be3dca4f7d36b0e11da8\"" Feb 13 12:54:56.596393 env[1734]: time="2024-02-13T12:54:56.596324345Z" level=info msg="CreateContainer within sandbox \"f302b8c07e0b99faacabafed20f6bc530631406a9de9be3dca4f7d36b0e11da8\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 13 12:54:56.603866 env[1734]: time="2024-02-13T12:54:56.603800823Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-23-232,Uid:7b30cfd5ab8e16813f71e829772cc65b,Namespace:kube-system,Attempt:0,} returns sandbox id \"419a249eeba6f98d1c980edd9ff840f04c49ec10bd56a23d95f5682bf5ff0c8d\"" Feb 13 12:54:56.610021 env[1734]: time="2024-02-13T12:54:56.609940379Z" level=info msg="CreateContainer within sandbox \"419a249eeba6f98d1c980edd9ff840f04c49ec10bd56a23d95f5682bf5ff0c8d\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 13 12:54:56.627789 systemd[1]: Started cri-containerd-b694bafc8928b5484ccfb56e0b0a81b167dead77cdf9b74c72e5189b28030137.scope. Feb 13 12:54:56.638349 env[1734]: time="2024-02-13T12:54:56.636318250Z" level=info msg="CreateContainer within sandbox \"f302b8c07e0b99faacabafed20f6bc530631406a9de9be3dca4f7d36b0e11da8\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"8ddca6c8687cfe4ad421dbe84f959c3b786785e0cb9c03427867c1b3fe278fcd\"" Feb 13 12:54:56.640911 env[1734]: time="2024-02-13T12:54:56.640809134Z" level=info msg="StartContainer for \"8ddca6c8687cfe4ad421dbe84f959c3b786785e0cb9c03427867c1b3fe278fcd\"" Feb 13 12:54:56.651212 kubelet[2425]: I0213 12:54:56.651132 2425 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-23-232" Feb 13 12:54:56.651880 kubelet[2425]: E0213 12:54:56.651830 2425 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.23.232:6443/api/v1/nodes\": dial tcp 172.31.23.232:6443: connect: connection refused" node="ip-172-31-23-232" Feb 13 12:54:56.658343 env[1734]: time="2024-02-13T12:54:56.655269152Z" level=info msg="CreateContainer within sandbox \"419a249eeba6f98d1c980edd9ff840f04c49ec10bd56a23d95f5682bf5ff0c8d\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"b42a735eed0c67e3666f6c2ce245a8e75da2d63aa7041d65993b87cef7e0b845\"" Feb 13 12:54:56.658343 env[1734]: time="2024-02-13T12:54:56.656189327Z" level=info msg="StartContainer for \"b42a735eed0c67e3666f6c2ce245a8e75da2d63aa7041d65993b87cef7e0b845\"" Feb 13 12:54:56.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.666000 audit: BPF prog-id=79 op=LOAD Feb 13 12:54:56.668000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.668000 audit[2611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2501 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236393462616663383932386235343834636366623536653062306138 Feb 13 12:54:56.668000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.668000 audit[2611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2501 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236393462616663383932386235343834636366623536653062306138 Feb 13 12:54:56.668000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.668000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.668000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.668000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.668000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.668000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.668000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.668000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.668000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.668000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.668000 audit: BPF prog-id=80 op=LOAD Feb 13 12:54:56.668000 audit[2611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2501 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236393462616663383932386235343834636366623536653062306138 Feb 13 12:54:56.668000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.668000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.668000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.668000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.668000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.668000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.668000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.668000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.668000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.668000 audit: BPF prog-id=81 op=LOAD Feb 13 12:54:56.668000 audit[2611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2501 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236393462616663383932386235343834636366623536653062306138 Feb 13 12:54:56.669000 audit: BPF prog-id=81 op=UNLOAD Feb 13 12:54:56.669000 audit: BPF prog-id=80 op=UNLOAD Feb 13 12:54:56.669000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.669000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.669000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.669000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.669000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.669000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.669000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.669000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.669000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.669000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.669000 audit: BPF prog-id=82 op=LOAD Feb 13 12:54:56.669000 audit[2611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2501 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236393462616663383932386235343834636366623536653062306138 Feb 13 12:54:56.692685 systemd[1]: Started cri-containerd-8ddca6c8687cfe4ad421dbe84f959c3b786785e0cb9c03427867c1b3fe278fcd.scope. Feb 13 12:54:56.723848 systemd[1]: Started cri-containerd-b42a735eed0c67e3666f6c2ce245a8e75da2d63aa7041d65993b87cef7e0b845.scope. Feb 13 12:54:56.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.760000 audit: BPF prog-id=83 op=LOAD Feb 13 12:54:56.761000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.761000 audit[2656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2541 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864646361366338363837636665346164343231646265383466393539 Feb 13 12:54:56.761000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.761000 audit[2656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2541 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864646361366338363837636665346164343231646265383466393539 Feb 13 12:54:56.762000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.762000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.762000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.762000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.762000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.762000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.762000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.762000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.762000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.762000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.762000 audit: BPF prog-id=84 op=LOAD Feb 13 12:54:56.762000 audit[2656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2541 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.762000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864646361366338363837636665346164343231646265383466393539 Feb 13 12:54:56.766000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.766000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.766000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.766000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.766000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.766000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.766000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.766000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.766000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.766000 audit: BPF prog-id=85 op=LOAD Feb 13 12:54:56.766000 audit[2656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2541 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864646361366338363837636665346164343231646265383466393539 Feb 13 12:54:56.769000 audit: BPF prog-id=85 op=UNLOAD Feb 13 12:54:56.769000 audit: BPF prog-id=84 op=UNLOAD Feb 13 12:54:56.769000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.769000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.769000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.771459 env[1734]: time="2024-02-13T12:54:56.771335398Z" level=info msg="StartContainer for \"b694bafc8928b5484ccfb56e0b0a81b167dead77cdf9b74c72e5189b28030137\" returns successfully" Feb 13 12:54:56.769000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.769000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.769000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.769000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.769000 audit[2656]: AVC avc: denied { perfmon } for pid=2656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.769000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.769000 audit[2656]: AVC avc: denied { bpf } for pid=2656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.769000 audit: BPF prog-id=86 op=LOAD Feb 13 12:54:56.769000 audit[2656]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2541 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864646361366338363837636665346164343231646265383466393539 Feb 13 12:54:56.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.800000 audit: BPF prog-id=87 op=LOAD Feb 13 12:54:56.801000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.801000 audit[2664]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2528 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234326137333565656430633637653336363666366332636532343561 Feb 13 12:54:56.801000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.801000 audit[2664]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2528 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234326137333565656430633637653336363666366332636532343561 Feb 13 12:54:56.802000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.802000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.802000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.802000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.802000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.802000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.802000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.802000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.802000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.802000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.802000 audit: BPF prog-id=88 op=LOAD Feb 13 12:54:56.802000 audit[2664]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2528 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234326137333565656430633637653336363666366332636532343561 Feb 13 12:54:56.804000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.804000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.804000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.804000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.804000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.804000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.804000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.804000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.804000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.804000 audit: BPF prog-id=89 op=LOAD Feb 13 12:54:56.804000 audit[2664]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2528 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234326137333565656430633637653336363666366332636532343561 Feb 13 12:54:56.809000 audit: BPF prog-id=89 op=UNLOAD Feb 13 12:54:56.810000 audit: BPF prog-id=88 op=UNLOAD Feb 13 12:54:56.810000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.810000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.810000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.810000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.810000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.810000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.810000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.810000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.810000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.810000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:54:56.810000 audit: BPF prog-id=90 op=LOAD Feb 13 12:54:56.810000 audit[2664]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2528 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:54:56.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234326137333565656430633637653336363666366332636532343561 Feb 13 12:54:56.862191 env[1734]: time="2024-02-13T12:54:56.862126206Z" level=info msg="StartContainer for \"8ddca6c8687cfe4ad421dbe84f959c3b786785e0cb9c03427867c1b3fe278fcd\" returns successfully" Feb 13 12:54:56.932436 env[1734]: time="2024-02-13T12:54:56.932371126Z" level=info msg="StartContainer for \"b42a735eed0c67e3666f6c2ce245a8e75da2d63aa7041d65993b87cef7e0b845\" returns successfully" Feb 13 12:54:58.254734 kubelet[2425]: I0213 12:54:58.254699 2425 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-23-232" Feb 13 12:54:58.463574 update_engine[1731]: I0213 12:54:58.463022 1731 update_attempter.cc:509] Updating boot flags... Feb 13 12:55:01.229965 kernel: kauditd_printk_skb: 660 callbacks suppressed Feb 13 12:55:01.230123 kernel: audit: type=1400 audit(1707828901.217:719): avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:55:01.217000 audit[2678]: AVC avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:55:01.217000 audit[2678]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=40025ee0c0 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:55:01.245352 kernel: audit: type=1300 audit(1707828901.217:719): arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=40025ee0c0 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:55:01.217000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:55:01.259309 kernel: audit: type=1327 audit(1707828901.217:719): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:55:01.217000 audit[2678]: AVC avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:55:01.270970 kernel: audit: type=1400 audit(1707828901.217:720): avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:55:01.217000 audit[2678]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=4002aecb00 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:55:01.287387 kernel: audit: type=1300 audit(1707828901.217:720): arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=4002aecb00 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:55:01.217000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:55:01.301284 kernel: audit: type=1327 audit(1707828901.217:720): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:55:01.220000 audit[2678]: AVC avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:55:01.313697 kernel: audit: type=1400 audit(1707828901.220:721): avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:55:01.220000 audit[2678]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=40025ee1e0 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:55:01.329133 kernel: audit: type=1300 audit(1707828901.220:721): arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=40025ee1e0 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:55:01.220000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:55:01.339818 kernel: audit: type=1327 audit(1707828901.220:721): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:55:01.286000 audit[2678]: AVC avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:55:01.286000 audit[2678]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=58 a1=4002b552c0 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:55:01.351110 kernel: audit: type=1400 audit(1707828901.286:722): avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:55:01.286000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:55:01.287000 audit[2678]: AVC avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:55:01.287000 audit[2678]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=58 a1=400baad800 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:55:01.287000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:55:01.301000 audit[2678]: AVC avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:55:01.301000 audit[2678]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5e a1=400baad980 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:55:01.301000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:55:01.760000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:55:01.760000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000572000 a2=fc6 a3=0 items=0 ppid=2501 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 key=(null) Feb 13 12:55:01.760000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 12:55:01.761000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:55:01.761000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40003585c0 a2=fc6 a3=0 items=0 ppid=2501 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 key=(null) Feb 13 12:55:01.761000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 12:55:01.823786 kubelet[2425]: E0213 12:55:01.823745 2425 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-23-232\" not found" node="ip-172-31-23-232" Feb 13 12:55:01.897500 kubelet[2425]: I0213 12:55:01.897459 2425 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-23-232" Feb 13 12:55:01.974729 kubelet[2425]: E0213 12:55:01.974605 2425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-23-232.17b36d54e6cee056", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-23-232", UID:"ip-172-31-23-232", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-23-232"}, FirstTimestamp:time.Date(2024, time.February, 13, 12, 54, 55, 120547926, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 12, 54, 55, 120547926, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 13 12:55:02.038613 kubelet[2425]: E0213 12:55:02.038308 2425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-23-232.17b36d54e75efd6d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-23-232", UID:"ip-172-31-23-232", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-23-232"}, FirstTimestamp:time.Date(2024, time.February, 13, 12, 54, 55, 129992557, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 12, 54, 55, 129992557, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 13 12:55:02.100682 kubelet[2425]: E0213 12:55:02.100542 2425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-23-232.17b36d54eb36091c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-23-232", UID:"ip-172-31-23-232", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ip-172-31-23-232 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-23-232"}, FirstTimestamp:time.Date(2024, time.February, 13, 12, 54, 55, 194417436, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 12, 54, 55, 194417436, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 13 12:55:02.135513 kubelet[2425]: I0213 12:55:02.135474 2425 apiserver.go:52] "Watching apiserver" Feb 13 12:55:02.157490 kubelet[2425]: E0213 12:55:02.157365 2425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-23-232.17b36d54eb3643e7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-23-232", UID:"ip-172-31-23-232", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ip-172-31-23-232 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-23-232"}, FirstTimestamp:time.Date(2024, time.February, 13, 12, 54, 55, 194432487, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 12, 54, 55, 194432487, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 13 12:55:02.213116 kubelet[2425]: E0213 12:55:02.212903 2425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-23-232.17b36d54eb365d75", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-23-232", UID:"ip-172-31-23-232", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ip-172-31-23-232 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-23-232"}, FirstTimestamp:time.Date(2024, time.February, 13, 12, 54, 55, 194439029, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 12, 54, 55, 194439029, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 13 12:55:02.235130 kubelet[2425]: I0213 12:55:02.235071 2425 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 13 12:55:02.276803 kubelet[2425]: E0213 12:55:02.276673 2425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-23-232.17b36d54eb36091c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-23-232", UID:"ip-172-31-23-232", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ip-172-31-23-232 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-23-232"}, FirstTimestamp:time.Date(2024, time.February, 13, 12, 54, 55, 194417436, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 12, 54, 55, 237592747, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 13 12:55:02.304496 kubelet[2425]: I0213 12:55:02.304356 2425 reconciler.go:41] "Reconciler: start to sync state" Feb 13 12:55:02.341197 kubelet[2425]: E0213 12:55:02.341066 2425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-23-232.17b36d54eb3643e7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-23-232", UID:"ip-172-31-23-232", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ip-172-31-23-232 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-23-232"}, FirstTimestamp:time.Date(2024, time.February, 13, 12, 54, 55, 194432487, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 12, 54, 55, 237604365, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 13 12:55:02.407139 kubelet[2425]: E0213 12:55:02.406998 2425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-23-232.17b36d54eb365d75", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-23-232", UID:"ip-172-31-23-232", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ip-172-31-23-232 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-23-232"}, FirstTimestamp:time.Date(2024, time.February, 13, 12, 54, 55, 194439029, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 12, 54, 55, 237612695, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 13 12:55:02.473195 kubelet[2425]: E0213 12:55:02.473069 2425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-23-232.17b36d54ee4ab407", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-23-232", UID:"ip-172-31-23-232", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-23-232"}, FirstTimestamp:time.Date(2024, time.February, 13, 12, 54, 55, 246103559, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 12, 54, 55, 246103559, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 13 12:55:02.638137 kubelet[2425]: E0213 12:55:02.637828 2425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-23-232.17b36d54eb36091c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-23-232", UID:"ip-172-31-23-232", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ip-172-31-23-232 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-23-232"}, FirstTimestamp:time.Date(2024, time.February, 13, 12, 54, 55, 194417436, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 12, 54, 55, 409655551, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 13 12:55:03.032025 kubelet[2425]: E0213 12:55:03.031871 2425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-23-232.17b36d54eb3643e7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-23-232", UID:"ip-172-31-23-232", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ip-172-31-23-232 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-23-232"}, FirstTimestamp:time.Date(2024, time.February, 13, 12, 54, 55, 194432487, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 12, 54, 55, 409685029, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 13 12:55:04.459542 systemd[1]: Reloading. Feb 13 12:55:04.592115 /usr/lib/systemd/system-generators/torcx-generator[3018]: time="2024-02-13T12:55:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 13 12:55:04.592183 /usr/lib/systemd/system-generators/torcx-generator[3018]: time="2024-02-13T12:55:04Z" level=info msg="torcx already run" Feb 13 12:55:04.761529 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 13 12:55:04.761573 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 13 12:55:04.802437 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 13 12:55:04.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.989000 audit: BPF prog-id=91 op=LOAD Feb 13 12:55:04.990000 audit: BPF prog-id=52 op=UNLOAD Feb 13 12:55:04.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.990000 audit: BPF prog-id=92 op=LOAD Feb 13 12:55:04.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.990000 audit: BPF prog-id=93 op=LOAD Feb 13 12:55:04.990000 audit: BPF prog-id=53 op=UNLOAD Feb 13 12:55:04.990000 audit: BPF prog-id=54 op=UNLOAD Feb 13 12:55:04.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.991000 audit: BPF prog-id=94 op=LOAD Feb 13 12:55:04.991000 audit: BPF prog-id=55 op=UNLOAD Feb 13 12:55:04.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:04.997000 audit: BPF prog-id=95 op=LOAD Feb 13 12:55:04.997000 audit: BPF prog-id=83 op=UNLOAD Feb 13 12:55:05.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.001000 audit: BPF prog-id=96 op=LOAD Feb 13 12:55:05.001000 audit: BPF prog-id=56 op=UNLOAD Feb 13 12:55:05.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.002000 audit: BPF prog-id=97 op=LOAD Feb 13 12:55:05.002000 audit: BPF prog-id=67 op=UNLOAD Feb 13 12:55:05.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.005000 audit: BPF prog-id=98 op=LOAD Feb 13 12:55:05.005000 audit: BPF prog-id=57 op=UNLOAD Feb 13 12:55:05.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.006000 audit: BPF prog-id=99 op=LOAD Feb 13 12:55:05.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.006000 audit: BPF prog-id=100 op=LOAD Feb 13 12:55:05.006000 audit: BPF prog-id=58 op=UNLOAD Feb 13 12:55:05.006000 audit: BPF prog-id=59 op=UNLOAD Feb 13 12:55:05.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.009000 audit: BPF prog-id=101 op=LOAD Feb 13 12:55:05.009000 audit: BPF prog-id=60 op=UNLOAD Feb 13 12:55:05.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.009000 audit: BPF prog-id=102 op=LOAD Feb 13 12:55:05.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.010000 audit: BPF prog-id=103 op=LOAD Feb 13 12:55:05.010000 audit: BPF prog-id=61 op=UNLOAD Feb 13 12:55:05.010000 audit: BPF prog-id=62 op=UNLOAD Feb 13 12:55:05.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.013000 audit: BPF prog-id=104 op=LOAD Feb 13 12:55:05.013000 audit: BPF prog-id=71 op=UNLOAD Feb 13 12:55:05.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.015000 audit: BPF prog-id=105 op=LOAD Feb 13 12:55:05.015000 audit: BPF prog-id=87 op=UNLOAD Feb 13 12:55:05.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.017000 audit: BPF prog-id=106 op=LOAD Feb 13 12:55:05.017000 audit: BPF prog-id=63 op=UNLOAD Feb 13 12:55:05.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.018000 audit: BPF prog-id=107 op=LOAD Feb 13 12:55:05.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.018000 audit: BPF prog-id=108 op=LOAD Feb 13 12:55:05.018000 audit: BPF prog-id=64 op=UNLOAD Feb 13 12:55:05.018000 audit: BPF prog-id=65 op=UNLOAD Feb 13 12:55:05.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.021000 audit: BPF prog-id=109 op=LOAD Feb 13 12:55:05.021000 audit: BPF prog-id=75 op=UNLOAD Feb 13 12:55:05.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.022000 audit: BPF prog-id=110 op=LOAD Feb 13 12:55:05.022000 audit: BPF prog-id=79 op=UNLOAD Feb 13 12:55:05.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.024000 audit: BPF prog-id=111 op=LOAD Feb 13 12:55:05.024000 audit: BPF prog-id=66 op=UNLOAD Feb 13 12:55:05.056018 kubelet[2425]: I0213 12:55:05.055733 2425 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 13 12:55:05.060256 systemd[1]: Stopping kubelet.service... Feb 13 12:55:05.080109 systemd[1]: kubelet.service: Deactivated successfully. Feb 13 12:55:05.080514 systemd[1]: Stopped kubelet.service. Feb 13 12:55:05.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:55:05.080616 systemd[1]: kubelet.service: Consumed 1.967s CPU time. Feb 13 12:55:05.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:55:05.083996 systemd[1]: Started kubelet.service. Feb 13 12:55:05.252049 kubelet[3074]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 13 12:55:05.253164 kubelet[3074]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 13 12:55:05.253564 kubelet[3074]: I0213 12:55:05.253445 3074 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 13 12:55:05.260858 kubelet[3074]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 13 12:55:05.261193 kubelet[3074]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 13 12:55:05.268453 kubelet[3074]: I0213 12:55:05.268304 3074 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 13 12:55:05.268453 kubelet[3074]: I0213 12:55:05.268353 3074 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 13 12:55:05.268901 kubelet[3074]: I0213 12:55:05.268857 3074 server.go:836] "Client rotation is on, will bootstrap in background" Feb 13 12:55:05.276009 kubelet[3074]: I0213 12:55:05.274616 3074 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 13 12:55:05.281671 kubelet[3074]: W0213 12:55:05.281615 3074 machine.go:65] Cannot read vendor id correctly, set empty. Feb 13 12:55:05.282056 kubelet[3074]: I0213 12:55:05.282029 3074 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 13 12:55:05.283041 kubelet[3074]: I0213 12:55:05.282989 3074 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 13 12:55:05.283539 kubelet[3074]: I0213 12:55:05.283518 3074 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 13 12:55:05.283804 kubelet[3074]: I0213 12:55:05.283776 3074 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 13 12:55:05.284035 kubelet[3074]: I0213 12:55:05.284010 3074 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 13 12:55:05.284182 kubelet[3074]: I0213 12:55:05.284161 3074 container_manager_linux.go:308] "Creating device plugin manager" Feb 13 12:55:05.284338 kubelet[3074]: I0213 12:55:05.284317 3074 state_mem.go:36] "Initialized new in-memory state store" Feb 13 12:55:05.295074 kubelet[3074]: I0213 12:55:05.295003 3074 kubelet.go:398] "Attempting to sync node with API server" Feb 13 12:55:05.295074 kubelet[3074]: I0213 12:55:05.295047 3074 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 13 12:55:05.295293 kubelet[3074]: I0213 12:55:05.295094 3074 kubelet.go:297] "Adding apiserver pod source" Feb 13 12:55:05.295293 kubelet[3074]: I0213 12:55:05.295118 3074 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 13 12:55:05.302496 kubelet[3074]: I0213 12:55:05.302447 3074 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 13 12:55:05.304993 kubelet[3074]: I0213 12:55:05.304926 3074 server.go:1186] "Started kubelet" Feb 13 12:55:05.307000 audit[3074]: AVC avc: denied { mac_admin } for pid=3074 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.307000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 12:55:05.307000 audit[3074]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000e2ec00 a1=400018d7b8 a2=4000e2ebd0 a3=25 items=0 ppid=1 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:05.307000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 12:55:05.309545 kubelet[3074]: I0213 12:55:05.309495 3074 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 13 12:55:05.323000 audit[3074]: AVC avc: denied { mac_admin } for pid=3074 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.324977 kubelet[3074]: I0213 12:55:05.309722 3074 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 13 12:55:05.325466 kubelet[3074]: E0213 12:55:05.321037 3074 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 13 12:55:05.325634 kubelet[3074]: E0213 12:55:05.325612 3074 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 13 12:55:05.323000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 12:55:05.323000 audit[3074]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000eb07a0 a1=4000eb4360 a2=4000e2fa70 a3=25 items=0 ppid=1 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:05.323000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 12:55:05.327536 kubelet[3074]: I0213 12:55:05.327510 3074 server.go:451] "Adding debug handlers to kubelet server" Feb 13 12:55:05.329408 kubelet[3074]: I0213 12:55:05.329363 3074 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 13 12:55:05.329610 kubelet[3074]: I0213 12:55:05.329588 3074 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 13 12:55:05.340438 kubelet[3074]: I0213 12:55:05.340378 3074 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 13 12:55:05.347427 kubelet[3074]: I0213 12:55:05.340663 3074 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 13 12:55:05.450643 kubelet[3074]: I0213 12:55:05.450610 3074 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-23-232" Feb 13 12:55:05.479563 kubelet[3074]: I0213 12:55:05.478255 3074 kubelet_node_status.go:108] "Node was previously registered" node="ip-172-31-23-232" Feb 13 12:55:05.479563 kubelet[3074]: I0213 12:55:05.478380 3074 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-23-232" Feb 13 12:55:05.521086 kubelet[3074]: I0213 12:55:05.519893 3074 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 13 12:55:05.620524 kubelet[3074]: I0213 12:55:05.620473 3074 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 13 12:55:05.620703 kubelet[3074]: I0213 12:55:05.620536 3074 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 13 12:55:05.620703 kubelet[3074]: I0213 12:55:05.620572 3074 state_mem.go:36] "Initialized new in-memory state store" Feb 13 12:55:05.620926 kubelet[3074]: I0213 12:55:05.620892 3074 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 13 12:55:05.621024 kubelet[3074]: I0213 12:55:05.620928 3074 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 13 12:55:05.621024 kubelet[3074]: I0213 12:55:05.621005 3074 policy_none.go:49] "None policy: Start" Feb 13 12:55:05.622195 kubelet[3074]: I0213 12:55:05.622149 3074 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 13 12:55:05.622321 kubelet[3074]: I0213 12:55:05.622220 3074 state_mem.go:35] "Initializing new in-memory state store" Feb 13 12:55:05.622605 kubelet[3074]: I0213 12:55:05.622565 3074 state_mem.go:75] "Updated machine memory state" Feb 13 12:55:05.631000 audit[3074]: AVC avc: denied { mac_admin } for pid=3074 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:05.631000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 12:55:05.631000 audit[3074]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40014545a0 a1=400146b440 a2=4001454570 a3=25 items=0 ppid=1 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:05.631000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 12:55:05.633566 kubelet[3074]: I0213 12:55:05.632335 3074 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 13 12:55:05.633566 kubelet[3074]: I0213 12:55:05.632488 3074 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 13 12:55:05.634180 kubelet[3074]: I0213 12:55:05.634114 3074 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 13 12:55:05.677984 kubelet[3074]: I0213 12:55:05.675851 3074 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 13 12:55:05.677984 kubelet[3074]: I0213 12:55:05.675898 3074 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 13 12:55:05.677984 kubelet[3074]: I0213 12:55:05.675933 3074 kubelet.go:2113] "Starting kubelet main sync loop" Feb 13 12:55:05.677984 kubelet[3074]: E0213 12:55:05.676074 3074 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 13 12:55:05.776893 kubelet[3074]: I0213 12:55:05.776763 3074 topology_manager.go:210] "Topology Admit Handler" Feb 13 12:55:05.777204 kubelet[3074]: I0213 12:55:05.777177 3074 topology_manager.go:210] "Topology Admit Handler" Feb 13 12:55:05.777445 kubelet[3074]: I0213 12:55:05.777421 3074 topology_manager.go:210] "Topology Admit Handler" Feb 13 12:55:05.816862 kubelet[3074]: E0213 12:55:05.816808 3074 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ip-172-31-23-232\" already exists" pod="kube-system/kube-scheduler-ip-172-31-23-232" Feb 13 12:55:05.849930 kubelet[3074]: I0213 12:55:05.849889 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b405545fda2522d41658b6f3de530a2b-ca-certs\") pod \"kube-apiserver-ip-172-31-23-232\" (UID: \"b405545fda2522d41658b6f3de530a2b\") " pod="kube-system/kube-apiserver-ip-172-31-23-232" Feb 13 12:55:05.850266 kubelet[3074]: I0213 12:55:05.850242 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e084071abfb714c8b8365746b705155c-k8s-certs\") pod \"kube-controller-manager-ip-172-31-23-232\" (UID: \"e084071abfb714c8b8365746b705155c\") " pod="kube-system/kube-controller-manager-ip-172-31-23-232" Feb 13 12:55:05.850535 kubelet[3074]: I0213 12:55:05.850430 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7b30cfd5ab8e16813f71e829772cc65b-kubeconfig\") pod \"kube-scheduler-ip-172-31-23-232\" (UID: \"7b30cfd5ab8e16813f71e829772cc65b\") " pod="kube-system/kube-scheduler-ip-172-31-23-232" Feb 13 12:55:05.850782 kubelet[3074]: I0213 12:55:05.850700 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b405545fda2522d41658b6f3de530a2b-k8s-certs\") pod \"kube-apiserver-ip-172-31-23-232\" (UID: \"b405545fda2522d41658b6f3de530a2b\") " pod="kube-system/kube-apiserver-ip-172-31-23-232" Feb 13 12:55:05.851063 kubelet[3074]: I0213 12:55:05.851028 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b405545fda2522d41658b6f3de530a2b-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-23-232\" (UID: \"b405545fda2522d41658b6f3de530a2b\") " pod="kube-system/kube-apiserver-ip-172-31-23-232" Feb 13 12:55:05.851378 kubelet[3074]: I0213 12:55:05.851295 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e084071abfb714c8b8365746b705155c-ca-certs\") pod \"kube-controller-manager-ip-172-31-23-232\" (UID: \"e084071abfb714c8b8365746b705155c\") " pod="kube-system/kube-controller-manager-ip-172-31-23-232" Feb 13 12:55:05.851628 kubelet[3074]: I0213 12:55:05.851547 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/e084071abfb714c8b8365746b705155c-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-23-232\" (UID: \"e084071abfb714c8b8365746b705155c\") " pod="kube-system/kube-controller-manager-ip-172-31-23-232" Feb 13 12:55:05.851930 kubelet[3074]: I0213 12:55:05.851889 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e084071abfb714c8b8365746b705155c-kubeconfig\") pod \"kube-controller-manager-ip-172-31-23-232\" (UID: \"e084071abfb714c8b8365746b705155c\") " pod="kube-system/kube-controller-manager-ip-172-31-23-232" Feb 13 12:55:05.852209 kubelet[3074]: I0213 12:55:05.852187 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e084071abfb714c8b8365746b705155c-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-23-232\" (UID: \"e084071abfb714c8b8365746b705155c\") " pod="kube-system/kube-controller-manager-ip-172-31-23-232" Feb 13 12:55:06.314284 kubelet[3074]: I0213 12:55:06.314220 3074 apiserver.go:52] "Watching apiserver" Feb 13 12:55:06.348656 kubelet[3074]: I0213 12:55:06.348596 3074 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 13 12:55:06.354991 kubelet[3074]: I0213 12:55:06.354924 3074 reconciler.go:41] "Reconciler: start to sync state" Feb 13 12:55:06.502215 amazon-ssm-agent[1717]: 2024-02-13 12:55:06 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Feb 13 12:55:06.719183 kubelet[3074]: E0213 12:55:06.719126 3074 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-23-232\" already exists" pod="kube-system/kube-apiserver-ip-172-31-23-232" Feb 13 12:55:06.904295 kubelet[3074]: E0213 12:55:06.904260 3074 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ip-172-31-23-232\" already exists" pod="kube-system/kube-controller-manager-ip-172-31-23-232" Feb 13 12:55:07.104434 kubelet[3074]: E0213 12:55:07.104293 3074 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ip-172-31-23-232\" already exists" pod="kube-system/kube-scheduler-ip-172-31-23-232" Feb 13 12:55:07.784487 kubelet[3074]: I0213 12:55:07.784428 3074 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-23-232" podStartSLOduration=2.784332331 pod.CreationTimestamp="2024-02-13 12:55:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 12:55:07.355258856 +0000 UTC m=+2.257031198" watchObservedRunningTime="2024-02-13 12:55:07.784332331 +0000 UTC m=+2.686104661" Feb 13 12:55:07.785399 kubelet[3074]: I0213 12:55:07.785364 3074 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-23-232" podStartSLOduration=4.785291977 pod.CreationTimestamp="2024-02-13 12:55:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 12:55:07.785244428 +0000 UTC m=+2.687016758" watchObservedRunningTime="2024-02-13 12:55:07.785291977 +0000 UTC m=+2.687064295" Feb 13 12:55:08.505271 amazon-ssm-agent[1717]: 2024-02-13 12:55:08 INFO [HealthCheck] HealthCheck reporting agent health. Feb 13 12:55:08.803206 kubelet[3074]: I0213 12:55:08.803054 3074 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-23-232" podStartSLOduration=3.803001617 pod.CreationTimestamp="2024-02-13 12:55:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 12:55:08.144122042 +0000 UTC m=+3.045894384" watchObservedRunningTime="2024-02-13 12:55:08.803001617 +0000 UTC m=+3.704773971" Feb 13 12:55:12.741454 sudo[2020]: pam_unix(sudo:session): session closed for user root Feb 13 12:55:12.741000 audit[2020]: USER_END pid=2020 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 12:55:12.744199 kernel: kauditd_printk_skb: 272 callbacks suppressed Feb 13 12:55:12.744340 kernel: audit: type=1106 audit(1707828912.741:976): pid=2020 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 12:55:12.741000 audit[2020]: CRED_DISP pid=2020 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 12:55:12.761156 kernel: audit: type=1104 audit(1707828912.741:977): pid=2020 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 12:55:12.765349 sshd[2017]: pam_unix(sshd:session): session closed for user core Feb 13 12:55:12.765000 audit[2017]: USER_END pid=2017 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:55:12.766000 audit[2017]: CRED_DISP pid=2017 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:55:12.789871 kernel: audit: type=1106 audit(1707828912.765:978): pid=2017 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:55:12.790025 kernel: audit: type=1104 audit(1707828912.766:979): pid=2017 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:55:12.781260 systemd-logind[1730]: Session 7 logged out. Waiting for processes to exit. Feb 13 12:55:12.782594 systemd[1]: sshd@6-172.31.23.232:22-147.75.109.163:34048.service: Deactivated successfully. Feb 13 12:55:12.783834 systemd[1]: session-7.scope: Deactivated successfully. Feb 13 12:55:12.784786 systemd[1]: session-7.scope: Consumed 10.366s CPU time. Feb 13 12:55:12.785758 systemd-logind[1730]: Removed session 7. Feb 13 12:55:12.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.23.232:22-147.75.109.163:34048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:55:12.799828 kernel: audit: type=1131 audit(1707828912.781:980): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.23.232:22-147.75.109.163:34048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:55:16.770000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:55:16.770000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e54360 a2=fc6 a3=0 items=0 ppid=2501 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 key=(null) Feb 13 12:55:16.793563 kernel: audit: type=1400 audit(1707828916.770:981): avc: denied { watch } for pid=2638 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:55:16.793754 kernel: audit: type=1300 audit(1707828916.770:981): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e54360 a2=fc6 a3=0 items=0 ppid=2501 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 key=(null) Feb 13 12:55:16.770000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 12:55:16.773000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:55:16.813482 kernel: audit: type=1327 audit(1707828916.770:981): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 12:55:16.813664 kernel: audit: type=1400 audit(1707828916.773:982): avc: denied { watch } for pid=2638 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:55:16.773000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e544a0 a2=fc6 a3=0 items=0 ppid=2501 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 key=(null) Feb 13 12:55:16.826602 kernel: audit: type=1300 audit(1707828916.773:982): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e544a0 a2=fc6 a3=0 items=0 ppid=2501 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 key=(null) Feb 13 12:55:16.773000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 12:55:16.775000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:55:16.775000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e545e0 a2=fc6 a3=0 items=0 ppid=2501 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 key=(null) Feb 13 12:55:16.775000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 12:55:16.776000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:55:16.776000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400101a680 a2=fc6 a3=0 items=0 ppid=2501 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 key=(null) Feb 13 12:55:16.776000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 12:55:16.838000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521282 scontext=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 13 12:55:16.838000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400091d900 a2=fc6 a3=0 items=0 ppid=2501 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 key=(null) Feb 13 12:55:16.838000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 12:55:18.597360 kubelet[3074]: I0213 12:55:18.597278 3074 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 13 12:55:18.598054 env[1734]: time="2024-02-13T12:55:18.597906071Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 13 12:55:18.598523 kubelet[3074]: I0213 12:55:18.598301 3074 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 13 12:55:19.320250 kubelet[3074]: I0213 12:55:19.320188 3074 topology_manager.go:210] "Topology Admit Handler" Feb 13 12:55:19.330849 systemd[1]: Created slice kubepods-besteffort-poda0f7f2b7_866a_453d_a7e1_52cd621e9249.slice. Feb 13 12:55:19.443519 kubelet[3074]: I0213 12:55:19.443484 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/a0f7f2b7-866a-453d-a7e1-52cd621e9249-kube-proxy\") pod \"kube-proxy-6m8j8\" (UID: \"a0f7f2b7-866a-453d-a7e1-52cd621e9249\") " pod="kube-system/kube-proxy-6m8j8" Feb 13 12:55:19.443797 kubelet[3074]: I0213 12:55:19.443774 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a0f7f2b7-866a-453d-a7e1-52cd621e9249-xtables-lock\") pod \"kube-proxy-6m8j8\" (UID: \"a0f7f2b7-866a-453d-a7e1-52cd621e9249\") " pod="kube-system/kube-proxy-6m8j8" Feb 13 12:55:19.444035 kubelet[3074]: I0213 12:55:19.443990 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vnnwg\" (UniqueName: \"kubernetes.io/projected/a0f7f2b7-866a-453d-a7e1-52cd621e9249-kube-api-access-vnnwg\") pod \"kube-proxy-6m8j8\" (UID: \"a0f7f2b7-866a-453d-a7e1-52cd621e9249\") " pod="kube-system/kube-proxy-6m8j8" Feb 13 12:55:19.444233 kubelet[3074]: I0213 12:55:19.444211 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a0f7f2b7-866a-453d-a7e1-52cd621e9249-lib-modules\") pod \"kube-proxy-6m8j8\" (UID: \"a0f7f2b7-866a-453d-a7e1-52cd621e9249\") " pod="kube-system/kube-proxy-6m8j8" Feb 13 12:55:19.583852 kubelet[3074]: I0213 12:55:19.583703 3074 topology_manager.go:210] "Topology Admit Handler" Feb 13 12:55:19.594393 systemd[1]: Created slice kubepods-besteffort-podd9e9fa21_f2b2_4981_b06a_120697189e3d.slice. Feb 13 12:55:19.645590 env[1734]: time="2024-02-13T12:55:19.644822522Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6m8j8,Uid:a0f7f2b7-866a-453d-a7e1-52cd621e9249,Namespace:kube-system,Attempt:0,}" Feb 13 12:55:19.646424 kubelet[3074]: I0213 12:55:19.646366 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vsp5l\" (UniqueName: \"kubernetes.io/projected/d9e9fa21-f2b2-4981-b06a-120697189e3d-kube-api-access-vsp5l\") pod \"tigera-operator-cfc98749c-h78jw\" (UID: \"d9e9fa21-f2b2-4981-b06a-120697189e3d\") " pod="tigera-operator/tigera-operator-cfc98749c-h78jw" Feb 13 12:55:19.647136 kubelet[3074]: I0213 12:55:19.647107 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d9e9fa21-f2b2-4981-b06a-120697189e3d-var-lib-calico\") pod \"tigera-operator-cfc98749c-h78jw\" (UID: \"d9e9fa21-f2b2-4981-b06a-120697189e3d\") " pod="tigera-operator/tigera-operator-cfc98749c-h78jw" Feb 13 12:55:19.688038 env[1734]: time="2024-02-13T12:55:19.685755344Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 12:55:19.688038 env[1734]: time="2024-02-13T12:55:19.685838487Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 12:55:19.688038 env[1734]: time="2024-02-13T12:55:19.685865069Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 12:55:19.688038 env[1734]: time="2024-02-13T12:55:19.686126185Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d4e0438a0c54913797ecdd4f65a4898c01c5d64fd21b566e379450afa773b986 pid=3181 runtime=io.containerd.runc.v2 Feb 13 12:55:19.720673 systemd[1]: run-containerd-runc-k8s.io-d4e0438a0c54913797ecdd4f65a4898c01c5d64fd21b566e379450afa773b986-runc.cd2IyV.mount: Deactivated successfully. Feb 13 12:55:19.732151 systemd[1]: Started cri-containerd-d4e0438a0c54913797ecdd4f65a4898c01c5d64fd21b566e379450afa773b986.scope. Feb 13 12:55:19.776210 kernel: kauditd_printk_skb: 10 callbacks suppressed Feb 13 12:55:19.776395 kernel: audit: type=1400 audit(1707828919.772:986): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.791100 kernel: audit: type=1400 audit(1707828919.772:987): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.791210 kernel: audit: type=1400 audit(1707828919.772:988): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.805776 kernel: audit: type=1400 audit(1707828919.772:989): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.815041 kernel: audit: type=1400 audit(1707828919.772:990): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.815167 kernel: audit: type=1400 audit(1707828919.772:991): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.828764 kernel: audit: type=1400 audit(1707828919.772:992): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.838000 kernel: audit: type=1400 audit(1707828919.772:993): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.850669 kernel: audit: type=1400 audit(1707828919.772:994): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.861591 kernel: audit: type=1400 audit(1707828919.774:995): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.774000 audit: BPF prog-id=112 op=LOAD Feb 13 12:55:19.782000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.782000 audit[3192]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3181 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:19.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434653034333861306335343931333739376563646434663635613438 Feb 13 12:55:19.782000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.782000 audit[3192]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3181 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:19.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434653034333861306335343931333739376563646434663635613438 Feb 13 12:55:19.783000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.783000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.783000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.783000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.783000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.783000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.783000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.783000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.783000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.783000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.783000 audit: BPF prog-id=113 op=LOAD Feb 13 12:55:19.783000 audit[3192]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3181 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:19.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434653034333861306335343931333739376563646434663635613438 Feb 13 12:55:19.790000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.790000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.790000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.790000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.790000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.790000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.790000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.790000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.790000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.790000 audit: BPF prog-id=114 op=LOAD Feb 13 12:55:19.790000 audit[3192]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3181 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:19.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434653034333861306335343931333739376563646434663635613438 Feb 13 12:55:19.797000 audit: BPF prog-id=114 op=UNLOAD Feb 13 12:55:19.797000 audit: BPF prog-id=113 op=UNLOAD Feb 13 12:55:19.797000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.797000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.797000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.797000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.797000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.797000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.797000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.797000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.797000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.797000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.797000 audit: BPF prog-id=115 op=LOAD Feb 13 12:55:19.797000 audit[3192]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3181 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:19.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434653034333861306335343931333739376563646434663635613438 Feb 13 12:55:19.873861 env[1734]: time="2024-02-13T12:55:19.873801798Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6m8j8,Uid:a0f7f2b7-866a-453d-a7e1-52cd621e9249,Namespace:kube-system,Attempt:0,} returns sandbox id \"d4e0438a0c54913797ecdd4f65a4898c01c5d64fd21b566e379450afa773b986\"" Feb 13 12:55:19.880911 env[1734]: time="2024-02-13T12:55:19.880846826Z" level=info msg="CreateContainer within sandbox \"d4e0438a0c54913797ecdd4f65a4898c01c5d64fd21b566e379450afa773b986\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 13 12:55:19.899623 env[1734]: time="2024-02-13T12:55:19.899567684Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-h78jw,Uid:d9e9fa21-f2b2-4981-b06a-120697189e3d,Namespace:tigera-operator,Attempt:0,}" Feb 13 12:55:19.906406 env[1734]: time="2024-02-13T12:55:19.906287235Z" level=info msg="CreateContainer within sandbox \"d4e0438a0c54913797ecdd4f65a4898c01c5d64fd21b566e379450afa773b986\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"36a5e2aa78e31cd39c8f22a866168e09d8086202fbcbeb2e5e75b594a04d6d39\"" Feb 13 12:55:19.909647 env[1734]: time="2024-02-13T12:55:19.907721562Z" level=info msg="StartContainer for \"36a5e2aa78e31cd39c8f22a866168e09d8086202fbcbeb2e5e75b594a04d6d39\"" Feb 13 12:55:19.929986 env[1734]: time="2024-02-13T12:55:19.929835852Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 12:55:19.930132 env[1734]: time="2024-02-13T12:55:19.930047320Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 12:55:19.930196 env[1734]: time="2024-02-13T12:55:19.930132635Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 12:55:19.930756 env[1734]: time="2024-02-13T12:55:19.930661852Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d55a236eded7fc38efa0eb751aedd40c071af13aef192cfd15f44538036e0e68 pid=3239 runtime=io.containerd.runc.v2 Feb 13 12:55:19.941859 systemd[1]: Started cri-containerd-36a5e2aa78e31cd39c8f22a866168e09d8086202fbcbeb2e5e75b594a04d6d39.scope. Feb 13 12:55:19.977146 systemd[1]: Started cri-containerd-d55a236eded7fc38efa0eb751aedd40c071af13aef192cfd15f44538036e0e68.scope. Feb 13 12:55:19.995000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.995000 audit[3226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3181 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:19.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336613565326161373865333163643339633866323261383636313638 Feb 13 12:55:19.997000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.997000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.997000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.997000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.997000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.997000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.997000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.997000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.997000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.997000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.997000 audit: BPF prog-id=116 op=LOAD Feb 13 12:55:19.997000 audit[3226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3181 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:19.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336613565326161373865333163643339633866323261383636313638 Feb 13 12:55:19.999000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.999000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.999000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.999000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.999000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.999000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.999000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.999000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.999000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:19.999000 audit: BPF prog-id=117 op=LOAD Feb 13 12:55:19.999000 audit[3226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3181 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:19.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336613565326161373865333163643339633866323261383636313638 Feb 13 12:55:20.001000 audit: BPF prog-id=117 op=UNLOAD Feb 13 12:55:20.001000 audit: BPF prog-id=116 op=UNLOAD Feb 13 12:55:20.001000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.001000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.001000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.001000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.001000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.001000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.001000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.001000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.001000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.001000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.001000 audit: BPF prog-id=118 op=LOAD Feb 13 12:55:20.001000 audit[3226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3181 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336613565326161373865333163643339633866323261383636313638 Feb 13 12:55:20.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.022000 audit: BPF prog-id=119 op=LOAD Feb 13 12:55:20.023000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.023000 audit[3253]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3239 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435356132333665646564376663333865666130656237353161656464 Feb 13 12:55:20.023000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.023000 audit[3253]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3239 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435356132333665646564376663333865666130656237353161656464 Feb 13 12:55:20.023000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.023000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.023000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.023000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.023000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.023000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.023000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.023000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.023000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.023000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.023000 audit: BPF prog-id=120 op=LOAD Feb 13 12:55:20.023000 audit[3253]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3239 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435356132333665646564376663333865666130656237353161656464 Feb 13 12:55:20.024000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.024000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.024000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.024000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.024000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.024000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.024000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.024000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.024000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.024000 audit: BPF prog-id=121 op=LOAD Feb 13 12:55:20.024000 audit[3253]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3239 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435356132333665646564376663333865666130656237353161656464 Feb 13 12:55:20.024000 audit: BPF prog-id=121 op=UNLOAD Feb 13 12:55:20.024000 audit: BPF prog-id=120 op=UNLOAD Feb 13 12:55:20.024000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.024000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.024000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.024000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.024000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.024000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.024000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.024000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.024000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.024000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:20.024000 audit: BPF prog-id=122 op=LOAD Feb 13 12:55:20.024000 audit[3253]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3239 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435356132333665646564376663333865666130656237353161656464 Feb 13 12:55:20.042936 env[1734]: time="2024-02-13T12:55:20.042853572Z" level=info msg="StartContainer for \"36a5e2aa78e31cd39c8f22a866168e09d8086202fbcbeb2e5e75b594a04d6d39\" returns successfully" Feb 13 12:55:20.072159 env[1734]: time="2024-02-13T12:55:20.071914454Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-h78jw,Uid:d9e9fa21-f2b2-4981-b06a-120697189e3d,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"d55a236eded7fc38efa0eb751aedd40c071af13aef192cfd15f44538036e0e68\"" Feb 13 12:55:20.080627 env[1734]: time="2024-02-13T12:55:20.078498860Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 13 12:55:20.164000 audit[3317]: NETFILTER_CFG table=mangle:59 family=2 entries=1 op=nft_register_chain pid=3317 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:55:20.164000 audit[3317]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcc3c7790 a2=0 a3=ffffb4e686c0 items=0 ppid=3261 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.164000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 13 12:55:20.166000 audit[3318]: NETFILTER_CFG table=mangle:60 family=10 entries=1 op=nft_register_chain pid=3318 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:55:20.168000 audit[3319]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:55:20.168000 audit[3319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc6c562f0 a2=0 a3=ffffbc6336c0 items=0 ppid=3261 pid=3319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.168000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 13 12:55:20.166000 audit[3318]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffed5a70e0 a2=0 a3=ffffaef2c6c0 items=0 ppid=3261 pid=3318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.166000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 13 12:55:20.171000 audit[3320]: NETFILTER_CFG table=filter:62 family=2 entries=1 op=nft_register_chain pid=3320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:55:20.171000 audit[3320]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd9e18270 a2=0 a3=ffff81a426c0 items=0 ppid=3261 pid=3320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.171000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 13 12:55:20.175000 audit[3321]: NETFILTER_CFG table=nat:63 family=10 entries=1 op=nft_register_chain pid=3321 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:55:20.175000 audit[3321]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff7677780 a2=0 a3=ffff9cac36c0 items=0 ppid=3261 pid=3321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.175000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 13 12:55:20.177000 audit[3322]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_chain pid=3322 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:55:20.177000 audit[3322]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffb388a70 a2=0 a3=ffffb53406c0 items=0 ppid=3261 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.177000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 13 12:55:20.285000 audit[3323]: NETFILTER_CFG table=filter:65 family=2 entries=1 op=nft_register_chain pid=3323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:55:20.285000 audit[3323]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff6c347e0 a2=0 a3=ffffbdeb96c0 items=0 ppid=3261 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.285000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 13 12:55:20.291000 audit[3325]: NETFILTER_CFG table=filter:66 family=2 entries=1 op=nft_register_rule pid=3325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:55:20.291000 audit[3325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd8d19a70 a2=0 a3=ffffb7e9e6c0 items=0 ppid=3261 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.291000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 13 12:55:20.298000 audit[3328]: NETFILTER_CFG table=filter:67 family=2 entries=1 op=nft_register_rule pid=3328 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:55:20.298000 audit[3328]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffe9a46030 a2=0 a3=ffff9c9426c0 items=0 ppid=3261 pid=3328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.298000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 13 12:55:20.301000 audit[3329]: NETFILTER_CFG table=filter:68 family=2 entries=1 op=nft_register_chain pid=3329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:55:20.301000 audit[3329]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcf1ee870 a2=0 a3=ffffbe6c26c0 items=0 ppid=3261 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.301000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 13 12:55:20.305000 audit[3331]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_rule pid=3331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:55:20.305000 audit[3331]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcfa4d540 a2=0 a3=ffffa31356c0 items=0 ppid=3261 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.305000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 13 12:55:20.308000 audit[3332]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_chain pid=3332 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:55:20.308000 audit[3332]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcf0fbd90 a2=0 a3=ffff932206c0 items=0 ppid=3261 pid=3332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.308000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 13 12:55:20.313000 audit[3334]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_rule pid=3334 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:55:20.313000 audit[3334]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffee019510 a2=0 a3=ffffbaad96c0 items=0 ppid=3261 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.313000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 13 12:55:20.321000 audit[3337]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_rule pid=3337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:55:20.321000 audit[3337]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffeb9ecd40 a2=0 a3=ffffb8bb26c0 items=0 ppid=3261 pid=3337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.321000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 13 12:55:20.323000 audit[3338]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_chain pid=3338 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:55:20.323000 audit[3338]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffe27f8f0 a2=0 a3=ffffb48916c0 items=0 ppid=3261 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.323000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 13 12:55:20.328000 audit[3340]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_rule pid=3340 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:55:20.328000 audit[3340]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffed652ce0 a2=0 a3=ffff8b2626c0 items=0 ppid=3261 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.328000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 13 12:55:20.330000 audit[3341]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_chain pid=3341 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:55:20.330000 audit[3341]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffacbf320 a2=0 a3=ffff8a4df6c0 items=0 ppid=3261 pid=3341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.330000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 13 12:55:20.336000 audit[3343]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_rule pid=3343 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:55:20.336000 audit[3343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc5ee7fd0 a2=0 a3=ffffb602a6c0 items=0 ppid=3261 pid=3343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.336000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 13 12:55:20.343000 audit[3346]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_rule pid=3346 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:55:20.343000 audit[3346]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdd53faf0 a2=0 a3=ffff970026c0 items=0 ppid=3261 pid=3346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.343000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 13 12:55:20.351000 audit[3349]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_rule pid=3349 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:55:20.351000 audit[3349]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffde8f88e0 a2=0 a3=ffff870be6c0 items=0 ppid=3261 pid=3349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.351000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 13 12:55:20.353000 audit[3350]: NETFILTER_CFG table=nat:79 family=2 entries=1 op=nft_register_chain pid=3350 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:55:20.353000 audit[3350]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd0b96da0 a2=0 a3=ffff9d1616c0 items=0 ppid=3261 pid=3350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.353000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 13 12:55:20.358000 audit[3352]: NETFILTER_CFG table=nat:80 family=2 entries=1 op=nft_register_rule pid=3352 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:55:20.358000 audit[3352]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=fffff5a83d90 a2=0 a3=ffffae7436c0 items=0 ppid=3261 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.358000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 13 12:55:20.365000 audit[3355]: NETFILTER_CFG table=nat:81 family=2 entries=1 op=nft_register_rule pid=3355 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 12:55:20.365000 audit[3355]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe4cae890 a2=0 a3=ffff8974f6c0 items=0 ppid=3261 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.365000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 13 12:55:20.390000 audit[3359]: NETFILTER_CFG table=filter:82 family=2 entries=6 op=nft_register_rule pid=3359 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:55:20.390000 audit[3359]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=ffffd5550760 a2=0 a3=ffffa21626c0 items=0 ppid=3261 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.390000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:55:20.402000 audit[3359]: NETFILTER_CFG table=nat:83 family=2 entries=17 op=nft_register_chain pid=3359 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:55:20.402000 audit[3359]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffd5550760 a2=0 a3=ffffa21626c0 items=0 ppid=3261 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.402000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:55:20.409000 audit[3364]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:55:20.409000 audit[3364]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe55d1ca0 a2=0 a3=ffffb7c5b6c0 items=0 ppid=3261 pid=3364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.409000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 13 12:55:20.414000 audit[3366]: NETFILTER_CFG table=filter:85 family=10 entries=2 op=nft_register_chain pid=3366 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:55:20.414000 audit[3366]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe74356f0 a2=0 a3=ffff844cb6c0 items=0 ppid=3261 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.414000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 13 12:55:20.421000 audit[3369]: NETFILTER_CFG table=filter:86 family=10 entries=2 op=nft_register_chain pid=3369 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:55:20.421000 audit[3369]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe845a290 a2=0 a3=ffff949d36c0 items=0 ppid=3261 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.421000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 13 12:55:20.426000 audit[3370]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=3370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:55:20.426000 audit[3370]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc0bf6790 a2=0 a3=ffff9b5566c0 items=0 ppid=3261 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.426000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 13 12:55:20.431000 audit[3372]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=3372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:55:20.431000 audit[3372]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc453e650 a2=0 a3=ffff8e4ab6c0 items=0 ppid=3261 pid=3372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.431000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 13 12:55:20.434000 audit[3373]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_chain pid=3373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:55:20.434000 audit[3373]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe741aec0 a2=0 a3=ffff9f9986c0 items=0 ppid=3261 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.434000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 13 12:55:20.439000 audit[3375]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=3375 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:55:20.439000 audit[3375]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffdd3a0150 a2=0 a3=ffffbe59b6c0 items=0 ppid=3261 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.439000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 13 12:55:20.447000 audit[3378]: NETFILTER_CFG table=filter:91 family=10 entries=2 op=nft_register_chain pid=3378 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:55:20.447000 audit[3378]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffffdc16f40 a2=0 a3=ffffb5bec6c0 items=0 ppid=3261 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.447000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 13 12:55:20.450000 audit[3379]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_chain pid=3379 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:55:20.450000 audit[3379]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffebda70e0 a2=0 a3=ffff83a766c0 items=0 ppid=3261 pid=3379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.450000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 13 12:55:20.455000 audit[3381]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_rule pid=3381 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:55:20.455000 audit[3381]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd6ade3e0 a2=0 a3=ffff9b0b96c0 items=0 ppid=3261 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.455000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 13 12:55:20.458000 audit[3382]: NETFILTER_CFG table=filter:94 family=10 entries=1 op=nft_register_chain pid=3382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:55:20.458000 audit[3382]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe609da70 a2=0 a3=ffff8052a6c0 items=0 ppid=3261 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.458000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 13 12:55:20.466000 audit[3384]: NETFILTER_CFG table=filter:95 family=10 entries=1 op=nft_register_rule pid=3384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:55:20.466000 audit[3384]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffee0587a0 a2=0 a3=ffff89e856c0 items=0 ppid=3261 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.466000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 13 12:55:20.476000 audit[3387]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_rule pid=3387 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:55:20.476000 audit[3387]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd7723490 a2=0 a3=ffffbc1666c0 items=0 ppid=3261 pid=3387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.476000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 13 12:55:20.483000 audit[3390]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_rule pid=3390 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:55:20.483000 audit[3390]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdee0d360 a2=0 a3=ffff86e4d6c0 items=0 ppid=3261 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.483000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 13 12:55:20.486000 audit[3391]: NETFILTER_CFG table=nat:98 family=10 entries=1 op=nft_register_chain pid=3391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:55:20.486000 audit[3391]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe3631780 a2=0 a3=ffff897266c0 items=0 ppid=3261 pid=3391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.486000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 13 12:55:20.491000 audit[3393]: NETFILTER_CFG table=nat:99 family=10 entries=2 op=nft_register_chain pid=3393 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:55:20.491000 audit[3393]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffffe6a1100 a2=0 a3=ffff82e9c6c0 items=0 ppid=3261 pid=3393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.491000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 13 12:55:20.497000 audit[3396]: NETFILTER_CFG table=nat:100 family=10 entries=2 op=nft_register_chain pid=3396 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 12:55:20.497000 audit[3396]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffff525d470 a2=0 a3=ffffa4ae86c0 items=0 ppid=3261 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.497000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 13 12:55:20.508000 audit[3400]: NETFILTER_CFG table=filter:101 family=10 entries=3 op=nft_register_rule pid=3400 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 13 12:55:20.508000 audit[3400]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffdcac6bc0 a2=0 a3=ffff8079b6c0 items=0 ppid=3261 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.508000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:55:20.509000 audit[3400]: NETFILTER_CFG table=nat:102 family=10 entries=10 op=nft_register_chain pid=3400 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 13 12:55:20.509000 audit[3400]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffdcac6bc0 a2=0 a3=ffff8079b6c0 items=0 ppid=3261 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:20.509000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:55:20.753570 kubelet[3074]: I0213 12:55:20.753527 3074 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-6m8j8" podStartSLOduration=1.7534733820000001 pod.CreationTimestamp="2024-02-13 12:55:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 12:55:20.751904636 +0000 UTC m=+15.653677002" watchObservedRunningTime="2024-02-13 12:55:20.753473382 +0000 UTC m=+15.655245712" Feb 13 12:55:21.329301 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2811566889.mount: Deactivated successfully. Feb 13 12:55:22.453628 env[1734]: time="2024-02-13T12:55:22.453566274Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:55:22.461723 env[1734]: time="2024-02-13T12:55:22.461667742Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:55:22.464903 env[1734]: time="2024-02-13T12:55:22.464816587Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:55:22.468313 env[1734]: time="2024-02-13T12:55:22.468249805Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:55:22.469712 env[1734]: time="2024-02-13T12:55:22.469662810Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f\"" Feb 13 12:55:22.473975 env[1734]: time="2024-02-13T12:55:22.473870444Z" level=info msg="CreateContainer within sandbox \"d55a236eded7fc38efa0eb751aedd40c071af13aef192cfd15f44538036e0e68\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 13 12:55:22.492418 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3508471044.mount: Deactivated successfully. Feb 13 12:55:22.504640 env[1734]: time="2024-02-13T12:55:22.504149908Z" level=info msg="CreateContainer within sandbox \"d55a236eded7fc38efa0eb751aedd40c071af13aef192cfd15f44538036e0e68\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"c945b8a8c66b41504bbad81047ef16f472cafe4d2b573fbe4b112a9c2f0f7ab5\"" Feb 13 12:55:22.508259 env[1734]: time="2024-02-13T12:55:22.505678865Z" level=info msg="StartContainer for \"c945b8a8c66b41504bbad81047ef16f472cafe4d2b573fbe4b112a9c2f0f7ab5\"" Feb 13 12:55:22.547183 systemd[1]: Started cri-containerd-c945b8a8c66b41504bbad81047ef16f472cafe4d2b573fbe4b112a9c2f0f7ab5.scope. Feb 13 12:55:22.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.587000 audit: BPF prog-id=123 op=LOAD Feb 13 12:55:22.587000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.587000 audit[3409]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3239 pid=3409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:22.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339343562386138633636623431353034626261643831303437656631 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit[3409]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3239 pid=3409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:22.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339343562386138633636623431353034626261643831303437656631 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit: BPF prog-id=124 op=LOAD Feb 13 12:55:22.588000 audit[3409]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3239 pid=3409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:22.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339343562386138633636623431353034626261643831303437656631 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit: BPF prog-id=125 op=LOAD Feb 13 12:55:22.588000 audit[3409]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3239 pid=3409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:22.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339343562386138633636623431353034626261643831303437656631 Feb 13 12:55:22.588000 audit: BPF prog-id=125 op=UNLOAD Feb 13 12:55:22.588000 audit: BPF prog-id=124 op=UNLOAD Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { perfmon } for pid=3409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit[3409]: AVC avc: denied { bpf } for pid=3409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:22.588000 audit: BPF prog-id=126 op=LOAD Feb 13 12:55:22.588000 audit[3409]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3239 pid=3409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:22.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339343562386138633636623431353034626261643831303437656631 Feb 13 12:55:22.624665 env[1734]: time="2024-02-13T12:55:22.624584471Z" level=info msg="StartContainer for \"c945b8a8c66b41504bbad81047ef16f472cafe4d2b573fbe4b112a9c2f0f7ab5\" returns successfully" Feb 13 12:55:22.771085 kubelet[3074]: I0213 12:55:22.770918 3074 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-cfc98749c-h78jw" podStartSLOduration=-9.223372033083935e+09 pod.CreationTimestamp="2024-02-13 12:55:19 +0000 UTC" firstStartedPulling="2024-02-13 12:55:20.077593572 +0000 UTC m=+14.979365890" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 12:55:22.769929195 +0000 UTC m=+17.671701537" watchObservedRunningTime="2024-02-13 12:55:22.77084054 +0000 UTC m=+17.672612894" Feb 13 12:55:28.429000 audit[3464]: NETFILTER_CFG table=filter:103 family=2 entries=13 op=nft_register_rule pid=3464 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:55:28.432327 kernel: kauditd_printk_skb: 336 callbacks suppressed Feb 13 12:55:28.432425 kernel: audit: type=1325 audit(1707828928.429:1090): table=filter:103 family=2 entries=13 op=nft_register_rule pid=3464 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:55:28.429000 audit[3464]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffc1b088f0 a2=0 a3=ffff948b46c0 items=0 ppid=3261 pid=3464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:28.449881 kernel: audit: type=1300 audit(1707828928.429:1090): arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffc1b088f0 a2=0 a3=ffff948b46c0 items=0 ppid=3261 pid=3464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:28.429000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:55:28.456335 kernel: audit: type=1327 audit(1707828928.429:1090): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:55:28.430000 audit[3464]: NETFILTER_CFG table=nat:104 family=2 entries=20 op=nft_register_rule pid=3464 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:55:28.466372 kernel: audit: type=1325 audit(1707828928.430:1091): table=nat:104 family=2 entries=20 op=nft_register_rule pid=3464 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:55:28.430000 audit[3464]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffc1b088f0 a2=0 a3=ffff948b46c0 items=0 ppid=3261 pid=3464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:28.479809 kernel: audit: type=1300 audit(1707828928.430:1091): arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffc1b088f0 a2=0 a3=ffff948b46c0 items=0 ppid=3261 pid=3464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:28.430000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:55:28.485937 kernel: audit: type=1327 audit(1707828928.430:1091): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:55:28.546968 kubelet[3074]: I0213 12:55:28.546906 3074 topology_manager.go:210] "Topology Admit Handler" Feb 13 12:55:28.558679 systemd[1]: Created slice kubepods-besteffort-pod4c256ab5_5914_4a21_b2fd_b10f13c36a2f.slice. Feb 13 12:55:28.705643 kubelet[3074]: I0213 12:55:28.705479 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/4c256ab5-5914-4a21-b2fd-b10f13c36a2f-typha-certs\") pod \"calico-typha-9b555c754-45r2g\" (UID: \"4c256ab5-5914-4a21-b2fd-b10f13c36a2f\") " pod="calico-system/calico-typha-9b555c754-45r2g" Feb 13 12:55:28.705643 kubelet[3074]: I0213 12:55:28.705609 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7f59t\" (UniqueName: \"kubernetes.io/projected/4c256ab5-5914-4a21-b2fd-b10f13c36a2f-kube-api-access-7f59t\") pod \"calico-typha-9b555c754-45r2g\" (UID: \"4c256ab5-5914-4a21-b2fd-b10f13c36a2f\") " pod="calico-system/calico-typha-9b555c754-45r2g" Feb 13 12:55:28.705874 kubelet[3074]: I0213 12:55:28.705700 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4c256ab5-5914-4a21-b2fd-b10f13c36a2f-tigera-ca-bundle\") pod \"calico-typha-9b555c754-45r2g\" (UID: \"4c256ab5-5914-4a21-b2fd-b10f13c36a2f\") " pod="calico-system/calico-typha-9b555c754-45r2g" Feb 13 12:55:28.707000 audit[3491]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=3491 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:55:28.714984 kernel: audit: type=1325 audit(1707828928.707:1092): table=filter:105 family=2 entries=14 op=nft_register_rule pid=3491 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:55:28.707000 audit[3491]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffc1c71c80 a2=0 a3=ffff9f60f6c0 items=0 ppid=3261 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:28.707000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:55:28.736387 kernel: audit: type=1300 audit(1707828928.707:1092): arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffc1c71c80 a2=0 a3=ffff9f60f6c0 items=0 ppid=3261 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:28.736551 kernel: audit: type=1327 audit(1707828928.707:1092): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:55:28.729000 audit[3491]: NETFILTER_CFG table=nat:106 family=2 entries=20 op=nft_register_rule pid=3491 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:55:28.742697 kernel: audit: type=1325 audit(1707828928.729:1093): table=nat:106 family=2 entries=20 op=nft_register_rule pid=3491 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:55:28.729000 audit[3491]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffc1c71c80 a2=0 a3=ffff9f60f6c0 items=0 ppid=3261 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:28.729000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:55:28.751015 kubelet[3074]: I0213 12:55:28.750971 3074 topology_manager.go:210] "Topology Admit Handler" Feb 13 12:55:28.762101 systemd[1]: Created slice kubepods-besteffort-pod72021677_60cb_423a_9216_9774402f3623.slice. Feb 13 12:55:28.868491 env[1734]: time="2024-02-13T12:55:28.868420902Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-9b555c754-45r2g,Uid:4c256ab5-5914-4a21-b2fd-b10f13c36a2f,Namespace:calico-system,Attempt:0,}" Feb 13 12:55:28.874980 kubelet[3074]: I0213 12:55:28.874902 3074 topology_manager.go:210] "Topology Admit Handler" Feb 13 12:55:28.876182 kubelet[3074]: E0213 12:55:28.875754 3074 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jv8nx" podUID=f202d5b3-f8a1-45a5-a109-2d38cf1ff107 Feb 13 12:55:28.906170 env[1734]: time="2024-02-13T12:55:28.906019109Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 12:55:28.906170 env[1734]: time="2024-02-13T12:55:28.906100066Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 12:55:28.906664 env[1734]: time="2024-02-13T12:55:28.906534733Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 12:55:28.908108 kubelet[3074]: I0213 12:55:28.907083 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/72021677-60cb-423a-9216-9774402f3623-cni-net-dir\") pod \"calico-node-9fgtq\" (UID: \"72021677-60cb-423a-9216-9774402f3623\") " pod="calico-system/calico-node-9fgtq" Feb 13 12:55:28.908108 kubelet[3074]: I0213 12:55:28.907240 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/72021677-60cb-423a-9216-9774402f3623-var-lib-calico\") pod \"calico-node-9fgtq\" (UID: \"72021677-60cb-423a-9216-9774402f3623\") " pod="calico-system/calico-node-9fgtq" Feb 13 12:55:28.908108 kubelet[3074]: I0213 12:55:28.907643 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/72021677-60cb-423a-9216-9774402f3623-tigera-ca-bundle\") pod \"calico-node-9fgtq\" (UID: \"72021677-60cb-423a-9216-9774402f3623\") " pod="calico-system/calico-node-9fgtq" Feb 13 12:55:28.908108 kubelet[3074]: I0213 12:55:28.907773 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/72021677-60cb-423a-9216-9774402f3623-cni-bin-dir\") pod \"calico-node-9fgtq\" (UID: \"72021677-60cb-423a-9216-9774402f3623\") " pod="calico-system/calico-node-9fgtq" Feb 13 12:55:28.908108 kubelet[3074]: I0213 12:55:28.907896 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5c79w\" (UniqueName: \"kubernetes.io/projected/72021677-60cb-423a-9216-9774402f3623-kube-api-access-5c79w\") pod \"calico-node-9fgtq\" (UID: \"72021677-60cb-423a-9216-9774402f3623\") " pod="calico-system/calico-node-9fgtq" Feb 13 12:55:28.908563 kubelet[3074]: I0213 12:55:28.908048 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/72021677-60cb-423a-9216-9774402f3623-xtables-lock\") pod \"calico-node-9fgtq\" (UID: \"72021677-60cb-423a-9216-9774402f3623\") " pod="calico-system/calico-node-9fgtq" Feb 13 12:55:28.908563 kubelet[3074]: I0213 12:55:28.908159 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/72021677-60cb-423a-9216-9774402f3623-node-certs\") pod \"calico-node-9fgtq\" (UID: \"72021677-60cb-423a-9216-9774402f3623\") " pod="calico-system/calico-node-9fgtq" Feb 13 12:55:28.908563 kubelet[3074]: I0213 12:55:28.908241 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/72021677-60cb-423a-9216-9774402f3623-cni-log-dir\") pod \"calico-node-9fgtq\" (UID: \"72021677-60cb-423a-9216-9774402f3623\") " pod="calico-system/calico-node-9fgtq" Feb 13 12:55:28.908563 kubelet[3074]: I0213 12:55:28.908292 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/72021677-60cb-423a-9216-9774402f3623-flexvol-driver-host\") pod \"calico-node-9fgtq\" (UID: \"72021677-60cb-423a-9216-9774402f3623\") " pod="calico-system/calico-node-9fgtq" Feb 13 12:55:28.908563 kubelet[3074]: I0213 12:55:28.908366 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/72021677-60cb-423a-9216-9774402f3623-policysync\") pod \"calico-node-9fgtq\" (UID: \"72021677-60cb-423a-9216-9774402f3623\") " pod="calico-system/calico-node-9fgtq" Feb 13 12:55:28.908855 kubelet[3074]: I0213 12:55:28.908459 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/72021677-60cb-423a-9216-9774402f3623-lib-modules\") pod \"calico-node-9fgtq\" (UID: \"72021677-60cb-423a-9216-9774402f3623\") " pod="calico-system/calico-node-9fgtq" Feb 13 12:55:28.908855 kubelet[3074]: I0213 12:55:28.908534 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/72021677-60cb-423a-9216-9774402f3623-var-run-calico\") pod \"calico-node-9fgtq\" (UID: \"72021677-60cb-423a-9216-9774402f3623\") " pod="calico-system/calico-node-9fgtq" Feb 13 12:55:28.912671 env[1734]: time="2024-02-13T12:55:28.909370318Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/838ee25de56ddfdf30378fee4657cadc3b3ab476ec588257efad7ec0de087004 pid=3501 runtime=io.containerd.runc.v2 Feb 13 12:55:28.967722 systemd[1]: Started cri-containerd-838ee25de56ddfdf30378fee4657cadc3b3ab476ec588257efad7ec0de087004.scope. Feb 13 12:55:29.009427 kubelet[3074]: I0213 12:55:29.009384 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/f202d5b3-f8a1-45a5-a109-2d38cf1ff107-socket-dir\") pod \"csi-node-driver-jv8nx\" (UID: \"f202d5b3-f8a1-45a5-a109-2d38cf1ff107\") " pod="calico-system/csi-node-driver-jv8nx" Feb 13 12:55:29.009917 kubelet[3074]: I0213 12:55:29.009878 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/f202d5b3-f8a1-45a5-a109-2d38cf1ff107-varrun\") pod \"csi-node-driver-jv8nx\" (UID: \"f202d5b3-f8a1-45a5-a109-2d38cf1ff107\") " pod="calico-system/csi-node-driver-jv8nx" Feb 13 12:55:29.010243 kubelet[3074]: I0213 12:55:29.010217 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/f202d5b3-f8a1-45a5-a109-2d38cf1ff107-registration-dir\") pod \"csi-node-driver-jv8nx\" (UID: \"f202d5b3-f8a1-45a5-a109-2d38cf1ff107\") " pod="calico-system/csi-node-driver-jv8nx" Feb 13 12:55:29.010616 kubelet[3074]: I0213 12:55:29.010590 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/f202d5b3-f8a1-45a5-a109-2d38cf1ff107-kubelet-dir\") pod \"csi-node-driver-jv8nx\" (UID: \"f202d5b3-f8a1-45a5-a109-2d38cf1ff107\") " pod="calico-system/csi-node-driver-jv8nx" Feb 13 12:55:29.016593 kubelet[3074]: E0213 12:55:29.016554 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.016789 kubelet[3074]: W0213 12:55:29.016755 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.017017 kubelet[3074]: E0213 12:55:29.016990 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.020169 kubelet[3074]: E0213 12:55:29.020130 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.020429 kubelet[3074]: W0213 12:55:29.020384 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.020559 kubelet[3074]: E0213 12:55:29.020537 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.020727 kubelet[3074]: I0213 12:55:29.020705 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xznr4\" (UniqueName: \"kubernetes.io/projected/f202d5b3-f8a1-45a5-a109-2d38cf1ff107-kube-api-access-xznr4\") pod \"csi-node-driver-jv8nx\" (UID: \"f202d5b3-f8a1-45a5-a109-2d38cf1ff107\") " pod="calico-system/csi-node-driver-jv8nx" Feb 13 12:55:29.021439 kubelet[3074]: E0213 12:55:29.021393 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.021439 kubelet[3074]: W0213 12:55:29.021432 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.021671 kubelet[3074]: E0213 12:55:29.021468 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.021879 kubelet[3074]: E0213 12:55:29.021846 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.021879 kubelet[3074]: W0213 12:55:29.021874 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.022060 kubelet[3074]: E0213 12:55:29.021902 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.022378 kubelet[3074]: E0213 12:55:29.022340 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.022378 kubelet[3074]: W0213 12:55:29.022369 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.022563 kubelet[3074]: E0213 12:55:29.022400 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.022828 kubelet[3074]: E0213 12:55:29.022758 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.022828 kubelet[3074]: W0213 12:55:29.022786 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.022828 kubelet[3074]: E0213 12:55:29.022826 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.023358 kubelet[3074]: E0213 12:55:29.023287 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.023358 kubelet[3074]: W0213 12:55:29.023316 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.023358 kubelet[3074]: E0213 12:55:29.023355 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.024020 kubelet[3074]: E0213 12:55:29.023686 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.024020 kubelet[3074]: W0213 12:55:29.023712 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.024020 kubelet[3074]: E0213 12:55:29.023750 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.024247 kubelet[3074]: E0213 12:55:29.024105 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.024247 kubelet[3074]: W0213 12:55:29.024123 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.024247 kubelet[3074]: E0213 12:55:29.024166 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.025108 kubelet[3074]: E0213 12:55:29.024567 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.025108 kubelet[3074]: W0213 12:55:29.024609 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.025108 kubelet[3074]: E0213 12:55:29.024637 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.025108 kubelet[3074]: E0213 12:55:29.025097 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.025420 kubelet[3074]: W0213 12:55:29.025131 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.025420 kubelet[3074]: E0213 12:55:29.025160 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.025542 kubelet[3074]: E0213 12:55:29.025477 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.025542 kubelet[3074]: W0213 12:55:29.025493 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.025542 kubelet[3074]: E0213 12:55:29.025517 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.026530 kubelet[3074]: E0213 12:55:29.025810 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.026530 kubelet[3074]: W0213 12:55:29.025836 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.026530 kubelet[3074]: E0213 12:55:29.025861 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.028209 kubelet[3074]: E0213 12:55:29.028161 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.028209 kubelet[3074]: W0213 12:55:29.028202 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.028444 kubelet[3074]: E0213 12:55:29.028240 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.036191 kubelet[3074]: E0213 12:55:29.036107 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.036370 kubelet[3074]: W0213 12:55:29.036342 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.036541 kubelet[3074]: E0213 12:55:29.036519 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.095000 audit: BPF prog-id=127 op=LOAD Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3501 pid=3511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:29.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833386565323564653536646466646633303337386665653436353763 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3501 pid=3511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:29.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833386565323564653536646466646633303337386665653436353763 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit: BPF prog-id=128 op=LOAD Feb 13 12:55:29.096000 audit[3511]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3501 pid=3511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:29.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833386565323564653536646466646633303337386665653436353763 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit: BPF prog-id=129 op=LOAD Feb 13 12:55:29.096000 audit[3511]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3501 pid=3511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:29.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833386565323564653536646466646633303337386665653436353763 Feb 13 12:55:29.096000 audit: BPF prog-id=129 op=UNLOAD Feb 13 12:55:29.096000 audit: BPF prog-id=128 op=UNLOAD Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.096000 audit: BPF prog-id=130 op=LOAD Feb 13 12:55:29.096000 audit[3511]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3501 pid=3511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:29.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833386565323564653536646466646633303337386665653436353763 Feb 13 12:55:29.125386 kubelet[3074]: E0213 12:55:29.125350 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.125583 kubelet[3074]: W0213 12:55:29.125555 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.125734 kubelet[3074]: E0213 12:55:29.125712 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.126370 kubelet[3074]: E0213 12:55:29.126341 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.126546 kubelet[3074]: W0213 12:55:29.126519 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.126693 kubelet[3074]: E0213 12:55:29.126670 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.127921 kubelet[3074]: E0213 12:55:29.127893 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.128140 kubelet[3074]: W0213 12:55:29.128110 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.128328 kubelet[3074]: E0213 12:55:29.128279 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.128802 kubelet[3074]: E0213 12:55:29.128775 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.129090 kubelet[3074]: W0213 12:55:29.129061 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.129287 kubelet[3074]: E0213 12:55:29.129251 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.129706 kubelet[3074]: E0213 12:55:29.129679 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.129861 kubelet[3074]: W0213 12:55:29.129834 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.130332 kubelet[3074]: E0213 12:55:29.130246 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.131897 kubelet[3074]: E0213 12:55:29.131850 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.132132 kubelet[3074]: W0213 12:55:29.132102 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.132755 kubelet[3074]: E0213 12:55:29.132722 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.132963 kubelet[3074]: W0213 12:55:29.132919 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.134648 kubelet[3074]: E0213 12:55:29.134490 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.134648 kubelet[3074]: E0213 12:55:29.134572 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.137794 kubelet[3074]: E0213 12:55:29.137748 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.138101 kubelet[3074]: W0213 12:55:29.138070 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.138704 kubelet[3074]: E0213 12:55:29.138679 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.138883 kubelet[3074]: W0213 12:55:29.138854 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.142302 kubelet[3074]: E0213 12:55:29.141405 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.142302 kubelet[3074]: E0213 12:55:29.141472 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.142699 kubelet[3074]: E0213 12:55:29.142668 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.142836 kubelet[3074]: W0213 12:55:29.142808 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.143123 kubelet[3074]: E0213 12:55:29.143084 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.143517 kubelet[3074]: E0213 12:55:29.143492 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.143676 kubelet[3074]: W0213 12:55:29.143648 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.143848 kubelet[3074]: E0213 12:55:29.143814 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.145803 kubelet[3074]: E0213 12:55:29.145766 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.146123 kubelet[3074]: W0213 12:55:29.146083 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.146308 kubelet[3074]: E0213 12:55:29.146270 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.147100 kubelet[3074]: E0213 12:55:29.147073 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.147252 kubelet[3074]: W0213 12:55:29.147226 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.147451 kubelet[3074]: E0213 12:55:29.147411 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.153153 kubelet[3074]: E0213 12:55:29.153116 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.153383 kubelet[3074]: W0213 12:55:29.153341 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.153591 kubelet[3074]: E0213 12:55:29.153555 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.156619 kubelet[3074]: E0213 12:55:29.156541 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.156879 kubelet[3074]: W0213 12:55:29.156836 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.157105 kubelet[3074]: E0213 12:55:29.157069 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.158240 kubelet[3074]: E0213 12:55:29.158209 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.158459 kubelet[3074]: W0213 12:55:29.158428 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.158616 env[1734]: time="2024-02-13T12:55:29.158556737Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-9b555c754-45r2g,Uid:4c256ab5-5914-4a21-b2fd-b10f13c36a2f,Namespace:calico-system,Attempt:0,} returns sandbox id \"838ee25de56ddfdf30378fee4657cadc3b3ab476ec588257efad7ec0de087004\"" Feb 13 12:55:29.158806 kubelet[3074]: E0213 12:55:29.158783 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.160427 kubelet[3074]: E0213 12:55:29.159110 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.160427 kubelet[3074]: W0213 12:55:29.159138 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.160427 kubelet[3074]: E0213 12:55:29.159326 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.160427 kubelet[3074]: E0213 12:55:29.159547 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.160427 kubelet[3074]: W0213 12:55:29.159562 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.160427 kubelet[3074]: E0213 12:55:29.159687 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.160427 kubelet[3074]: E0213 12:55:29.159873 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.160427 kubelet[3074]: W0213 12:55:29.159888 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.160427 kubelet[3074]: E0213 12:55:29.160034 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.162142 kubelet[3074]: E0213 12:55:29.161079 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.162142 kubelet[3074]: W0213 12:55:29.161119 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.162142 kubelet[3074]: E0213 12:55:29.161355 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.162142 kubelet[3074]: E0213 12:55:29.161612 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.162142 kubelet[3074]: W0213 12:55:29.161629 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.162142 kubelet[3074]: E0213 12:55:29.161756 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.162142 kubelet[3074]: E0213 12:55:29.162019 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.162142 kubelet[3074]: W0213 12:55:29.162036 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.162675 kubelet[3074]: E0213 12:55:29.162168 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.162675 kubelet[3074]: E0213 12:55:29.162365 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.162675 kubelet[3074]: W0213 12:55:29.162380 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.162675 kubelet[3074]: E0213 12:55:29.162410 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.162905 kubelet[3074]: E0213 12:55:29.162773 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.162905 kubelet[3074]: W0213 12:55:29.162789 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.162905 kubelet[3074]: E0213 12:55:29.162823 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.163166 kubelet[3074]: E0213 12:55:29.163134 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.163166 kubelet[3074]: W0213 12:55:29.163161 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.163322 kubelet[3074]: E0213 12:55:29.163187 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.165211 kubelet[3074]: E0213 12:55:29.165126 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.165211 kubelet[3074]: W0213 12:55:29.165162 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.165211 kubelet[3074]: E0213 12:55:29.165199 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.170336 env[1734]: time="2024-02-13T12:55:29.169976562Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 13 12:55:29.190786 kubelet[3074]: E0213 12:55:29.190733 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.190786 kubelet[3074]: W0213 12:55:29.190768 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.191065 kubelet[3074]: E0213 12:55:29.190806 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.254520 kubelet[3074]: E0213 12:55:29.254399 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.254520 kubelet[3074]: W0213 12:55:29.254434 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.254520 kubelet[3074]: E0213 12:55:29.254469 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.356103 kubelet[3074]: E0213 12:55:29.356040 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.356103 kubelet[3074]: W0213 12:55:29.356075 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.356356 kubelet[3074]: E0213 12:55:29.356123 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.369078 env[1734]: time="2024-02-13T12:55:29.368999989Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-9fgtq,Uid:72021677-60cb-423a-9216-9774402f3623,Namespace:calico-system,Attempt:0,}" Feb 13 12:55:29.369555 kubelet[3074]: E0213 12:55:29.369514 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:29.369910 kubelet[3074]: W0213 12:55:29.369883 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:29.370293 kubelet[3074]: E0213 12:55:29.370238 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:29.401564 env[1734]: time="2024-02-13T12:55:29.400170882Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 12:55:29.401564 env[1734]: time="2024-02-13T12:55:29.400931680Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 12:55:29.401564 env[1734]: time="2024-02-13T12:55:29.400991684Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 12:55:29.402241 env[1734]: time="2024-02-13T12:55:29.402147894Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eac3312514ac116b37b1234968e35d80a22167f47fb4c79b71d6f189266477ae pid=3589 runtime=io.containerd.runc.v2 Feb 13 12:55:29.428673 systemd[1]: Started cri-containerd-eac3312514ac116b37b1234968e35d80a22167f47fb4c79b71d6f189266477ae.scope. Feb 13 12:55:29.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.468000 audit: BPF prog-id=131 op=LOAD Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3589 pid=3599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:29.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561633333313235313461633131366233376231323334393638653335 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3589 pid=3599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:29.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561633333313235313461633131366233376231323334393638653335 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit: BPF prog-id=132 op=LOAD Feb 13 12:55:29.469000 audit[3599]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3589 pid=3599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:29.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561633333313235313461633131366233376231323334393638653335 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit: BPF prog-id=133 op=LOAD Feb 13 12:55:29.469000 audit[3599]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3589 pid=3599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:29.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561633333313235313461633131366233376231323334393638653335 Feb 13 12:55:29.469000 audit: BPF prog-id=133 op=UNLOAD Feb 13 12:55:29.469000 audit: BPF prog-id=132 op=UNLOAD Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { perfmon } for pid=3599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit[3599]: AVC avc: denied { bpf } for pid=3599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:29.469000 audit: BPF prog-id=134 op=LOAD Feb 13 12:55:29.469000 audit[3599]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3589 pid=3599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:29.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561633333313235313461633131366233376231323334393638653335 Feb 13 12:55:29.511341 env[1734]: time="2024-02-13T12:55:29.508554280Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-9fgtq,Uid:72021677-60cb-423a-9216-9774402f3623,Namespace:calico-system,Attempt:0,} returns sandbox id \"eac3312514ac116b37b1234968e35d80a22167f47fb4c79b71d6f189266477ae\"" Feb 13 12:55:29.944000 audit[3647]: NETFILTER_CFG table=filter:107 family=2 entries=14 op=nft_register_rule pid=3647 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:55:29.944000 audit[3647]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffda040610 a2=0 a3=ffff9dcb76c0 items=0 ppid=3261 pid=3647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:29.944000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:55:29.946000 audit[3647]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=3647 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:55:29.946000 audit[3647]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffda040610 a2=0 a3=ffff9dcb76c0 items=0 ppid=3261 pid=3647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:29.946000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:55:30.677465 kubelet[3074]: E0213 12:55:30.677410 3074 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jv8nx" podUID=f202d5b3-f8a1-45a5-a109-2d38cf1ff107 Feb 13 12:55:30.695704 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1483713210.mount: Deactivated successfully. Feb 13 12:55:32.208373 env[1734]: time="2024-02-13T12:55:32.208301102Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:55:32.212583 env[1734]: time="2024-02-13T12:55:32.212499965Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:55:32.216038 env[1734]: time="2024-02-13T12:55:32.215969533Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:55:32.220803 env[1734]: time="2024-02-13T12:55:32.220737540Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:55:32.221660 env[1734]: time="2024-02-13T12:55:32.221613123Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969\"" Feb 13 12:55:32.224466 env[1734]: time="2024-02-13T12:55:32.224412332Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 13 12:55:32.251612 env[1734]: time="2024-02-13T12:55:32.251530765Z" level=info msg="CreateContainer within sandbox \"838ee25de56ddfdf30378fee4657cadc3b3ab476ec588257efad7ec0de087004\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 13 12:55:32.281638 env[1734]: time="2024-02-13T12:55:32.281560231Z" level=info msg="CreateContainer within sandbox \"838ee25de56ddfdf30378fee4657cadc3b3ab476ec588257efad7ec0de087004\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"5620075c51784b69a74b422b2ee529ebe78a6e79c51d5076b28ae399d48a5993\"" Feb 13 12:55:32.282929 env[1734]: time="2024-02-13T12:55:32.282874211Z" level=info msg="StartContainer for \"5620075c51784b69a74b422b2ee529ebe78a6e79c51d5076b28ae399d48a5993\"" Feb 13 12:55:32.342551 systemd[1]: Started cri-containerd-5620075c51784b69a74b422b2ee529ebe78a6e79c51d5076b28ae399d48a5993.scope. Feb 13 12:55:32.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.405000 audit: BPF prog-id=135 op=LOAD Feb 13 12:55:32.406000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.406000 audit[3659]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3501 pid=3659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:32.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536323030373563353137383462363961373462343232623265653532 Feb 13 12:55:32.406000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.406000 audit[3659]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3501 pid=3659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:32.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536323030373563353137383462363961373462343232623265653532 Feb 13 12:55:32.406000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.406000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.406000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.406000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.406000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.406000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.406000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.406000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.406000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.406000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.406000 audit: BPF prog-id=136 op=LOAD Feb 13 12:55:32.406000 audit[3659]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3501 pid=3659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:32.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536323030373563353137383462363961373462343232623265653532 Feb 13 12:55:32.407000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.407000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.407000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.407000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.407000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.407000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.407000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.407000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.407000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.407000 audit: BPF prog-id=137 op=LOAD Feb 13 12:55:32.407000 audit[3659]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3501 pid=3659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:32.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536323030373563353137383462363961373462343232623265653532 Feb 13 12:55:32.407000 audit: BPF prog-id=137 op=UNLOAD Feb 13 12:55:32.407000 audit: BPF prog-id=136 op=UNLOAD Feb 13 12:55:32.407000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.407000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.407000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.407000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.407000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.407000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.407000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.407000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.407000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.407000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:32.407000 audit: BPF prog-id=138 op=LOAD Feb 13 12:55:32.407000 audit[3659]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3501 pid=3659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:32.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536323030373563353137383462363961373462343232623265653532 Feb 13 12:55:32.471324 env[1734]: time="2024-02-13T12:55:32.471161742Z" level=info msg="StartContainer for \"5620075c51784b69a74b422b2ee529ebe78a6e79c51d5076b28ae399d48a5993\" returns successfully" Feb 13 12:55:32.677460 kubelet[3074]: E0213 12:55:32.677380 3074 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jv8nx" podUID=f202d5b3-f8a1-45a5-a109-2d38cf1ff107 Feb 13 12:55:32.841124 kubelet[3074]: E0213 12:55:32.840980 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.841124 kubelet[3074]: W0213 12:55:32.841017 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.841124 kubelet[3074]: E0213 12:55:32.841074 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.843280 kubelet[3074]: E0213 12:55:32.843235 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.843476 kubelet[3074]: W0213 12:55:32.843286 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.843476 kubelet[3074]: E0213 12:55:32.843321 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.843909 kubelet[3074]: E0213 12:55:32.843873 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.843909 kubelet[3074]: W0213 12:55:32.843902 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.844098 kubelet[3074]: E0213 12:55:32.843977 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.844630 kubelet[3074]: E0213 12:55:32.844589 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.844815 kubelet[3074]: W0213 12:55:32.844787 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.844978 kubelet[3074]: E0213 12:55:32.844931 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.847399 kubelet[3074]: E0213 12:55:32.847361 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.847592 kubelet[3074]: W0213 12:55:32.847564 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.847718 kubelet[3074]: E0213 12:55:32.847697 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.850122 kubelet[3074]: E0213 12:55:32.850085 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.850358 kubelet[3074]: W0213 12:55:32.850330 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.850486 kubelet[3074]: E0213 12:55:32.850465 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.851131 kubelet[3074]: E0213 12:55:32.851102 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.851322 kubelet[3074]: W0213 12:55:32.851291 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.851454 kubelet[3074]: E0213 12:55:32.851432 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.852046 kubelet[3074]: E0213 12:55:32.852017 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.852252 kubelet[3074]: W0213 12:55:32.852222 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.852385 kubelet[3074]: E0213 12:55:32.852364 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.854183 kubelet[3074]: E0213 12:55:32.854148 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.854380 kubelet[3074]: W0213 12:55:32.854351 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.854505 kubelet[3074]: E0213 12:55:32.854484 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.855124 kubelet[3074]: E0213 12:55:32.855096 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.855317 kubelet[3074]: W0213 12:55:32.855289 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.855444 kubelet[3074]: E0213 12:55:32.855423 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.856437 kubelet[3074]: E0213 12:55:32.856389 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.856652 kubelet[3074]: W0213 12:55:32.856620 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.856784 kubelet[3074]: E0213 12:55:32.856763 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.857361 kubelet[3074]: E0213 12:55:32.857333 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.857564 kubelet[3074]: W0213 12:55:32.857536 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.857690 kubelet[3074]: E0213 12:55:32.857669 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.880819 kubelet[3074]: E0213 12:55:32.880772 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.880819 kubelet[3074]: W0213 12:55:32.880809 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.881093 kubelet[3074]: E0213 12:55:32.880844 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.881457 kubelet[3074]: E0213 12:55:32.881417 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.881457 kubelet[3074]: W0213 12:55:32.881449 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.881646 kubelet[3074]: E0213 12:55:32.881491 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.882054 kubelet[3074]: E0213 12:55:32.882019 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.882054 kubelet[3074]: W0213 12:55:32.882047 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.882197 kubelet[3074]: E0213 12:55:32.882085 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.882736 kubelet[3074]: E0213 12:55:32.882694 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.882736 kubelet[3074]: W0213 12:55:32.882728 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.882960 kubelet[3074]: E0213 12:55:32.882773 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.883359 kubelet[3074]: E0213 12:55:32.883323 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.883359 kubelet[3074]: W0213 12:55:32.883352 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.883546 kubelet[3074]: E0213 12:55:32.883512 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.886171 kubelet[3074]: E0213 12:55:32.886115 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.886171 kubelet[3074]: W0213 12:55:32.886157 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.886482 kubelet[3074]: E0213 12:55:32.886456 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.886873 kubelet[3074]: E0213 12:55:32.886838 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.886873 kubelet[3074]: W0213 12:55:32.886866 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.887037 kubelet[3074]: E0213 12:55:32.886994 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.887400 kubelet[3074]: E0213 12:55:32.887366 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.887400 kubelet[3074]: W0213 12:55:32.887394 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.887593 kubelet[3074]: E0213 12:55:32.887508 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.887991 kubelet[3074]: E0213 12:55:32.887929 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.887991 kubelet[3074]: W0213 12:55:32.887988 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.888181 kubelet[3074]: E0213 12:55:32.888038 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.888523 kubelet[3074]: E0213 12:55:32.888477 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.888523 kubelet[3074]: W0213 12:55:32.888505 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.888709 kubelet[3074]: E0213 12:55:32.888631 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.889145 kubelet[3074]: E0213 12:55:32.889110 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.889145 kubelet[3074]: W0213 12:55:32.889142 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.889323 kubelet[3074]: E0213 12:55:32.889257 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.890223 kubelet[3074]: E0213 12:55:32.890180 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.890223 kubelet[3074]: W0213 12:55:32.890215 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.890431 kubelet[3074]: E0213 12:55:32.890338 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.891032 kubelet[3074]: E0213 12:55:32.890993 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.891032 kubelet[3074]: W0213 12:55:32.891024 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.891246 kubelet[3074]: E0213 12:55:32.891143 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.891845 kubelet[3074]: E0213 12:55:32.891807 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.891845 kubelet[3074]: W0213 12:55:32.891837 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.892095 kubelet[3074]: E0213 12:55:32.892020 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.894174 kubelet[3074]: E0213 12:55:32.894121 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.894174 kubelet[3074]: W0213 12:55:32.894162 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.894405 kubelet[3074]: E0213 12:55:32.894293 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.894778 kubelet[3074]: E0213 12:55:32.894739 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.894778 kubelet[3074]: W0213 12:55:32.894770 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.895022 kubelet[3074]: E0213 12:55:32.894895 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.895395 kubelet[3074]: E0213 12:55:32.895336 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.895395 kubelet[3074]: W0213 12:55:32.895366 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.895395 kubelet[3074]: E0213 12:55:32.895397 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:32.896468 kubelet[3074]: E0213 12:55:32.896423 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:32.896468 kubelet[3074]: W0213 12:55:32.896458 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:32.896729 kubelet[3074]: E0213 12:55:32.896510 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.234130 systemd[1]: run-containerd-runc-k8s.io-5620075c51784b69a74b422b2ee529ebe78a6e79c51d5076b28ae399d48a5993-runc.MHZ6gJ.mount: Deactivated successfully. Feb 13 12:55:33.797037 kubelet[3074]: I0213 12:55:33.795973 3074 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 13 12:55:33.864931 kubelet[3074]: E0213 12:55:33.864537 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.864931 kubelet[3074]: W0213 12:55:33.864569 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.864931 kubelet[3074]: E0213 12:55:33.864603 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.865649 kubelet[3074]: E0213 12:55:33.865312 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.865649 kubelet[3074]: W0213 12:55:33.865339 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.865649 kubelet[3074]: E0213 12:55:33.865370 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.866345 kubelet[3074]: E0213 12:55:33.865926 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.866345 kubelet[3074]: W0213 12:55:33.865991 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.866345 kubelet[3074]: E0213 12:55:33.866023 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.867048 kubelet[3074]: E0213 12:55:33.866685 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.867048 kubelet[3074]: W0213 12:55:33.866711 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.867048 kubelet[3074]: E0213 12:55:33.866742 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.867722 kubelet[3074]: E0213 12:55:33.867368 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.867722 kubelet[3074]: W0213 12:55:33.867392 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.867722 kubelet[3074]: E0213 12:55:33.867421 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.868468 kubelet[3074]: E0213 12:55:33.868053 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.868468 kubelet[3074]: W0213 12:55:33.868078 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.868468 kubelet[3074]: E0213 12:55:33.868106 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.869158 kubelet[3074]: E0213 12:55:33.868776 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.869158 kubelet[3074]: W0213 12:55:33.868801 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.869158 kubelet[3074]: E0213 12:55:33.868831 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.869681 kubelet[3074]: E0213 12:55:33.869494 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.869681 kubelet[3074]: W0213 12:55:33.869519 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.869681 kubelet[3074]: E0213 12:55:33.869549 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.870121 kubelet[3074]: E0213 12:55:33.870098 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.870436 kubelet[3074]: W0213 12:55:33.870248 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.870436 kubelet[3074]: E0213 12:55:33.870285 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.870801 kubelet[3074]: E0213 12:55:33.870780 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.870937 kubelet[3074]: W0213 12:55:33.870912 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.871136 kubelet[3074]: E0213 12:55:33.871114 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.871548 kubelet[3074]: E0213 12:55:33.871526 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.871695 kubelet[3074]: W0213 12:55:33.871671 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.871815 kubelet[3074]: E0213 12:55:33.871795 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.872257 kubelet[3074]: E0213 12:55:33.872235 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.872391 kubelet[3074]: W0213 12:55:33.872367 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.872511 kubelet[3074]: E0213 12:55:33.872490 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.889159 kubelet[3074]: E0213 12:55:33.889124 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.889391 kubelet[3074]: W0213 12:55:33.889361 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.889517 kubelet[3074]: E0213 12:55:33.889496 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.890099 kubelet[3074]: E0213 12:55:33.890076 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.890239 kubelet[3074]: W0213 12:55:33.890215 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.890372 kubelet[3074]: E0213 12:55:33.890351 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.890834 kubelet[3074]: E0213 12:55:33.890790 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.890996 kubelet[3074]: W0213 12:55:33.890823 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.890996 kubelet[3074]: E0213 12:55:33.890888 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.891456 kubelet[3074]: E0213 12:55:33.891426 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.891568 kubelet[3074]: W0213 12:55:33.891473 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.891568 kubelet[3074]: E0213 12:55:33.891519 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.892046 kubelet[3074]: E0213 12:55:33.892017 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.892177 kubelet[3074]: W0213 12:55:33.892044 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.892297 kubelet[3074]: E0213 12:55:33.892270 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.892721 kubelet[3074]: E0213 12:55:33.892673 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.892829 kubelet[3074]: W0213 12:55:33.892719 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.893008 kubelet[3074]: E0213 12:55:33.892923 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.893427 kubelet[3074]: E0213 12:55:33.893400 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.893562 kubelet[3074]: W0213 12:55:33.893426 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.893683 kubelet[3074]: E0213 12:55:33.893659 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.894064 kubelet[3074]: E0213 12:55:33.894037 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.894186 kubelet[3074]: W0213 12:55:33.894063 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.894300 kubelet[3074]: E0213 12:55:33.894277 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.894879 kubelet[3074]: E0213 12:55:33.894851 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.895022 kubelet[3074]: W0213 12:55:33.894879 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.895022 kubelet[3074]: E0213 12:55:33.894919 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.895434 kubelet[3074]: E0213 12:55:33.895406 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.895536 kubelet[3074]: W0213 12:55:33.895433 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.895651 kubelet[3074]: E0213 12:55:33.895628 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.896064 kubelet[3074]: E0213 12:55:33.896036 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.896262 kubelet[3074]: W0213 12:55:33.896063 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.896381 kubelet[3074]: E0213 12:55:33.896358 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.896731 kubelet[3074]: E0213 12:55:33.896705 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.896835 kubelet[3074]: W0213 12:55:33.896730 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.897019 kubelet[3074]: E0213 12:55:33.896927 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.897398 kubelet[3074]: E0213 12:55:33.897370 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.897513 kubelet[3074]: W0213 12:55:33.897398 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.897513 kubelet[3074]: E0213 12:55:33.897473 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.897940 kubelet[3074]: E0213 12:55:33.897913 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.897940 kubelet[3074]: W0213 12:55:33.897939 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.898228 kubelet[3074]: E0213 12:55:33.898204 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.899154 kubelet[3074]: E0213 12:55:33.899117 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.899154 kubelet[3074]: W0213 12:55:33.899150 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.899361 kubelet[3074]: E0213 12:55:33.899270 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.900134 kubelet[3074]: E0213 12:55:33.900103 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.900242 kubelet[3074]: W0213 12:55:33.900132 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.900242 kubelet[3074]: E0213 12:55:33.900178 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.900766 kubelet[3074]: E0213 12:55:33.900743 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.900908 kubelet[3074]: W0213 12:55:33.900883 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.901098 kubelet[3074]: E0213 12:55:33.901077 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:33.901508 kubelet[3074]: E0213 12:55:33.901487 3074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 12:55:33.901634 kubelet[3074]: W0213 12:55:33.901609 3074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 12:55:33.901749 kubelet[3074]: E0213 12:55:33.901729 3074 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 12:55:34.033167 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2209804819.mount: Deactivated successfully. Feb 13 12:55:34.201104 env[1734]: time="2024-02-13T12:55:34.200738118Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:55:34.204812 env[1734]: time="2024-02-13T12:55:34.204740641Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:55:34.208790 env[1734]: time="2024-02-13T12:55:34.208705951Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:55:34.212156 env[1734]: time="2024-02-13T12:55:34.212083971Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:55:34.213531 env[1734]: time="2024-02-13T12:55:34.213440107Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 13 12:55:34.226500 env[1734]: time="2024-02-13T12:55:34.225974219Z" level=info msg="CreateContainer within sandbox \"eac3312514ac116b37b1234968e35d80a22167f47fb4c79b71d6f189266477ae\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 13 12:55:34.265355 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1256222130.mount: Deactivated successfully. Feb 13 12:55:34.272436 env[1734]: time="2024-02-13T12:55:34.272353954Z" level=info msg="CreateContainer within sandbox \"eac3312514ac116b37b1234968e35d80a22167f47fb4c79b71d6f189266477ae\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"3121c6e7a8441601b03d31ee50c6b43d8e5c10234b8f5eb3d20f4a223606eba0\"" Feb 13 12:55:34.273507 env[1734]: time="2024-02-13T12:55:34.273430198Z" level=info msg="StartContainer for \"3121c6e7a8441601b03d31ee50c6b43d8e5c10234b8f5eb3d20f4a223606eba0\"" Feb 13 12:55:34.326315 systemd[1]: Started cri-containerd-3121c6e7a8441601b03d31ee50c6b43d8e5c10234b8f5eb3d20f4a223606eba0.scope. Feb 13 12:55:34.388752 kernel: kauditd_printk_skb: 179 callbacks suppressed Feb 13 12:55:34.388871 kernel: audit: type=1400 audit(1707828934.377:1150): avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.377000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.377000 audit[3760]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3589 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:34.401893 kernel: audit: type=1300 audit(1707828934.377:1150): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3589 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:34.419772 kernel: audit: type=1327 audit(1707828934.377:1150): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331323163366537613834343136303162303364333165653530633662 Feb 13 12:55:34.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331323163366537613834343136303162303364333165653530633662 Feb 13 12:55:34.377000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.435291 kernel: audit: type=1400 audit(1707828934.377:1151): avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.377000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.444346 kernel: audit: type=1400 audit(1707828934.377:1151): avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.377000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.452831 kernel: audit: type=1400 audit(1707828934.377:1151): avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.453035 env[1734]: time="2024-02-13T12:55:34.451679612Z" level=info msg="StartContainer for \"3121c6e7a8441601b03d31ee50c6b43d8e5c10234b8f5eb3d20f4a223606eba0\" returns successfully" Feb 13 12:55:34.377000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.462456 kernel: audit: type=1400 audit(1707828934.377:1151): avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.377000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.377000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.478351 kernel: audit: type=1400 audit(1707828934.377:1151): avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.478452 kernel: audit: type=1400 audit(1707828934.377:1151): avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.377000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.486360 kernel: audit: type=1400 audit(1707828934.377:1151): avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.377000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.377000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.377000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.377000 audit: BPF prog-id=139 op=LOAD Feb 13 12:55:34.377000 audit[3760]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=3589 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:34.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331323163366537613834343136303162303364333165653530633662 Feb 13 12:55:34.377000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.377000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.377000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.377000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.377000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.377000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.377000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.377000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.377000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.377000 audit: BPF prog-id=140 op=LOAD Feb 13 12:55:34.377000 audit[3760]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=3589 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:34.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331323163366537613834343136303162303364333165653530633662 Feb 13 12:55:34.377000 audit: BPF prog-id=140 op=UNLOAD Feb 13 12:55:34.378000 audit: BPF prog-id=139 op=UNLOAD Feb 13 12:55:34.378000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.378000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.378000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.378000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.378000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.378000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.378000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.378000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.378000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.378000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:34.378000 audit: BPF prog-id=141 op=LOAD Feb 13 12:55:34.378000 audit[3760]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=3589 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:34.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331323163366537613834343136303162303364333165653530633662 Feb 13 12:55:34.532606 systemd[1]: cri-containerd-3121c6e7a8441601b03d31ee50c6b43d8e5c10234b8f5eb3d20f4a223606eba0.scope: Deactivated successfully. Feb 13 12:55:34.537000 audit: BPF prog-id=141 op=UNLOAD Feb 13 12:55:34.586991 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3121c6e7a8441601b03d31ee50c6b43d8e5c10234b8f5eb3d20f4a223606eba0-rootfs.mount: Deactivated successfully. Feb 13 12:55:34.677338 kubelet[3074]: E0213 12:55:34.677279 3074 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jv8nx" podUID=f202d5b3-f8a1-45a5-a109-2d38cf1ff107 Feb 13 12:55:34.837990 kubelet[3074]: I0213 12:55:34.837811 3074 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-9b555c754-45r2g" podStartSLOduration=-9.223372030017021e+09 pod.CreationTimestamp="2024-02-13 12:55:28 +0000 UTC" firstStartedPulling="2024-02-13 12:55:29.167468781 +0000 UTC m=+24.069241099" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 12:55:32.814696319 +0000 UTC m=+27.716468661" watchObservedRunningTime="2024-02-13 12:55:34.837754873 +0000 UTC m=+29.739527227" Feb 13 12:55:35.108535 env[1734]: time="2024-02-13T12:55:35.108373333Z" level=info msg="shim disconnected" id=3121c6e7a8441601b03d31ee50c6b43d8e5c10234b8f5eb3d20f4a223606eba0 Feb 13 12:55:35.108535 env[1734]: time="2024-02-13T12:55:35.108441772Z" level=warning msg="cleaning up after shim disconnected" id=3121c6e7a8441601b03d31ee50c6b43d8e5c10234b8f5eb3d20f4a223606eba0 namespace=k8s.io Feb 13 12:55:35.108535 env[1734]: time="2024-02-13T12:55:35.108464034Z" level=info msg="cleaning up dead shim" Feb 13 12:55:35.124540 env[1734]: time="2024-02-13T12:55:35.124463794Z" level=warning msg="cleanup warnings time=\"2024-02-13T12:55:35Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3804 runtime=io.containerd.runc.v2\n" Feb 13 12:55:35.807868 env[1734]: time="2024-02-13T12:55:35.807799886Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 13 12:55:36.677298 kubelet[3074]: E0213 12:55:36.677237 3074 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jv8nx" podUID=f202d5b3-f8a1-45a5-a109-2d38cf1ff107 Feb 13 12:55:37.227990 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1873085739.mount: Deactivated successfully. Feb 13 12:55:38.677385 kubelet[3074]: E0213 12:55:38.677337 3074 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jv8nx" podUID=f202d5b3-f8a1-45a5-a109-2d38cf1ff107 Feb 13 12:55:40.676416 kubelet[3074]: E0213 12:55:40.676352 3074 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jv8nx" podUID=f202d5b3-f8a1-45a5-a109-2d38cf1ff107 Feb 13 12:55:42.065424 env[1734]: time="2024-02-13T12:55:42.065356493Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:55:42.069974 env[1734]: time="2024-02-13T12:55:42.069895962Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:55:42.072360 env[1734]: time="2024-02-13T12:55:42.072300307Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:55:42.074815 env[1734]: time="2024-02-13T12:55:42.074767403Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:55:42.075745 env[1734]: time="2024-02-13T12:55:42.075702502Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 13 12:55:42.082413 env[1734]: time="2024-02-13T12:55:42.082358002Z" level=info msg="CreateContainer within sandbox \"eac3312514ac116b37b1234968e35d80a22167f47fb4c79b71d6f189266477ae\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 13 12:55:42.114774 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3990461064.mount: Deactivated successfully. Feb 13 12:55:42.122573 env[1734]: time="2024-02-13T12:55:42.122511247Z" level=info msg="CreateContainer within sandbox \"eac3312514ac116b37b1234968e35d80a22167f47fb4c79b71d6f189266477ae\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"0567074ca6446fb0099c2efd44ce4f2989fe7be8ce0a4fa46886984ed7c7f0bc\"" Feb 13 12:55:42.123861 env[1734]: time="2024-02-13T12:55:42.123807553Z" level=info msg="StartContainer for \"0567074ca6446fb0099c2efd44ce4f2989fe7be8ce0a4fa46886984ed7c7f0bc\"" Feb 13 12:55:42.173005 systemd[1]: Started cri-containerd-0567074ca6446fb0099c2efd44ce4f2989fe7be8ce0a4fa46886984ed7c7f0bc.scope. Feb 13 12:55:42.221000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.224596 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 13 12:55:42.224690 kernel: audit: type=1400 audit(1707828942.221:1157): avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.221000 audit[3825]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3589 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:42.246608 kernel: audit: type=1300 audit(1707828942.221:1157): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3589 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:42.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035363730373463613634343666623030393963326566643434636534 Feb 13 12:55:42.257289 kernel: audit: type=1327 audit(1707828942.221:1157): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035363730373463613634343666623030393963326566643434636534 Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.267259 kernel: audit: type=1400 audit(1707828942.231:1158): avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.275276 kernel: audit: type=1400 audit(1707828942.231:1158): avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.283395 kernel: audit: type=1400 audit(1707828942.231:1158): avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.291996 kernel: audit: type=1400 audit(1707828942.231:1158): avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.300704 kernel: audit: type=1400 audit(1707828942.231:1158): avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.300872 kernel: audit: type=1400 audit(1707828942.231:1158): avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.308566 env[1734]: time="2024-02-13T12:55:42.308485239Z" level=info msg="StartContainer for \"0567074ca6446fb0099c2efd44ce4f2989fe7be8ce0a4fa46886984ed7c7f0bc\" returns successfully" Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.316190 kernel: audit: type=1400 audit(1707828942.231:1158): avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit: BPF prog-id=142 op=LOAD Feb 13 12:55:42.231000 audit[3825]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3589 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:42.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035363730373463613634343666623030393963326566643434636534 Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit: BPF prog-id=143 op=LOAD Feb 13 12:55:42.231000 audit[3825]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3589 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:42.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035363730373463613634343666623030393963326566643434636534 Feb 13 12:55:42.231000 audit: BPF prog-id=143 op=UNLOAD Feb 13 12:55:42.231000 audit: BPF prog-id=142 op=UNLOAD Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:42.231000 audit: BPF prog-id=144 op=LOAD Feb 13 12:55:42.231000 audit[3825]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3589 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:42.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035363730373463613634343666623030393963326566643434636534 Feb 13 12:55:42.677249 kubelet[3074]: E0213 12:55:42.677086 3074 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jv8nx" podUID=f202d5b3-f8a1-45a5-a109-2d38cf1ff107 Feb 13 12:55:43.473164 env[1734]: time="2024-02-13T12:55:43.473072750Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 13 12:55:43.477767 kubelet[3074]: I0213 12:55:43.477733 3074 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 13 12:55:43.484997 systemd[1]: cri-containerd-0567074ca6446fb0099c2efd44ce4f2989fe7be8ce0a4fa46886984ed7c7f0bc.scope: Deactivated successfully. Feb 13 12:55:43.488000 audit: BPF prog-id=144 op=UNLOAD Feb 13 12:55:43.533451 kubelet[3074]: I0213 12:55:43.532133 3074 topology_manager.go:210] "Topology Admit Handler" Feb 13 12:55:43.553616 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0567074ca6446fb0099c2efd44ce4f2989fe7be8ce0a4fa46886984ed7c7f0bc-rootfs.mount: Deactivated successfully. Feb 13 12:55:43.554750 kubelet[3074]: I0213 12:55:43.554706 3074 topology_manager.go:210] "Topology Admit Handler" Feb 13 12:55:43.556753 systemd[1]: Created slice kubepods-burstable-podc08d9a76_a82d_4c00_8820_2e1b9426d7d6.slice. Feb 13 12:55:43.574844 systemd[1]: Created slice kubepods-burstable-pod746068bd_2374_4d72_801d_12cadc04a979.slice. Feb 13 12:55:43.576549 kubelet[3074]: I0213 12:55:43.575587 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/c08d9a76-a82d-4c00-8820-2e1b9426d7d6-config-volume\") pod \"coredns-787d4945fb-f8r2l\" (UID: \"c08d9a76-a82d-4c00-8820-2e1b9426d7d6\") " pod="kube-system/coredns-787d4945fb-f8r2l" Feb 13 12:55:43.576549 kubelet[3074]: I0213 12:55:43.575681 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kdffr\" (UniqueName: \"kubernetes.io/projected/c08d9a76-a82d-4c00-8820-2e1b9426d7d6-kube-api-access-kdffr\") pod \"coredns-787d4945fb-f8r2l\" (UID: \"c08d9a76-a82d-4c00-8820-2e1b9426d7d6\") " pod="kube-system/coredns-787d4945fb-f8r2l" Feb 13 12:55:43.579462 kubelet[3074]: I0213 12:55:43.579049 3074 topology_manager.go:210] "Topology Admit Handler" Feb 13 12:55:43.597350 systemd[1]: Created slice kubepods-besteffort-pod081a0ef1_5542_49e3_9722_6bef7e5d16e8.slice. Feb 13 12:55:43.676380 kubelet[3074]: I0213 12:55:43.676323 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5b9h8\" (UniqueName: \"kubernetes.io/projected/081a0ef1-5542-49e3-9722-6bef7e5d16e8-kube-api-access-5b9h8\") pod \"calico-kube-controllers-59fd566959-qljwd\" (UID: \"081a0ef1-5542-49e3-9722-6bef7e5d16e8\") " pod="calico-system/calico-kube-controllers-59fd566959-qljwd" Feb 13 12:55:43.676698 kubelet[3074]: I0213 12:55:43.676403 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lh52n\" (UniqueName: \"kubernetes.io/projected/746068bd-2374-4d72-801d-12cadc04a979-kube-api-access-lh52n\") pod \"coredns-787d4945fb-zgh7h\" (UID: \"746068bd-2374-4d72-801d-12cadc04a979\") " pod="kube-system/coredns-787d4945fb-zgh7h" Feb 13 12:55:43.676698 kubelet[3074]: I0213 12:55:43.676480 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/081a0ef1-5542-49e3-9722-6bef7e5d16e8-tigera-ca-bundle\") pod \"calico-kube-controllers-59fd566959-qljwd\" (UID: \"081a0ef1-5542-49e3-9722-6bef7e5d16e8\") " pod="calico-system/calico-kube-controllers-59fd566959-qljwd" Feb 13 12:55:43.676698 kubelet[3074]: I0213 12:55:43.676558 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/746068bd-2374-4d72-801d-12cadc04a979-config-volume\") pod \"coredns-787d4945fb-zgh7h\" (UID: \"746068bd-2374-4d72-801d-12cadc04a979\") " pod="kube-system/coredns-787d4945fb-zgh7h" Feb 13 12:55:43.801899 kubelet[3074]: I0213 12:55:43.798272 3074 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 13 12:55:43.871159 env[1734]: time="2024-02-13T12:55:43.871093577Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-f8r2l,Uid:c08d9a76-a82d-4c00-8820-2e1b9426d7d6,Namespace:kube-system,Attempt:0,}" Feb 13 12:55:43.890151 env[1734]: time="2024-02-13T12:55:43.890083901Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-zgh7h,Uid:746068bd-2374-4d72-801d-12cadc04a979,Namespace:kube-system,Attempt:0,}" Feb 13 12:55:43.904596 env[1734]: time="2024-02-13T12:55:43.904518546Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-59fd566959-qljwd,Uid:081a0ef1-5542-49e3-9722-6bef7e5d16e8,Namespace:calico-system,Attempt:0,}" Feb 13 12:55:44.042000 audit[3900]: NETFILTER_CFG table=filter:109 family=2 entries=13 op=nft_register_rule pid=3900 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:55:44.042000 audit[3900]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=ffffcf177a30 a2=0 a3=ffff9f8936c0 items=0 ppid=3261 pid=3900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:44.042000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:55:44.045000 audit[3900]: NETFILTER_CFG table=nat:110 family=2 entries=27 op=nft_register_chain pid=3900 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:55:44.045000 audit[3900]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8836 a0=3 a1=ffffcf177a30 a2=0 a3=ffff9f8936c0 items=0 ppid=3261 pid=3900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:44.045000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:55:44.525117 env[1734]: time="2024-02-13T12:55:44.525054502Z" level=info msg="shim disconnected" id=0567074ca6446fb0099c2efd44ce4f2989fe7be8ce0a4fa46886984ed7c7f0bc Feb 13 12:55:44.525828 env[1734]: time="2024-02-13T12:55:44.525789719Z" level=warning msg="cleaning up after shim disconnected" id=0567074ca6446fb0099c2efd44ce4f2989fe7be8ce0a4fa46886984ed7c7f0bc namespace=k8s.io Feb 13 12:55:44.526074 env[1734]: time="2024-02-13T12:55:44.526043879Z" level=info msg="cleaning up dead shim" Feb 13 12:55:44.571067 env[1734]: time="2024-02-13T12:55:44.571012240Z" level=warning msg="cleanup warnings time=\"2024-02-13T12:55:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3901 runtime=io.containerd.runc.v2\n" Feb 13 12:55:44.686665 systemd[1]: Created slice kubepods-besteffort-podf202d5b3_f8a1_45a5_a109_2d38cf1ff107.slice. Feb 13 12:55:44.693331 env[1734]: time="2024-02-13T12:55:44.693268335Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jv8nx,Uid:f202d5b3-f8a1-45a5-a109-2d38cf1ff107,Namespace:calico-system,Attempt:0,}" Feb 13 12:55:44.793730 env[1734]: time="2024-02-13T12:55:44.793529203Z" level=error msg="Failed to destroy network for sandbox \"eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 12:55:44.802158 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3-shm.mount: Deactivated successfully. Feb 13 12:55:44.803764 env[1734]: time="2024-02-13T12:55:44.803664760Z" level=error msg="encountered an error cleaning up failed sandbox \"eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 12:55:44.803984 env[1734]: time="2024-02-13T12:55:44.803783710Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-59fd566959-qljwd,Uid:081a0ef1-5542-49e3-9722-6bef7e5d16e8,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 12:55:44.804398 kubelet[3074]: E0213 12:55:44.804330 3074 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 12:55:44.804976 kubelet[3074]: E0213 12:55:44.804468 3074 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-59fd566959-qljwd" Feb 13 12:55:44.804976 kubelet[3074]: E0213 12:55:44.804533 3074 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-59fd566959-qljwd" Feb 13 12:55:44.804976 kubelet[3074]: E0213 12:55:44.804654 3074 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-59fd566959-qljwd_calico-system(081a0ef1-5542-49e3-9722-6bef7e5d16e8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-59fd566959-qljwd_calico-system(081a0ef1-5542-49e3-9722-6bef7e5d16e8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-59fd566959-qljwd" podUID=081a0ef1-5542-49e3-9722-6bef7e5d16e8 Feb 13 12:55:44.814327 env[1734]: time="2024-02-13T12:55:44.814254516Z" level=error msg="Failed to destroy network for sandbox \"681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 12:55:44.815510 env[1734]: time="2024-02-13T12:55:44.815444975Z" level=error msg="encountered an error cleaning up failed sandbox \"681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 12:55:44.815796 env[1734]: time="2024-02-13T12:55:44.815728621Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-f8r2l,Uid:c08d9a76-a82d-4c00-8820-2e1b9426d7d6,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 12:55:44.818083 kubelet[3074]: E0213 12:55:44.816287 3074 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 12:55:44.818083 kubelet[3074]: E0213 12:55:44.816360 3074 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-f8r2l" Feb 13 12:55:44.818083 kubelet[3074]: E0213 12:55:44.816400 3074 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-f8r2l" Feb 13 12:55:44.818388 kubelet[3074]: E0213 12:55:44.816472 3074 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-f8r2l_kube-system(c08d9a76-a82d-4c00-8820-2e1b9426d7d6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-f8r2l_kube-system(c08d9a76-a82d-4c00-8820-2e1b9426d7d6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-f8r2l" podUID=c08d9a76-a82d-4c00-8820-2e1b9426d7d6 Feb 13 12:55:44.818273 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e-shm.mount: Deactivated successfully. Feb 13 12:55:44.848548 env[1734]: time="2024-02-13T12:55:44.848485825Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 13 12:55:44.849842 kubelet[3074]: I0213 12:55:44.849806 3074 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" Feb 13 12:55:44.858595 env[1734]: time="2024-02-13T12:55:44.858520277Z" level=info msg="StopPodSandbox for \"eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3\"" Feb 13 12:55:44.868499 kubelet[3074]: I0213 12:55:44.863139 3074 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" Feb 13 12:55:44.868707 env[1734]: time="2024-02-13T12:55:44.864709464Z" level=info msg="StopPodSandbox for \"681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e\"" Feb 13 12:55:44.874014 env[1734]: time="2024-02-13T12:55:44.873912515Z" level=error msg="Failed to destroy network for sandbox \"7762061072217d63d09dc652c32102557758496730844678805468e604e286fb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 12:55:44.875044 env[1734]: time="2024-02-13T12:55:44.874973067Z" level=error msg="encountered an error cleaning up failed sandbox \"7762061072217d63d09dc652c32102557758496730844678805468e604e286fb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 12:55:44.875312 env[1734]: time="2024-02-13T12:55:44.875252381Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-zgh7h,Uid:746068bd-2374-4d72-801d-12cadc04a979,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7762061072217d63d09dc652c32102557758496730844678805468e604e286fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 12:55:44.875918 kubelet[3074]: E0213 12:55:44.875869 3074 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7762061072217d63d09dc652c32102557758496730844678805468e604e286fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 12:55:44.876093 kubelet[3074]: E0213 12:55:44.876029 3074 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7762061072217d63d09dc652c32102557758496730844678805468e604e286fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-zgh7h" Feb 13 12:55:44.876170 kubelet[3074]: E0213 12:55:44.876070 3074 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7762061072217d63d09dc652c32102557758496730844678805468e604e286fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-zgh7h" Feb 13 12:55:44.876242 kubelet[3074]: E0213 12:55:44.876225 3074 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-zgh7h_kube-system(746068bd-2374-4d72-801d-12cadc04a979)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-zgh7h_kube-system(746068bd-2374-4d72-801d-12cadc04a979)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7762061072217d63d09dc652c32102557758496730844678805468e604e286fb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-zgh7h" podUID=746068bd-2374-4d72-801d-12cadc04a979 Feb 13 12:55:44.945643 env[1734]: time="2024-02-13T12:55:44.945550682Z" level=error msg="Failed to destroy network for sandbox \"cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 12:55:44.946365 env[1734]: time="2024-02-13T12:55:44.946298331Z" level=error msg="encountered an error cleaning up failed sandbox \"cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 12:55:44.946474 env[1734]: time="2024-02-13T12:55:44.946388684Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jv8nx,Uid:f202d5b3-f8a1-45a5-a109-2d38cf1ff107,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 12:55:44.946785 kubelet[3074]: E0213 12:55:44.946750 3074 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 12:55:44.946926 kubelet[3074]: E0213 12:55:44.946852 3074 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-jv8nx" Feb 13 12:55:44.946926 kubelet[3074]: E0213 12:55:44.946913 3074 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-jv8nx" Feb 13 12:55:44.947118 kubelet[3074]: E0213 12:55:44.947035 3074 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-jv8nx_calico-system(f202d5b3-f8a1-45a5-a109-2d38cf1ff107)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-jv8nx_calico-system(f202d5b3-f8a1-45a5-a109-2d38cf1ff107)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-jv8nx" podUID=f202d5b3-f8a1-45a5-a109-2d38cf1ff107 Feb 13 12:55:44.978095 env[1734]: time="2024-02-13T12:55:44.978007476Z" level=error msg="StopPodSandbox for \"eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3\" failed" error="failed to destroy network for sandbox \"eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 12:55:44.978513 kubelet[3074]: E0213 12:55:44.978469 3074 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" Feb 13 12:55:44.978633 kubelet[3074]: E0213 12:55:44.978576 3074 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3} Feb 13 12:55:44.978836 kubelet[3074]: E0213 12:55:44.978663 3074 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"081a0ef1-5542-49e3-9722-6bef7e5d16e8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 12:55:44.978836 kubelet[3074]: E0213 12:55:44.978758 3074 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"081a0ef1-5542-49e3-9722-6bef7e5d16e8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-59fd566959-qljwd" podUID=081a0ef1-5542-49e3-9722-6bef7e5d16e8 Feb 13 12:55:44.991093 env[1734]: time="2024-02-13T12:55:44.990942400Z" level=error msg="StopPodSandbox for \"681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e\" failed" error="failed to destroy network for sandbox \"681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 12:55:44.991690 kubelet[3074]: E0213 12:55:44.991640 3074 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" Feb 13 12:55:44.991825 kubelet[3074]: E0213 12:55:44.991728 3074 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e} Feb 13 12:55:44.991825 kubelet[3074]: E0213 12:55:44.991816 3074 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c08d9a76-a82d-4c00-8820-2e1b9426d7d6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 12:55:44.992056 kubelet[3074]: E0213 12:55:44.991870 3074 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c08d9a76-a82d-4c00-8820-2e1b9426d7d6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-f8r2l" podUID=c08d9a76-a82d-4c00-8820-2e1b9426d7d6 Feb 13 12:55:45.553590 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da-shm.mount: Deactivated successfully. Feb 13 12:55:45.553782 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7762061072217d63d09dc652c32102557758496730844678805468e604e286fb-shm.mount: Deactivated successfully. Feb 13 12:55:45.866483 kubelet[3074]: I0213 12:55:45.866353 3074 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" Feb 13 12:55:45.870445 env[1734]: time="2024-02-13T12:55:45.867915736Z" level=info msg="StopPodSandbox for \"7762061072217d63d09dc652c32102557758496730844678805468e604e286fb\"" Feb 13 12:55:45.874824 kubelet[3074]: I0213 12:55:45.873901 3074 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" Feb 13 12:55:45.876607 env[1734]: time="2024-02-13T12:55:45.876554647Z" level=info msg="StopPodSandbox for \"cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da\"" Feb 13 12:55:45.926239 env[1734]: time="2024-02-13T12:55:45.926157939Z" level=error msg="StopPodSandbox for \"7762061072217d63d09dc652c32102557758496730844678805468e604e286fb\" failed" error="failed to destroy network for sandbox \"7762061072217d63d09dc652c32102557758496730844678805468e604e286fb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 12:55:45.926603 kubelet[3074]: E0213 12:55:45.926558 3074 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7762061072217d63d09dc652c32102557758496730844678805468e604e286fb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" Feb 13 12:55:45.926713 kubelet[3074]: E0213 12:55:45.926648 3074 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:7762061072217d63d09dc652c32102557758496730844678805468e604e286fb} Feb 13 12:55:45.926777 kubelet[3074]: E0213 12:55:45.926738 3074 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"746068bd-2374-4d72-801d-12cadc04a979\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7762061072217d63d09dc652c32102557758496730844678805468e604e286fb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 12:55:45.926903 kubelet[3074]: E0213 12:55:45.926817 3074 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"746068bd-2374-4d72-801d-12cadc04a979\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7762061072217d63d09dc652c32102557758496730844678805468e604e286fb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-zgh7h" podUID=746068bd-2374-4d72-801d-12cadc04a979 Feb 13 12:55:45.941771 env[1734]: time="2024-02-13T12:55:45.941691309Z" level=error msg="StopPodSandbox for \"cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da\" failed" error="failed to destroy network for sandbox \"cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 12:55:45.942129 kubelet[3074]: E0213 12:55:45.942083 3074 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" Feb 13 12:55:45.942225 kubelet[3074]: E0213 12:55:45.942174 3074 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da} Feb 13 12:55:45.942304 kubelet[3074]: E0213 12:55:45.942259 3074 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f202d5b3-f8a1-45a5-a109-2d38cf1ff107\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 12:55:45.942421 kubelet[3074]: E0213 12:55:45.942339 3074 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f202d5b3-f8a1-45a5-a109-2d38cf1ff107\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-jv8nx" podUID=f202d5b3-f8a1-45a5-a109-2d38cf1ff107 Feb 13 12:55:55.025868 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1198108733.mount: Deactivated successfully. Feb 13 12:55:55.280198 env[1734]: time="2024-02-13T12:55:55.280016881Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:55:55.294261 env[1734]: time="2024-02-13T12:55:55.294194208Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:55:55.298024 env[1734]: time="2024-02-13T12:55:55.297971246Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:55:55.306085 env[1734]: time="2024-02-13T12:55:55.306032581Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:55:55.307078 env[1734]: time="2024-02-13T12:55:55.307023078Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 13 12:55:55.344873 env[1734]: time="2024-02-13T12:55:55.344776772Z" level=info msg="CreateContainer within sandbox \"eac3312514ac116b37b1234968e35d80a22167f47fb4c79b71d6f189266477ae\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 13 12:55:55.395773 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2635993445.mount: Deactivated successfully. Feb 13 12:55:55.404648 env[1734]: time="2024-02-13T12:55:55.404574711Z" level=info msg="CreateContainer within sandbox \"eac3312514ac116b37b1234968e35d80a22167f47fb4c79b71d6f189266477ae\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"4dce4cd2eb2595a3f68304f24173f0fa33f666f655025b1814a8c8522ada9f41\"" Feb 13 12:55:55.408195 env[1734]: time="2024-02-13T12:55:55.405913365Z" level=info msg="StartContainer for \"4dce4cd2eb2595a3f68304f24173f0fa33f666f655025b1814a8c8522ada9f41\"" Feb 13 12:55:55.443349 systemd[1]: Started cri-containerd-4dce4cd2eb2595a3f68304f24173f0fa33f666f655025b1814a8c8522ada9f41.scope. Feb 13 12:55:55.495000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.499237 kernel: kauditd_printk_skb: 40 callbacks suppressed Feb 13 12:55:55.499340 kernel: audit: type=1400 audit(1707828955.495:1166): avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.495000 audit[4126]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3589 pid=4126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:55.518860 kernel: audit: type=1300 audit(1707828955.495:1166): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3589 pid=4126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:55.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464636534636432656232353935613366363833303466323431373366 Feb 13 12:55:55.531141 kernel: audit: type=1327 audit(1707828955.495:1166): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464636534636432656232353935613366363833303466323431373366 Feb 13 12:55:55.499000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.540306 kernel: audit: type=1400 audit(1707828955.499:1167): avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.551999 kernel: audit: type=1400 audit(1707828955.499:1167): avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.499000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.499000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.499000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.569092 kernel: audit: type=1400 audit(1707828955.499:1167): avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.569277 kernel: audit: type=1400 audit(1707828955.499:1167): avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.499000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.578017 kernel: audit: type=1400 audit(1707828955.499:1167): avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.579147 kernel: audit: type=1400 audit(1707828955.499:1167): avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.499000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.499000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.595026 kernel: audit: type=1400 audit(1707828955.499:1167): avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.499000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.499000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.499000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.499000 audit: BPF prog-id=145 op=LOAD Feb 13 12:55:55.499000 audit[4126]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3589 pid=4126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:55.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464636534636432656232353935613366363833303466323431373366 Feb 13 12:55:55.505000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.505000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.505000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.505000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.505000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.505000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.505000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.505000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.505000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.505000 audit: BPF prog-id=146 op=LOAD Feb 13 12:55:55.505000 audit[4126]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3589 pid=4126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:55.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464636534636432656232353935613366363833303466323431373366 Feb 13 12:55:55.505000 audit: BPF prog-id=146 op=UNLOAD Feb 13 12:55:55.506000 audit: BPF prog-id=145 op=UNLOAD Feb 13 12:55:55.506000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.506000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.506000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.506000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.506000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.506000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.506000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.506000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.506000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.506000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:55.506000 audit: BPF prog-id=147 op=LOAD Feb 13 12:55:55.506000 audit[4126]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3589 pid=4126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:55.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464636534636432656232353935613366363833303466323431373366 Feb 13 12:55:55.598256 env[1734]: time="2024-02-13T12:55:55.596110982Z" level=info msg="StartContainer for \"4dce4cd2eb2595a3f68304f24173f0fa33f666f655025b1814a8c8522ada9f41\" returns successfully" Feb 13 12:55:55.732387 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 13 12:55:55.732540 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 13 12:55:55.981661 kubelet[3074]: I0213 12:55:55.981461 3074 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-9fgtq" podStartSLOduration=-9.223372008873545e+09 pod.CreationTimestamp="2024-02-13 12:55:28 +0000 UTC" firstStartedPulling="2024-02-13 12:55:29.514107955 +0000 UTC m=+24.415880273" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 12:55:55.97284782 +0000 UTC m=+50.874620174" watchObservedRunningTime="2024-02-13 12:55:55.98123144 +0000 UTC m=+50.883003770" Feb 13 12:55:57.526000 audit[4287]: AVC avc: denied { write } for pid=4287 comm="tee" name="fd" dev="proc" ino=22655 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 12:55:57.532000 audit[4282]: AVC avc: denied { write } for pid=4282 comm="tee" name="fd" dev="proc" ino=22659 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 12:55:57.532000 audit[4284]: AVC avc: denied { write } for pid=4284 comm="tee" name="fd" dev="proc" ino=22660 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 12:55:57.532000 audit[4284]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff640e971 a2=241 a3=1b6 items=1 ppid=4248 pid=4284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:57.532000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 13 12:55:57.532000 audit: PATH item=0 name="/dev/fd/63" inode=22210 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 12:55:57.532000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 12:55:57.532000 audit[4282]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdb182982 a2=241 a3=1b6 items=1 ppid=4239 pid=4282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:57.532000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 13 12:55:57.532000 audit: PATH item=0 name="/dev/fd/63" inode=22648 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 12:55:57.532000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 12:55:57.526000 audit[4287]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcfbc6981 a2=241 a3=1b6 items=1 ppid=4238 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:57.526000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 13 12:55:57.526000 audit: PATH item=0 name="/dev/fd/63" inode=22217 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 12:55:57.526000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 12:55:57.548000 audit[4295]: AVC avc: denied { write } for pid=4295 comm="tee" name="fd" dev="proc" ino=22235 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 12:55:57.548000 audit[4295]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdebb3981 a2=241 a3=1b6 items=1 ppid=4241 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:57.548000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 13 12:55:57.548000 audit: PATH item=0 name="/dev/fd/63" inode=22229 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 12:55:57.548000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 12:55:57.557000 audit[4297]: AVC avc: denied { write } for pid=4297 comm="tee" name="fd" dev="proc" ino=22239 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 12:55:57.557000 audit[4297]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd71c5972 a2=241 a3=1b6 items=1 ppid=4253 pid=4297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:57.557000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 13 12:55:57.557000 audit: PATH item=0 name="/dev/fd/63" inode=22656 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 12:55:57.565000 audit[4300]: AVC avc: denied { write } for pid=4300 comm="tee" name="fd" dev="proc" ino=22243 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 12:55:57.565000 audit[4300]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd3c70983 a2=241 a3=1b6 items=1 ppid=4243 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:57.565000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 13 12:55:57.557000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 12:55:57.584000 audit[4302]: AVC avc: denied { write } for pid=4302 comm="tee" name="fd" dev="proc" ino=22247 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 12:55:57.584000 audit[4302]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff1590981 a2=241 a3=1b6 items=1 ppid=4255 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:57.565000 audit: PATH item=0 name="/dev/fd/63" inode=22661 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 12:55:57.565000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 12:55:57.584000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 13 12:55:57.584000 audit: PATH item=0 name="/dev/fd/63" inode=22232 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 12:55:57.584000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 12:55:58.257216 (udev-worker)[4162]: Network interface NamePolicy= disabled on kernel command line. Feb 13 12:55:58.258504 (udev-worker)[4375]: Network interface NamePolicy= disabled on kernel command line. Feb 13 12:55:58.260000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.260000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.260000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.260000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.260000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.260000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.260000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.260000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.260000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.260000 audit: BPF prog-id=148 op=LOAD Feb 13 12:55:58.260000 audit[4378]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffb047ee8 a2=70 a3=0 items=0 ppid=4240 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:58.260000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 12:55:58.261000 audit: BPF prog-id=148 op=UNLOAD Feb 13 12:55:58.261000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.261000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.261000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.261000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.261000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.261000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.261000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.261000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.261000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.261000 audit: BPF prog-id=149 op=LOAD Feb 13 12:55:58.261000 audit[4378]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffb047ee8 a2=70 a3=4a174c items=0 ppid=4240 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:58.261000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 12:55:58.261000 audit: BPF prog-id=149 op=UNLOAD Feb 13 12:55:58.261000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.261000 audit[4378]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=fffffb047f18 a2=70 a3=eae873f items=0 ppid=4240 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:58.261000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 12:55:58.262000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.262000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.262000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.262000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.262000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.262000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.262000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.262000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.262000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.262000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.262000 audit: BPF prog-id=150 op=LOAD Feb 13 12:55:58.262000 audit[4378]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=fffffb047e68 a2=70 a3=eae8759 items=0 ppid=4240 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:58.262000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 12:55:58.274000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.274000 audit[4380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe1affc58 a2=70 a3=0 items=0 ppid=4240 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:58.274000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 13 12:55:58.274000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:58.274000 audit[4380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe1affb38 a2=70 a3=2 items=0 ppid=4240 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:58.274000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 13 12:55:58.281000 audit: BPF prog-id=150 op=UNLOAD Feb 13 12:55:58.281000 audit[1689]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=23 a0=ffffffffffffff9c a1=aaaaf6a20bb0 a2=80002 a3=0 items=1 ppid=1 pid=1689 auid=4294967295 uid=245 gid=245 euid=245 suid=245 fsuid=245 egid=245 sgid=245 fsgid=245 tty=(none) ses=4294967295 comm="systemd-resolve" exe="/usr/lib/systemd/systemd-resolved" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:58.281000 audit: CWD cwd="/" Feb 13 12:55:58.281000 audit: PATH item=0 name="/proc/thread-self/attr/fscreate" inode=10046 dev=00:30 mode=0100666 ouid=245 ogid=245 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 12:55:58.281000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-resolved" Feb 13 12:55:58.380000 audit[4402]: NETFILTER_CFG table=mangle:111 family=2 entries=19 op=nft_register_chain pid=4402 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 12:55:58.380000 audit[4402]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffdf5d25d0 a2=0 a3=ffffa9003fa8 items=0 ppid=4240 pid=4402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:58.380000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 12:55:58.389000 audit[4403]: NETFILTER_CFG table=nat:112 family=2 entries=16 op=nft_register_chain pid=4403 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 12:55:58.389000 audit[4403]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffc6f6dc50 a2=0 a3=ffff94844fa8 items=0 ppid=4240 pid=4403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:58.389000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 12:55:58.396000 audit[4404]: NETFILTER_CFG table=raw:113 family=2 entries=19 op=nft_register_chain pid=4404 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 12:55:58.396000 audit[4404]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffe806b3e0 a2=0 a3=ffffa6b89fa8 items=0 ppid=4240 pid=4404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:58.396000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 12:55:58.397000 audit[4405]: NETFILTER_CFG table=filter:114 family=2 entries=39 op=nft_register_chain pid=4405 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 12:55:58.397000 audit[4405]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=ffffc44f18d0 a2=0 a3=ffff8d1defa8 items=0 ppid=4240 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:58.397000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 12:55:58.683024 env[1734]: time="2024-02-13T12:55:58.679398343Z" level=info msg="StopPodSandbox for \"7762061072217d63d09dc652c32102557758496730844678805468e604e286fb\"" Feb 13 12:55:58.683024 env[1734]: time="2024-02-13T12:55:58.679396567Z" level=info msg="StopPodSandbox for \"cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da\"" Feb 13 12:55:58.684324 env[1734]: time="2024-02-13T12:55:58.684031676Z" level=info msg="StopPodSandbox for \"eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3\"" Feb 13 12:55:58.998203 env[1734]: 2024-02-13 12:55:58.830 [INFO][4447] k8s.go 578: Cleaning up netns ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" Feb 13 12:55:58.998203 env[1734]: 2024-02-13 12:55:58.830 [INFO][4447] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" iface="eth0" netns="/var/run/netns/cni-f0a2a445-8a58-5648-ec48-5832d2a19e79" Feb 13 12:55:58.998203 env[1734]: 2024-02-13 12:55:58.831 [INFO][4447] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" iface="eth0" netns="/var/run/netns/cni-f0a2a445-8a58-5648-ec48-5832d2a19e79" Feb 13 12:55:58.998203 env[1734]: 2024-02-13 12:55:58.832 [INFO][4447] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" iface="eth0" netns="/var/run/netns/cni-f0a2a445-8a58-5648-ec48-5832d2a19e79" Feb 13 12:55:58.998203 env[1734]: 2024-02-13 12:55:58.833 [INFO][4447] k8s.go 585: Releasing IP address(es) ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" Feb 13 12:55:58.998203 env[1734]: 2024-02-13 12:55:58.833 [INFO][4447] utils.go 188: Calico CNI releasing IP address ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" Feb 13 12:55:58.998203 env[1734]: 2024-02-13 12:55:58.942 [INFO][4471] ipam_plugin.go 415: Releasing address using handleID ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" HandleID="k8s-pod-network.7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" Workload="ip--172--31--23--232-k8s-coredns--787d4945fb--zgh7h-eth0" Feb 13 12:55:58.998203 env[1734]: 2024-02-13 12:55:58.942 [INFO][4471] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 12:55:58.998203 env[1734]: 2024-02-13 12:55:58.943 [INFO][4471] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 12:55:58.998203 env[1734]: 2024-02-13 12:55:58.963 [WARNING][4471] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" HandleID="k8s-pod-network.7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" Workload="ip--172--31--23--232-k8s-coredns--787d4945fb--zgh7h-eth0" Feb 13 12:55:58.998203 env[1734]: 2024-02-13 12:55:58.963 [INFO][4471] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" HandleID="k8s-pod-network.7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" Workload="ip--172--31--23--232-k8s-coredns--787d4945fb--zgh7h-eth0" Feb 13 12:55:58.998203 env[1734]: 2024-02-13 12:55:58.967 [INFO][4471] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 12:55:58.998203 env[1734]: 2024-02-13 12:55:58.983 [INFO][4447] k8s.go 591: Teardown processing complete. ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" Feb 13 12:55:58.998203 env[1734]: time="2024-02-13T12:55:58.987975642Z" level=info msg="TearDown network for sandbox \"7762061072217d63d09dc652c32102557758496730844678805468e604e286fb\" successfully" Feb 13 12:55:58.998203 env[1734]: time="2024-02-13T12:55:58.988021360Z" level=info msg="StopPodSandbox for \"7762061072217d63d09dc652c32102557758496730844678805468e604e286fb\" returns successfully" Feb 13 12:55:58.998203 env[1734]: time="2024-02-13T12:55:58.989320207Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-zgh7h,Uid:746068bd-2374-4d72-801d-12cadc04a979,Namespace:kube-system,Attempt:1,}" Feb 13 12:55:58.994850 systemd[1]: run-netns-cni\x2df0a2a445\x2d8a58\x2d5648\x2dec48\x2d5832d2a19e79.mount: Deactivated successfully. Feb 13 12:55:59.056521 systemd-networkd[1541]: vxlan.calico: Link UP Feb 13 12:55:59.056538 systemd-networkd[1541]: vxlan.calico: Gained carrier Feb 13 12:55:59.094681 env[1734]: 2024-02-13 12:55:58.889 [INFO][4459] k8s.go 578: Cleaning up netns ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" Feb 13 12:55:59.094681 env[1734]: 2024-02-13 12:55:58.890 [INFO][4459] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" iface="eth0" netns="/var/run/netns/cni-027df396-c76f-84be-d7dc-0ba7ce10454a" Feb 13 12:55:59.094681 env[1734]: 2024-02-13 12:55:58.890 [INFO][4459] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" iface="eth0" netns="/var/run/netns/cni-027df396-c76f-84be-d7dc-0ba7ce10454a" Feb 13 12:55:59.094681 env[1734]: 2024-02-13 12:55:58.890 [INFO][4459] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" iface="eth0" netns="/var/run/netns/cni-027df396-c76f-84be-d7dc-0ba7ce10454a" Feb 13 12:55:59.094681 env[1734]: 2024-02-13 12:55:58.891 [INFO][4459] k8s.go 585: Releasing IP address(es) ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" Feb 13 12:55:59.094681 env[1734]: 2024-02-13 12:55:58.891 [INFO][4459] utils.go 188: Calico CNI releasing IP address ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" Feb 13 12:55:59.094681 env[1734]: 2024-02-13 12:55:59.006 [INFO][4479] ipam_plugin.go 415: Releasing address using handleID ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" HandleID="k8s-pod-network.eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" Workload="ip--172--31--23--232-k8s-calico--kube--controllers--59fd566959--qljwd-eth0" Feb 13 12:55:59.094681 env[1734]: 2024-02-13 12:55:59.010 [INFO][4479] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 12:55:59.094681 env[1734]: 2024-02-13 12:55:59.010 [INFO][4479] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 12:55:59.094681 env[1734]: 2024-02-13 12:55:59.053 [WARNING][4479] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" HandleID="k8s-pod-network.eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" Workload="ip--172--31--23--232-k8s-calico--kube--controllers--59fd566959--qljwd-eth0" Feb 13 12:55:59.094681 env[1734]: 2024-02-13 12:55:59.053 [INFO][4479] ipam_plugin.go 443: Releasing address using workloadID ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" HandleID="k8s-pod-network.eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" Workload="ip--172--31--23--232-k8s-calico--kube--controllers--59fd566959--qljwd-eth0" Feb 13 12:55:59.094681 env[1734]: 2024-02-13 12:55:59.058 [INFO][4479] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 12:55:59.094681 env[1734]: 2024-02-13 12:55:59.085 [INFO][4459] k8s.go 591: Teardown processing complete. ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" Feb 13 12:55:59.100544 systemd[1]: run-netns-cni\x2d027df396\x2dc76f\x2d84be\x2dd7dc\x2d0ba7ce10454a.mount: Deactivated successfully. Feb 13 12:55:59.105908 env[1734]: time="2024-02-13T12:55:59.104675603Z" level=info msg="TearDown network for sandbox \"eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3\" successfully" Feb 13 12:55:59.105908 env[1734]: time="2024-02-13T12:55:59.104749725Z" level=info msg="StopPodSandbox for \"eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3\" returns successfully" Feb 13 12:55:59.107425 env[1734]: time="2024-02-13T12:55:59.107365243Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-59fd566959-qljwd,Uid:081a0ef1-5542-49e3-9722-6bef7e5d16e8,Namespace:calico-system,Attempt:1,}" Feb 13 12:55:59.115417 env[1734]: 2024-02-13 12:55:58.880 [INFO][4460] k8s.go 578: Cleaning up netns ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" Feb 13 12:55:59.115417 env[1734]: 2024-02-13 12:55:58.880 [INFO][4460] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" iface="eth0" netns="/var/run/netns/cni-b692252d-574b-26e7-0084-f31c74d2f6cf" Feb 13 12:55:59.115417 env[1734]: 2024-02-13 12:55:58.880 [INFO][4460] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" iface="eth0" netns="/var/run/netns/cni-b692252d-574b-26e7-0084-f31c74d2f6cf" Feb 13 12:55:59.115417 env[1734]: 2024-02-13 12:55:58.881 [INFO][4460] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" iface="eth0" netns="/var/run/netns/cni-b692252d-574b-26e7-0084-f31c74d2f6cf" Feb 13 12:55:59.115417 env[1734]: 2024-02-13 12:55:58.881 [INFO][4460] k8s.go 585: Releasing IP address(es) ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" Feb 13 12:55:59.115417 env[1734]: 2024-02-13 12:55:58.881 [INFO][4460] utils.go 188: Calico CNI releasing IP address ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" Feb 13 12:55:59.115417 env[1734]: 2024-02-13 12:55:59.003 [INFO][4478] ipam_plugin.go 415: Releasing address using handleID ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" HandleID="k8s-pod-network.cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" Workload="ip--172--31--23--232-k8s-csi--node--driver--jv8nx-eth0" Feb 13 12:55:59.115417 env[1734]: 2024-02-13 12:55:59.011 [INFO][4478] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 12:55:59.115417 env[1734]: 2024-02-13 12:55:59.059 [INFO][4478] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 12:55:59.115417 env[1734]: 2024-02-13 12:55:59.092 [WARNING][4478] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" HandleID="k8s-pod-network.cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" Workload="ip--172--31--23--232-k8s-csi--node--driver--jv8nx-eth0" Feb 13 12:55:59.115417 env[1734]: 2024-02-13 12:55:59.093 [INFO][4478] ipam_plugin.go 443: Releasing address using workloadID ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" HandleID="k8s-pod-network.cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" Workload="ip--172--31--23--232-k8s-csi--node--driver--jv8nx-eth0" Feb 13 12:55:59.115417 env[1734]: 2024-02-13 12:55:59.108 [INFO][4478] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 12:55:59.115417 env[1734]: 2024-02-13 12:55:59.111 [INFO][4460] k8s.go 591: Teardown processing complete. ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" Feb 13 12:55:59.124688 systemd[1]: run-netns-cni\x2db692252d\x2d574b\x2d26e7\x2d0084\x2df31c74d2f6cf.mount: Deactivated successfully. Feb 13 12:55:59.129479 env[1734]: time="2024-02-13T12:55:59.125686635Z" level=info msg="TearDown network for sandbox \"cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da\" successfully" Feb 13 12:55:59.129479 env[1734]: time="2024-02-13T12:55:59.125756258Z" level=info msg="StopPodSandbox for \"cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da\" returns successfully" Feb 13 12:55:59.131778 env[1734]: time="2024-02-13T12:55:59.131727064Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jv8nx,Uid:f202d5b3-f8a1-45a5-a109-2d38cf1ff107,Namespace:calico-system,Attempt:1,}" Feb 13 12:55:59.520404 (udev-worker)[4383]: Network interface NamePolicy= disabled on kernel command line. Feb 13 12:55:59.523691 systemd-networkd[1541]: cali0967dce8f1d: Link UP Feb 13 12:55:59.536480 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 13 12:55:59.537437 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0967dce8f1d: link becomes ready Feb 13 12:55:59.536632 systemd-networkd[1541]: cali0967dce8f1d: Gained carrier Feb 13 12:55:59.588135 env[1734]: 2024-02-13 12:55:59.247 [INFO][4491] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--23--232-k8s-coredns--787d4945fb--zgh7h-eth0 coredns-787d4945fb- kube-system 746068bd-2374-4d72-801d-12cadc04a979 698 0 2024-02-13 12:55:19 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-23-232 coredns-787d4945fb-zgh7h eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali0967dce8f1d [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7" Namespace="kube-system" Pod="coredns-787d4945fb-zgh7h" WorkloadEndpoint="ip--172--31--23--232-k8s-coredns--787d4945fb--zgh7h-" Feb 13 12:55:59.588135 env[1734]: 2024-02-13 12:55:59.248 [INFO][4491] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7" Namespace="kube-system" Pod="coredns-787d4945fb-zgh7h" WorkloadEndpoint="ip--172--31--23--232-k8s-coredns--787d4945fb--zgh7h-eth0" Feb 13 12:55:59.588135 env[1734]: 2024-02-13 12:55:59.365 [INFO][4526] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7" HandleID="k8s-pod-network.0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7" Workload="ip--172--31--23--232-k8s-coredns--787d4945fb--zgh7h-eth0" Feb 13 12:55:59.588135 env[1734]: 2024-02-13 12:55:59.392 [INFO][4526] ipam_plugin.go 268: Auto assigning IP ContainerID="0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7" HandleID="k8s-pod-network.0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7" Workload="ip--172--31--23--232-k8s-coredns--787d4945fb--zgh7h-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002036f0), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-23-232", "pod":"coredns-787d4945fb-zgh7h", "timestamp":"2024-02-13 12:55:59.365123146 +0000 UTC"}, Hostname:"ip-172-31-23-232", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 12:55:59.588135 env[1734]: 2024-02-13 12:55:59.393 [INFO][4526] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 12:55:59.588135 env[1734]: 2024-02-13 12:55:59.393 [INFO][4526] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 12:55:59.588135 env[1734]: 2024-02-13 12:55:59.393 [INFO][4526] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-23-232' Feb 13 12:55:59.588135 env[1734]: 2024-02-13 12:55:59.395 [INFO][4526] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7" host="ip-172-31-23-232" Feb 13 12:55:59.588135 env[1734]: 2024-02-13 12:55:59.415 [INFO][4526] ipam.go 372: Looking up existing affinities for host host="ip-172-31-23-232" Feb 13 12:55:59.588135 env[1734]: 2024-02-13 12:55:59.432 [INFO][4526] ipam.go 489: Trying affinity for 192.168.110.192/26 host="ip-172-31-23-232" Feb 13 12:55:59.588135 env[1734]: 2024-02-13 12:55:59.441 [INFO][4526] ipam.go 155: Attempting to load block cidr=192.168.110.192/26 host="ip-172-31-23-232" Feb 13 12:55:59.588135 env[1734]: 2024-02-13 12:55:59.448 [INFO][4526] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="ip-172-31-23-232" Feb 13 12:55:59.588135 env[1734]: 2024-02-13 12:55:59.448 [INFO][4526] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7" host="ip-172-31-23-232" Feb 13 12:55:59.588135 env[1734]: 2024-02-13 12:55:59.451 [INFO][4526] ipam.go 1682: Creating new handle: k8s-pod-network.0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7 Feb 13 12:55:59.588135 env[1734]: 2024-02-13 12:55:59.478 [INFO][4526] ipam.go 1203: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7" host="ip-172-31-23-232" Feb 13 12:55:59.588135 env[1734]: 2024-02-13 12:55:59.501 [INFO][4526] ipam.go 1216: Successfully claimed IPs: [192.168.110.193/26] block=192.168.110.192/26 handle="k8s-pod-network.0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7" host="ip-172-31-23-232" Feb 13 12:55:59.588135 env[1734]: 2024-02-13 12:55:59.501 [INFO][4526] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.110.193/26] handle="k8s-pod-network.0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7" host="ip-172-31-23-232" Feb 13 12:55:59.588135 env[1734]: 2024-02-13 12:55:59.502 [INFO][4526] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 12:55:59.588135 env[1734]: 2024-02-13 12:55:59.502 [INFO][4526] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.110.193/26] IPv6=[] ContainerID="0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7" HandleID="k8s-pod-network.0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7" Workload="ip--172--31--23--232-k8s-coredns--787d4945fb--zgh7h-eth0" Feb 13 12:55:59.589444 env[1734]: 2024-02-13 12:55:59.514 [INFO][4491] k8s.go 385: Populated endpoint ContainerID="0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7" Namespace="kube-system" Pod="coredns-787d4945fb-zgh7h" WorkloadEndpoint="ip--172--31--23--232-k8s-coredns--787d4945fb--zgh7h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--232-k8s-coredns--787d4945fb--zgh7h-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"746068bd-2374-4d72-801d-12cadc04a979", ResourceVersion:"698", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 12, 55, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-232", ContainerID:"", Pod:"coredns-787d4945fb-zgh7h", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0967dce8f1d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 12:55:59.589444 env[1734]: 2024-02-13 12:55:59.514 [INFO][4491] k8s.go 386: Calico CNI using IPs: [192.168.110.193/32] ContainerID="0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7" Namespace="kube-system" Pod="coredns-787d4945fb-zgh7h" WorkloadEndpoint="ip--172--31--23--232-k8s-coredns--787d4945fb--zgh7h-eth0" Feb 13 12:55:59.589444 env[1734]: 2024-02-13 12:55:59.514 [INFO][4491] dataplane_linux.go 68: Setting the host side veth name to cali0967dce8f1d ContainerID="0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7" Namespace="kube-system" Pod="coredns-787d4945fb-zgh7h" WorkloadEndpoint="ip--172--31--23--232-k8s-coredns--787d4945fb--zgh7h-eth0" Feb 13 12:55:59.589444 env[1734]: 2024-02-13 12:55:59.562 [INFO][4491] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7" Namespace="kube-system" Pod="coredns-787d4945fb-zgh7h" WorkloadEndpoint="ip--172--31--23--232-k8s-coredns--787d4945fb--zgh7h-eth0" Feb 13 12:55:59.589444 env[1734]: 2024-02-13 12:55:59.562 [INFO][4491] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7" Namespace="kube-system" Pod="coredns-787d4945fb-zgh7h" WorkloadEndpoint="ip--172--31--23--232-k8s-coredns--787d4945fb--zgh7h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--232-k8s-coredns--787d4945fb--zgh7h-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"746068bd-2374-4d72-801d-12cadc04a979", ResourceVersion:"698", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 12, 55, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-232", ContainerID:"0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7", Pod:"coredns-787d4945fb-zgh7h", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0967dce8f1d", MAC:"5e:cf:01:06:36:01", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 12:55:59.589444 env[1734]: 2024-02-13 12:55:59.585 [INFO][4491] k8s.go 491: Wrote updated endpoint to datastore ContainerID="0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7" Namespace="kube-system" Pod="coredns-787d4945fb-zgh7h" WorkloadEndpoint="ip--172--31--23--232-k8s-coredns--787d4945fb--zgh7h-eth0" Feb 13 12:55:59.632066 env[1734]: time="2024-02-13T12:55:59.629646476Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 12:55:59.632066 env[1734]: time="2024-02-13T12:55:59.629728986Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 12:55:59.632066 env[1734]: time="2024-02-13T12:55:59.629756069Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 12:55:59.632066 env[1734]: time="2024-02-13T12:55:59.630022883Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7 pid=4568 runtime=io.containerd.runc.v2 Feb 13 12:55:59.679984 env[1734]: time="2024-02-13T12:55:59.679101296Z" level=info msg="StopPodSandbox for \"681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e\"" Feb 13 12:55:59.721573 systemd[1]: Started cri-containerd-0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7.scope. Feb 13 12:55:59.744481 systemd-networkd[1541]: cali6964aa00799: Link UP Feb 13 12:55:59.757000 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6964aa00799: link becomes ready Feb 13 12:55:59.757028 systemd-networkd[1541]: cali6964aa00799: Gained carrier Feb 13 12:55:59.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.799000 audit: BPF prog-id=151 op=LOAD Feb 13 12:55:59.800000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.800000 audit[4579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4568 pid=4579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:59.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062613238346634343835363366633831386665323430383131323837 Feb 13 12:55:59.800000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.800000 audit[4579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4568 pid=4579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:59.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062613238346634343835363366633831386665323430383131323837 Feb 13 12:55:59.800000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.800000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.800000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.800000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.800000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.800000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.800000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.800000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.800000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.800000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.800000 audit: BPF prog-id=152 op=LOAD Feb 13 12:55:59.800000 audit[4579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4568 pid=4579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:59.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062613238346634343835363366633831386665323430383131323837 Feb 13 12:55:59.801000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.801000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.801000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.801000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.801000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.801000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.801000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.801000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.801000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.801000 audit: BPF prog-id=153 op=LOAD Feb 13 12:55:59.801000 audit[4579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4568 pid=4579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:59.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062613238346634343835363366633831386665323430383131323837 Feb 13 12:55:59.801000 audit: BPF prog-id=153 op=UNLOAD Feb 13 12:55:59.801000 audit: BPF prog-id=152 op=UNLOAD Feb 13 12:55:59.802000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.802000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.802000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.802000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.802000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.802000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.802000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.802000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.802000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.802000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:55:59.802000 audit: BPF prog-id=154 op=LOAD Feb 13 12:55:59.802000 audit[4579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4568 pid=4579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:59.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062613238346634343835363366633831386665323430383131323837 Feb 13 12:55:59.816303 env[1734]: 2024-02-13 12:55:59.339 [INFO][4504] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--23--232-k8s-calico--kube--controllers--59fd566959--qljwd-eth0 calico-kube-controllers-59fd566959- calico-system 081a0ef1-5542-49e3-9722-6bef7e5d16e8 700 0 2024-02-13 12:55:28 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:59fd566959 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-23-232 calico-kube-controllers-59fd566959-qljwd eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali6964aa00799 [] []}} ContainerID="cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7" Namespace="calico-system" Pod="calico-kube-controllers-59fd566959-qljwd" WorkloadEndpoint="ip--172--31--23--232-k8s-calico--kube--controllers--59fd566959--qljwd-" Feb 13 12:55:59.816303 env[1734]: 2024-02-13 12:55:59.339 [INFO][4504] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7" Namespace="calico-system" Pod="calico-kube-controllers-59fd566959-qljwd" WorkloadEndpoint="ip--172--31--23--232-k8s-calico--kube--controllers--59fd566959--qljwd-eth0" Feb 13 12:55:59.816303 env[1734]: 2024-02-13 12:55:59.475 [INFO][4536] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7" HandleID="k8s-pod-network.cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7" Workload="ip--172--31--23--232-k8s-calico--kube--controllers--59fd566959--qljwd-eth0" Feb 13 12:55:59.816303 env[1734]: 2024-02-13 12:55:59.551 [INFO][4536] ipam_plugin.go 268: Auto assigning IP ContainerID="cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7" HandleID="k8s-pod-network.cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7" Workload="ip--172--31--23--232-k8s-calico--kube--controllers--59fd566959--qljwd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004de60), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-23-232", "pod":"calico-kube-controllers-59fd566959-qljwd", "timestamp":"2024-02-13 12:55:59.475340849 +0000 UTC"}, Hostname:"ip-172-31-23-232", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 12:55:59.816303 env[1734]: 2024-02-13 12:55:59.551 [INFO][4536] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 12:55:59.816303 env[1734]: 2024-02-13 12:55:59.551 [INFO][4536] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 12:55:59.816303 env[1734]: 2024-02-13 12:55:59.552 [INFO][4536] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-23-232' Feb 13 12:55:59.816303 env[1734]: 2024-02-13 12:55:59.568 [INFO][4536] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7" host="ip-172-31-23-232" Feb 13 12:55:59.816303 env[1734]: 2024-02-13 12:55:59.606 [INFO][4536] ipam.go 372: Looking up existing affinities for host host="ip-172-31-23-232" Feb 13 12:55:59.816303 env[1734]: 2024-02-13 12:55:59.649 [INFO][4536] ipam.go 489: Trying affinity for 192.168.110.192/26 host="ip-172-31-23-232" Feb 13 12:55:59.816303 env[1734]: 2024-02-13 12:55:59.654 [INFO][4536] ipam.go 155: Attempting to load block cidr=192.168.110.192/26 host="ip-172-31-23-232" Feb 13 12:55:59.816303 env[1734]: 2024-02-13 12:55:59.660 [INFO][4536] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="ip-172-31-23-232" Feb 13 12:55:59.816303 env[1734]: 2024-02-13 12:55:59.660 [INFO][4536] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7" host="ip-172-31-23-232" Feb 13 12:55:59.816303 env[1734]: 2024-02-13 12:55:59.665 [INFO][4536] ipam.go 1682: Creating new handle: k8s-pod-network.cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7 Feb 13 12:55:59.816303 env[1734]: 2024-02-13 12:55:59.689 [INFO][4536] ipam.go 1203: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7" host="ip-172-31-23-232" Feb 13 12:55:59.816303 env[1734]: 2024-02-13 12:55:59.727 [INFO][4536] ipam.go 1216: Successfully claimed IPs: [192.168.110.194/26] block=192.168.110.192/26 handle="k8s-pod-network.cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7" host="ip-172-31-23-232" Feb 13 12:55:59.816303 env[1734]: 2024-02-13 12:55:59.727 [INFO][4536] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.110.194/26] handle="k8s-pod-network.cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7" host="ip-172-31-23-232" Feb 13 12:55:59.816303 env[1734]: 2024-02-13 12:55:59.727 [INFO][4536] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 12:55:59.816303 env[1734]: 2024-02-13 12:55:59.727 [INFO][4536] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.110.194/26] IPv6=[] ContainerID="cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7" HandleID="k8s-pod-network.cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7" Workload="ip--172--31--23--232-k8s-calico--kube--controllers--59fd566959--qljwd-eth0" Feb 13 12:55:59.818259 env[1734]: 2024-02-13 12:55:59.737 [INFO][4504] k8s.go 385: Populated endpoint ContainerID="cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7" Namespace="calico-system" Pod="calico-kube-controllers-59fd566959-qljwd" WorkloadEndpoint="ip--172--31--23--232-k8s-calico--kube--controllers--59fd566959--qljwd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--232-k8s-calico--kube--controllers--59fd566959--qljwd-eth0", GenerateName:"calico-kube-controllers-59fd566959-", Namespace:"calico-system", SelfLink:"", UID:"081a0ef1-5542-49e3-9722-6bef7e5d16e8", ResourceVersion:"700", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 12, 55, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"59fd566959", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-232", ContainerID:"", Pod:"calico-kube-controllers-59fd566959-qljwd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.110.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6964aa00799", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 12:55:59.818259 env[1734]: 2024-02-13 12:55:59.737 [INFO][4504] k8s.go 386: Calico CNI using IPs: [192.168.110.194/32] ContainerID="cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7" Namespace="calico-system" Pod="calico-kube-controllers-59fd566959-qljwd" WorkloadEndpoint="ip--172--31--23--232-k8s-calico--kube--controllers--59fd566959--qljwd-eth0" Feb 13 12:55:59.818259 env[1734]: 2024-02-13 12:55:59.737 [INFO][4504] dataplane_linux.go 68: Setting the host side veth name to cali6964aa00799 ContainerID="cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7" Namespace="calico-system" Pod="calico-kube-controllers-59fd566959-qljwd" WorkloadEndpoint="ip--172--31--23--232-k8s-calico--kube--controllers--59fd566959--qljwd-eth0" Feb 13 12:55:59.818259 env[1734]: 2024-02-13 12:55:59.759 [INFO][4504] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7" Namespace="calico-system" Pod="calico-kube-controllers-59fd566959-qljwd" WorkloadEndpoint="ip--172--31--23--232-k8s-calico--kube--controllers--59fd566959--qljwd-eth0" Feb 13 12:55:59.818259 env[1734]: 2024-02-13 12:55:59.760 [INFO][4504] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7" Namespace="calico-system" Pod="calico-kube-controllers-59fd566959-qljwd" WorkloadEndpoint="ip--172--31--23--232-k8s-calico--kube--controllers--59fd566959--qljwd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--232-k8s-calico--kube--controllers--59fd566959--qljwd-eth0", GenerateName:"calico-kube-controllers-59fd566959-", Namespace:"calico-system", SelfLink:"", UID:"081a0ef1-5542-49e3-9722-6bef7e5d16e8", ResourceVersion:"700", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 12, 55, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"59fd566959", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-232", ContainerID:"cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7", Pod:"calico-kube-controllers-59fd566959-qljwd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.110.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6964aa00799", MAC:"12:22:41:ad:39:55", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 12:55:59.818259 env[1734]: 2024-02-13 12:55:59.810 [INFO][4504] k8s.go 491: Wrote updated endpoint to datastore ContainerID="cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7" Namespace="calico-system" Pod="calico-kube-controllers-59fd566959-qljwd" WorkloadEndpoint="ip--172--31--23--232-k8s-calico--kube--controllers--59fd566959--qljwd-eth0" Feb 13 12:55:59.886785 systemd-networkd[1541]: calib0d5272a82f: Link UP Feb 13 12:55:59.891662 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib0d5272a82f: link becomes ready Feb 13 12:55:59.890896 systemd-networkd[1541]: calib0d5272a82f: Gained carrier Feb 13 12:55:59.940845 env[1734]: 2024-02-13 12:55:59.377 [INFO][4513] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--23--232-k8s-csi--node--driver--jv8nx-eth0 csi-node-driver- calico-system f202d5b3-f8a1-45a5-a109-2d38cf1ff107 699 0 2024-02-13 12:55:28 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ip-172-31-23-232 csi-node-driver-jv8nx eth0 default [] [] [kns.calico-system ksa.calico-system.default] calib0d5272a82f [] []}} ContainerID="d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21" Namespace="calico-system" Pod="csi-node-driver-jv8nx" WorkloadEndpoint="ip--172--31--23--232-k8s-csi--node--driver--jv8nx-" Feb 13 12:55:59.940845 env[1734]: 2024-02-13 12:55:59.382 [INFO][4513] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21" Namespace="calico-system" Pod="csi-node-driver-jv8nx" WorkloadEndpoint="ip--172--31--23--232-k8s-csi--node--driver--jv8nx-eth0" Feb 13 12:55:59.940845 env[1734]: 2024-02-13 12:55:59.566 [INFO][4541] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21" HandleID="k8s-pod-network.d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21" Workload="ip--172--31--23--232-k8s-csi--node--driver--jv8nx-eth0" Feb 13 12:55:59.940845 env[1734]: 2024-02-13 12:55:59.624 [INFO][4541] ipam_plugin.go 268: Auto assigning IP ContainerID="d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21" HandleID="k8s-pod-network.d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21" Workload="ip--172--31--23--232-k8s-csi--node--driver--jv8nx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400027a810), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-23-232", "pod":"csi-node-driver-jv8nx", "timestamp":"2024-02-13 12:55:59.566150861 +0000 UTC"}, Hostname:"ip-172-31-23-232", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 12:55:59.940845 env[1734]: 2024-02-13 12:55:59.624 [INFO][4541] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 12:55:59.940845 env[1734]: 2024-02-13 12:55:59.733 [INFO][4541] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 12:55:59.940845 env[1734]: 2024-02-13 12:55:59.735 [INFO][4541] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-23-232' Feb 13 12:55:59.940845 env[1734]: 2024-02-13 12:55:59.759 [INFO][4541] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21" host="ip-172-31-23-232" Feb 13 12:55:59.940845 env[1734]: 2024-02-13 12:55:59.776 [INFO][4541] ipam.go 372: Looking up existing affinities for host host="ip-172-31-23-232" Feb 13 12:55:59.940845 env[1734]: 2024-02-13 12:55:59.797 [INFO][4541] ipam.go 489: Trying affinity for 192.168.110.192/26 host="ip-172-31-23-232" Feb 13 12:55:59.940845 env[1734]: 2024-02-13 12:55:59.828 [INFO][4541] ipam.go 155: Attempting to load block cidr=192.168.110.192/26 host="ip-172-31-23-232" Feb 13 12:55:59.940845 env[1734]: 2024-02-13 12:55:59.842 [INFO][4541] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="ip-172-31-23-232" Feb 13 12:55:59.940845 env[1734]: 2024-02-13 12:55:59.842 [INFO][4541] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21" host="ip-172-31-23-232" Feb 13 12:55:59.940845 env[1734]: 2024-02-13 12:55:59.845 [INFO][4541] ipam.go 1682: Creating new handle: k8s-pod-network.d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21 Feb 13 12:55:59.940845 env[1734]: 2024-02-13 12:55:59.856 [INFO][4541] ipam.go 1203: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21" host="ip-172-31-23-232" Feb 13 12:55:59.940845 env[1734]: 2024-02-13 12:55:59.873 [INFO][4541] ipam.go 1216: Successfully claimed IPs: [192.168.110.195/26] block=192.168.110.192/26 handle="k8s-pod-network.d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21" host="ip-172-31-23-232" Feb 13 12:55:59.940845 env[1734]: 2024-02-13 12:55:59.873 [INFO][4541] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.110.195/26] handle="k8s-pod-network.d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21" host="ip-172-31-23-232" Feb 13 12:55:59.940845 env[1734]: 2024-02-13 12:55:59.873 [INFO][4541] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 12:55:59.940845 env[1734]: 2024-02-13 12:55:59.873 [INFO][4541] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.110.195/26] IPv6=[] ContainerID="d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21" HandleID="k8s-pod-network.d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21" Workload="ip--172--31--23--232-k8s-csi--node--driver--jv8nx-eth0" Feb 13 12:55:59.944363 env[1734]: 2024-02-13 12:55:59.879 [INFO][4513] k8s.go 385: Populated endpoint ContainerID="d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21" Namespace="calico-system" Pod="csi-node-driver-jv8nx" WorkloadEndpoint="ip--172--31--23--232-k8s-csi--node--driver--jv8nx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--232-k8s-csi--node--driver--jv8nx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f202d5b3-f8a1-45a5-a109-2d38cf1ff107", ResourceVersion:"699", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 12, 55, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-232", ContainerID:"", Pod:"csi-node-driver-jv8nx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.110.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calib0d5272a82f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 12:55:59.944363 env[1734]: 2024-02-13 12:55:59.879 [INFO][4513] k8s.go 386: Calico CNI using IPs: [192.168.110.195/32] ContainerID="d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21" Namespace="calico-system" Pod="csi-node-driver-jv8nx" WorkloadEndpoint="ip--172--31--23--232-k8s-csi--node--driver--jv8nx-eth0" Feb 13 12:55:59.944363 env[1734]: 2024-02-13 12:55:59.879 [INFO][4513] dataplane_linux.go 68: Setting the host side veth name to calib0d5272a82f ContainerID="d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21" Namespace="calico-system" Pod="csi-node-driver-jv8nx" WorkloadEndpoint="ip--172--31--23--232-k8s-csi--node--driver--jv8nx-eth0" Feb 13 12:55:59.944363 env[1734]: 2024-02-13 12:55:59.892 [INFO][4513] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21" Namespace="calico-system" Pod="csi-node-driver-jv8nx" WorkloadEndpoint="ip--172--31--23--232-k8s-csi--node--driver--jv8nx-eth0" Feb 13 12:55:59.944363 env[1734]: 2024-02-13 12:55:59.903 [INFO][4513] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21" Namespace="calico-system" Pod="csi-node-driver-jv8nx" WorkloadEndpoint="ip--172--31--23--232-k8s-csi--node--driver--jv8nx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--232-k8s-csi--node--driver--jv8nx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f202d5b3-f8a1-45a5-a109-2d38cf1ff107", ResourceVersion:"699", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 12, 55, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-232", ContainerID:"d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21", Pod:"csi-node-driver-jv8nx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.110.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calib0d5272a82f", MAC:"1e:a8:ee:4b:a1:f8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 12:55:59.944363 env[1734]: 2024-02-13 12:55:59.928 [INFO][4513] k8s.go 491: Wrote updated endpoint to datastore ContainerID="d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21" Namespace="calico-system" Pod="csi-node-driver-jv8nx" WorkloadEndpoint="ip--172--31--23--232-k8s-csi--node--driver--jv8nx-eth0" Feb 13 12:55:59.952000 audit[4639]: NETFILTER_CFG table=filter:115 family=2 entries=36 op=nft_register_chain pid=4639 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 12:55:59.952000 audit[4639]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=fffff28e98f0 a2=0 a3=ffffb993afa8 items=0 ppid=4240 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:55:59.952000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 12:55:59.957927 env[1734]: time="2024-02-13T12:55:59.956072829Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-zgh7h,Uid:746068bd-2374-4d72-801d-12cadc04a979,Namespace:kube-system,Attempt:1,} returns sandbox id \"0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7\"" Feb 13 12:55:59.964254 env[1734]: time="2024-02-13T12:55:59.964007185Z" level=info msg="CreateContainer within sandbox \"0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 13 12:55:59.977541 env[1734]: time="2024-02-13T12:55:59.973991919Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 12:55:59.977541 env[1734]: time="2024-02-13T12:55:59.974161787Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 12:55:59.977541 env[1734]: time="2024-02-13T12:55:59.974189951Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 12:55:59.977541 env[1734]: time="2024-02-13T12:55:59.974555954Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7 pid=4642 runtime=io.containerd.runc.v2 Feb 13 12:56:00.021543 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2302768904.mount: Deactivated successfully. Feb 13 12:56:00.071358 env[1734]: time="2024-02-13T12:56:00.066864763Z" level=info msg="CreateContainer within sandbox \"0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"572de34b228857c545cfcb78671ab5d153ec333e9f481ed484c9c9c3e7780fb2\"" Feb 13 12:56:00.071358 env[1734]: time="2024-02-13T12:56:00.068109471Z" level=info msg="StartContainer for \"572de34b228857c545cfcb78671ab5d153ec333e9f481ed484c9c9c3e7780fb2\"" Feb 13 12:56:00.100517 env[1734]: time="2024-02-13T12:56:00.100371085Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 12:56:00.101243 env[1734]: time="2024-02-13T12:56:00.101139200Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 12:56:00.102724 env[1734]: time="2024-02-13T12:56:00.101556407Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 12:56:00.102724 env[1734]: time="2024-02-13T12:56:00.102296286Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21 pid=4675 runtime=io.containerd.runc.v2 Feb 13 12:56:00.126470 systemd[1]: Started cri-containerd-cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7.scope. Feb 13 12:56:00.143284 systemd[1]: Started cri-containerd-572de34b228857c545cfcb78671ab5d153ec333e9f481ed484c9c9c3e7780fb2.scope. Feb 13 12:56:00.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.198000 audit: BPF prog-id=155 op=LOAD Feb 13 12:56:00.199000 audit[4688]: AVC avc: denied { bpf } for pid=4688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.199000 audit[4688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4568 pid=4688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:00.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537326465333462323238383537633534356366636237383637316162 Feb 13 12:56:00.199000 audit[4688]: AVC avc: denied { perfmon } for pid=4688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.199000 audit[4688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4568 pid=4688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:00.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537326465333462323238383537633534356366636237383637316162 Feb 13 12:56:00.199000 audit[4688]: AVC avc: denied { bpf } for pid=4688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.199000 audit[4688]: AVC avc: denied { bpf } for pid=4688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.199000 audit[4688]: AVC avc: denied { bpf } for pid=4688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.199000 audit[4688]: AVC avc: denied { perfmon } for pid=4688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.199000 audit[4688]: AVC avc: denied { perfmon } for pid=4688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.199000 audit[4688]: AVC avc: denied { perfmon } for pid=4688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.199000 audit[4688]: AVC avc: denied { perfmon } for pid=4688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.199000 audit[4688]: AVC avc: denied { perfmon } for pid=4688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.199000 audit[4688]: AVC avc: denied { bpf } for pid=4688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.199000 audit[4688]: AVC avc: denied { bpf } for pid=4688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.199000 audit: BPF prog-id=156 op=LOAD Feb 13 12:56:00.199000 audit[4688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4568 pid=4688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:00.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537326465333462323238383537633534356366636237383637316162 Feb 13 12:56:00.200000 audit[4688]: AVC avc: denied { bpf } for pid=4688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.200000 audit[4688]: AVC avc: denied { bpf } for pid=4688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.200000 audit[4688]: AVC avc: denied { perfmon } for pid=4688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.200000 audit[4688]: AVC avc: denied { perfmon } for pid=4688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.200000 audit[4688]: AVC avc: denied { perfmon } for pid=4688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.200000 audit[4688]: AVC avc: denied { perfmon } for pid=4688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.200000 audit[4688]: AVC avc: denied { perfmon } for pid=4688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.200000 audit[4688]: AVC avc: denied { bpf } for pid=4688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.200000 audit[4688]: AVC avc: denied { bpf } for pid=4688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.200000 audit: BPF prog-id=157 op=LOAD Feb 13 12:56:00.200000 audit[4688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4568 pid=4688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:00.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537326465333462323238383537633534356366636237383637316162 Feb 13 12:56:00.200000 audit: BPF prog-id=157 op=UNLOAD Feb 13 12:56:00.200000 audit: BPF prog-id=156 op=UNLOAD Feb 13 12:56:00.200000 audit[4688]: AVC avc: denied { bpf } for pid=4688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.200000 audit[4688]: AVC avc: denied { bpf } for pid=4688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.200000 audit[4688]: AVC avc: denied { bpf } for pid=4688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.200000 audit[4688]: AVC avc: denied { perfmon } for pid=4688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.200000 audit[4688]: AVC avc: denied { perfmon } for pid=4688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.200000 audit[4688]: AVC avc: denied { perfmon } for pid=4688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.200000 audit[4688]: AVC avc: denied { perfmon } for pid=4688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.200000 audit[4688]: AVC avc: denied { perfmon } for pid=4688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.200000 audit[4688]: AVC avc: denied { bpf } for pid=4688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.200000 audit[4688]: AVC avc: denied { bpf } for pid=4688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.200000 audit: BPF prog-id=158 op=LOAD Feb 13 12:56:00.200000 audit[4688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4568 pid=4688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:00.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537326465333462323238383537633534356366636237383637316162 Feb 13 12:56:00.216240 systemd[1]: Started cri-containerd-d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21.scope. Feb 13 12:56:00.268284 env[1734]: time="2024-02-13T12:56:00.268191037Z" level=info msg="StartContainer for \"572de34b228857c545cfcb78671ab5d153ec333e9f481ed484c9c9c3e7780fb2\" returns successfully" Feb 13 12:56:00.307493 env[1734]: 2024-02-13 12:56:00.062 [INFO][4615] k8s.go 578: Cleaning up netns ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" Feb 13 12:56:00.307493 env[1734]: 2024-02-13 12:56:00.062 [INFO][4615] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" iface="eth0" netns="/var/run/netns/cni-661d64c4-8f26-67bb-fc3b-3f37bbb6e19d" Feb 13 12:56:00.307493 env[1734]: 2024-02-13 12:56:00.062 [INFO][4615] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" iface="eth0" netns="/var/run/netns/cni-661d64c4-8f26-67bb-fc3b-3f37bbb6e19d" Feb 13 12:56:00.307493 env[1734]: 2024-02-13 12:56:00.063 [INFO][4615] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" iface="eth0" netns="/var/run/netns/cni-661d64c4-8f26-67bb-fc3b-3f37bbb6e19d" Feb 13 12:56:00.307493 env[1734]: 2024-02-13 12:56:00.063 [INFO][4615] k8s.go 585: Releasing IP address(es) ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" Feb 13 12:56:00.307493 env[1734]: 2024-02-13 12:56:00.063 [INFO][4615] utils.go 188: Calico CNI releasing IP address ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" Feb 13 12:56:00.307493 env[1734]: 2024-02-13 12:56:00.280 [INFO][4677] ipam_plugin.go 415: Releasing address using handleID ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" HandleID="k8s-pod-network.681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" Workload="ip--172--31--23--232-k8s-coredns--787d4945fb--f8r2l-eth0" Feb 13 12:56:00.307493 env[1734]: 2024-02-13 12:56:00.281 [INFO][4677] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 12:56:00.307493 env[1734]: 2024-02-13 12:56:00.281 [INFO][4677] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 12:56:00.307493 env[1734]: 2024-02-13 12:56:00.298 [WARNING][4677] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" HandleID="k8s-pod-network.681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" Workload="ip--172--31--23--232-k8s-coredns--787d4945fb--f8r2l-eth0" Feb 13 12:56:00.307493 env[1734]: 2024-02-13 12:56:00.298 [INFO][4677] ipam_plugin.go 443: Releasing address using workloadID ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" HandleID="k8s-pod-network.681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" Workload="ip--172--31--23--232-k8s-coredns--787d4945fb--f8r2l-eth0" Feb 13 12:56:00.307493 env[1734]: 2024-02-13 12:56:00.301 [INFO][4677] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 12:56:00.307493 env[1734]: 2024-02-13 12:56:00.305 [INFO][4615] k8s.go 591: Teardown processing complete. ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" Feb 13 12:56:00.308473 env[1734]: time="2024-02-13T12:56:00.307708555Z" level=info msg="TearDown network for sandbox \"681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e\" successfully" Feb 13 12:56:00.308473 env[1734]: time="2024-02-13T12:56:00.307754742Z" level=info msg="StopPodSandbox for \"681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e\" returns successfully" Feb 13 12:56:00.310425 env[1734]: time="2024-02-13T12:56:00.310353248Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-f8r2l,Uid:c08d9a76-a82d-4c00-8820-2e1b9426d7d6,Namespace:kube-system,Attempt:1,}" Feb 13 12:56:00.316810 systemd-networkd[1541]: vxlan.calico: Gained IPv6LL Feb 13 12:56:00.334000 audit[4748]: NETFILTER_CFG table=filter:116 family=2 entries=66 op=nft_register_chain pid=4748 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 12:56:00.334000 audit[4748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=36484 a0=3 a1=fffff62601c0 a2=0 a3=ffff90869fa8 items=0 ppid=4240 pid=4748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:00.334000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 12:56:00.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.393000 audit: BPF prog-id=159 op=LOAD Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4642 pid=4663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:00.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363333833326438626565666234313638663032333736646261323163 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4642 pid=4663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:00.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363333833326438626565666234313638663032333736646261323163 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit: BPF prog-id=160 op=LOAD Feb 13 12:56:00.394000 audit[4663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4642 pid=4663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:00.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363333833326438626565666234313638663032333736646261323163 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit: BPF prog-id=161 op=LOAD Feb 13 12:56:00.394000 audit[4663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4642 pid=4663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:00.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363333833326438626565666234313638663032333736646261323163 Feb 13 12:56:00.394000 audit: BPF prog-id=161 op=UNLOAD Feb 13 12:56:00.394000 audit: BPF prog-id=160 op=UNLOAD Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.394000 audit: BPF prog-id=162 op=LOAD Feb 13 12:56:00.394000 audit[4663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4642 pid=4663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:00.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363333833326438626565666234313638663032333736646261323163 Feb 13 12:56:00.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.441000 audit: BPF prog-id=163 op=LOAD Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4675 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:00.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439313431306431306337346135663332653535386562353163363932 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4675 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:00.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439313431306431306337346135663332653535386562353163363932 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit: BPF prog-id=164 op=LOAD Feb 13 12:56:00.442000 audit[4707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4675 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:00.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439313431306431306337346135663332653535386562353163363932 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit: BPF prog-id=165 op=LOAD Feb 13 12:56:00.442000 audit[4707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4675 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:00.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439313431306431306337346135663332653535386562353163363932 Feb 13 12:56:00.442000 audit: BPF prog-id=165 op=UNLOAD Feb 13 12:56:00.442000 audit: BPF prog-id=164 op=UNLOAD Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { perfmon } for pid=4707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit[4707]: AVC avc: denied { bpf } for pid=4707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.442000 audit: BPF prog-id=166 op=LOAD Feb 13 12:56:00.442000 audit[4707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4675 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:00.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439313431306431306337346135663332653535386562353163363932 Feb 13 12:56:00.488335 env[1734]: time="2024-02-13T12:56:00.487090828Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jv8nx,Uid:f202d5b3-f8a1-45a5-a109-2d38cf1ff107,Namespace:calico-system,Attempt:1,} returns sandbox id \"d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21\"" Feb 13 12:56:00.492873 env[1734]: time="2024-02-13T12:56:00.491665284Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 13 12:56:00.581724 env[1734]: time="2024-02-13T12:56:00.581655022Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-59fd566959-qljwd,Uid:081a0ef1-5542-49e3-9722-6bef7e5d16e8,Namespace:calico-system,Attempt:1,} returns sandbox id \"cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7\"" Feb 13 12:56:00.719456 systemd-networkd[1541]: calibe90c3d0d46: Link UP Feb 13 12:56:00.728478 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 13 12:56:00.728637 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibe90c3d0d46: link becomes ready Feb 13 12:56:00.729020 systemd-networkd[1541]: calibe90c3d0d46: Gained carrier Feb 13 12:56:00.754078 env[1734]: 2024-02-13 12:56:00.450 [INFO][4749] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--23--232-k8s-coredns--787d4945fb--f8r2l-eth0 coredns-787d4945fb- kube-system c08d9a76-a82d-4c00-8820-2e1b9426d7d6 713 0 2024-02-13 12:55:19 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-23-232 coredns-787d4945fb-f8r2l eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calibe90c3d0d46 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528" Namespace="kube-system" Pod="coredns-787d4945fb-f8r2l" WorkloadEndpoint="ip--172--31--23--232-k8s-coredns--787d4945fb--f8r2l-" Feb 13 12:56:00.754078 env[1734]: 2024-02-13 12:56:00.450 [INFO][4749] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528" Namespace="kube-system" Pod="coredns-787d4945fb-f8r2l" WorkloadEndpoint="ip--172--31--23--232-k8s-coredns--787d4945fb--f8r2l-eth0" Feb 13 12:56:00.754078 env[1734]: 2024-02-13 12:56:00.614 [INFO][4778] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528" HandleID="k8s-pod-network.0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528" Workload="ip--172--31--23--232-k8s-coredns--787d4945fb--f8r2l-eth0" Feb 13 12:56:00.754078 env[1734]: 2024-02-13 12:56:00.656 [INFO][4778] ipam_plugin.go 268: Auto assigning IP ContainerID="0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528" HandleID="k8s-pod-network.0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528" Workload="ip--172--31--23--232-k8s-coredns--787d4945fb--f8r2l-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004dfc0), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-23-232", "pod":"coredns-787d4945fb-f8r2l", "timestamp":"2024-02-13 12:56:00.61480704 +0000 UTC"}, Hostname:"ip-172-31-23-232", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 12:56:00.754078 env[1734]: 2024-02-13 12:56:00.656 [INFO][4778] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 12:56:00.754078 env[1734]: 2024-02-13 12:56:00.656 [INFO][4778] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 12:56:00.754078 env[1734]: 2024-02-13 12:56:00.657 [INFO][4778] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-23-232' Feb 13 12:56:00.754078 env[1734]: 2024-02-13 12:56:00.660 [INFO][4778] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528" host="ip-172-31-23-232" Feb 13 12:56:00.754078 env[1734]: 2024-02-13 12:56:00.668 [INFO][4778] ipam.go 372: Looking up existing affinities for host host="ip-172-31-23-232" Feb 13 12:56:00.754078 env[1734]: 2024-02-13 12:56:00.677 [INFO][4778] ipam.go 489: Trying affinity for 192.168.110.192/26 host="ip-172-31-23-232" Feb 13 12:56:00.754078 env[1734]: 2024-02-13 12:56:00.684 [INFO][4778] ipam.go 155: Attempting to load block cidr=192.168.110.192/26 host="ip-172-31-23-232" Feb 13 12:56:00.754078 env[1734]: 2024-02-13 12:56:00.689 [INFO][4778] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="ip-172-31-23-232" Feb 13 12:56:00.754078 env[1734]: 2024-02-13 12:56:00.689 [INFO][4778] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528" host="ip-172-31-23-232" Feb 13 12:56:00.754078 env[1734]: 2024-02-13 12:56:00.692 [INFO][4778] ipam.go 1682: Creating new handle: k8s-pod-network.0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528 Feb 13 12:56:00.754078 env[1734]: 2024-02-13 12:56:00.700 [INFO][4778] ipam.go 1203: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528" host="ip-172-31-23-232" Feb 13 12:56:00.754078 env[1734]: 2024-02-13 12:56:00.709 [INFO][4778] ipam.go 1216: Successfully claimed IPs: [192.168.110.196/26] block=192.168.110.192/26 handle="k8s-pod-network.0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528" host="ip-172-31-23-232" Feb 13 12:56:00.754078 env[1734]: 2024-02-13 12:56:00.709 [INFO][4778] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.110.196/26] handle="k8s-pod-network.0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528" host="ip-172-31-23-232" Feb 13 12:56:00.754078 env[1734]: 2024-02-13 12:56:00.709 [INFO][4778] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 12:56:00.754078 env[1734]: 2024-02-13 12:56:00.709 [INFO][4778] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.110.196/26] IPv6=[] ContainerID="0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528" HandleID="k8s-pod-network.0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528" Workload="ip--172--31--23--232-k8s-coredns--787d4945fb--f8r2l-eth0" Feb 13 12:56:00.755407 env[1734]: 2024-02-13 12:56:00.713 [INFO][4749] k8s.go 385: Populated endpoint ContainerID="0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528" Namespace="kube-system" Pod="coredns-787d4945fb-f8r2l" WorkloadEndpoint="ip--172--31--23--232-k8s-coredns--787d4945fb--f8r2l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--232-k8s-coredns--787d4945fb--f8r2l-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"c08d9a76-a82d-4c00-8820-2e1b9426d7d6", ResourceVersion:"713", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 12, 55, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-232", ContainerID:"", Pod:"coredns-787d4945fb-f8r2l", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibe90c3d0d46", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 12:56:00.755407 env[1734]: 2024-02-13 12:56:00.713 [INFO][4749] k8s.go 386: Calico CNI using IPs: [192.168.110.196/32] ContainerID="0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528" Namespace="kube-system" Pod="coredns-787d4945fb-f8r2l" WorkloadEndpoint="ip--172--31--23--232-k8s-coredns--787d4945fb--f8r2l-eth0" Feb 13 12:56:00.755407 env[1734]: 2024-02-13 12:56:00.713 [INFO][4749] dataplane_linux.go 68: Setting the host side veth name to calibe90c3d0d46 ContainerID="0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528" Namespace="kube-system" Pod="coredns-787d4945fb-f8r2l" WorkloadEndpoint="ip--172--31--23--232-k8s-coredns--787d4945fb--f8r2l-eth0" Feb 13 12:56:00.755407 env[1734]: 2024-02-13 12:56:00.737 [INFO][4749] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528" Namespace="kube-system" Pod="coredns-787d4945fb-f8r2l" WorkloadEndpoint="ip--172--31--23--232-k8s-coredns--787d4945fb--f8r2l-eth0" Feb 13 12:56:00.755407 env[1734]: 2024-02-13 12:56:00.737 [INFO][4749] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528" Namespace="kube-system" Pod="coredns-787d4945fb-f8r2l" WorkloadEndpoint="ip--172--31--23--232-k8s-coredns--787d4945fb--f8r2l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--232-k8s-coredns--787d4945fb--f8r2l-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"c08d9a76-a82d-4c00-8820-2e1b9426d7d6", ResourceVersion:"713", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 12, 55, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-232", ContainerID:"0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528", Pod:"coredns-787d4945fb-f8r2l", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibe90c3d0d46", MAC:"2a:ca:31:fd:43:9f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 12:56:00.755407 env[1734]: 2024-02-13 12:56:00.749 [INFO][4749] k8s.go 491: Wrote updated endpoint to datastore ContainerID="0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528" Namespace="kube-system" Pod="coredns-787d4945fb-f8r2l" WorkloadEndpoint="ip--172--31--23--232-k8s-coredns--787d4945fb--f8r2l-eth0" Feb 13 12:56:00.798660 env[1734]: time="2024-02-13T12:56:00.798161802Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 12:56:00.798919 env[1734]: time="2024-02-13T12:56:00.798869774Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 12:56:00.799157 env[1734]: time="2024-02-13T12:56:00.799107333Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 12:56:00.799581 env[1734]: time="2024-02-13T12:56:00.799524852Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528 pid=4808 runtime=io.containerd.runc.v2 Feb 13 12:56:00.831894 systemd[1]: Started cri-containerd-0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528.scope. Feb 13 12:56:00.873456 kernel: kauditd_printk_skb: 367 callbacks suppressed Feb 13 12:56:00.873612 kernel: audit: type=1325 audit(1707828960.863:1266): table=filter:117 family=2 entries=44 op=nft_register_chain pid=4828 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 12:56:00.863000 audit[4828]: NETFILTER_CFG table=filter:117 family=2 entries=44 op=nft_register_chain pid=4828 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 12:56:00.863000 audit[4828]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21940 a0=3 a1=fffffdb55470 a2=0 a3=ffff93447fa8 items=0 ppid=4240 pid=4828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:00.887546 kernel: audit: type=1300 audit(1707828960.863:1266): arch=c00000b7 syscall=211 success=yes exit=21940 a0=3 a1=fffffdb55470 a2=0 a3=ffff93447fa8 items=0 ppid=4240 pid=4828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:00.863000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 12:56:00.898837 kernel: audit: type=1327 audit(1707828960.863:1266): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 12:56:00.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.907616 kernel: audit: type=1400 audit(1707828960.890:1267): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.915305 kernel: audit: type=1400 audit(1707828960.890:1268): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.923099 kernel: audit: type=1400 audit(1707828960.890:1269): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.930868 kernel: audit: type=1400 audit(1707828960.890:1270): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.941545 kernel: audit: type=1400 audit(1707828960.890:1271): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.953245 kernel: audit: type=1400 audit(1707828960.890:1272): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.968125 kernel: audit: type=1400 audit(1707828960.890:1273): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.890000 audit: BPF prog-id=167 op=LOAD Feb 13 12:56:00.891000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.891000 audit[4818]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4808 pid=4818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:00.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062333333623466646433313438643466343037343231646133653737 Feb 13 12:56:00.891000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.891000 audit[4818]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4808 pid=4818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:00.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062333333623466646433313438643466343037343231646133653737 Feb 13 12:56:00.891000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.891000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.891000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.891000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.891000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.891000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.891000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.891000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.891000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.891000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.891000 audit: BPF prog-id=168 op=LOAD Feb 13 12:56:00.891000 audit[4818]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4808 pid=4818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:00.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062333333623466646433313438643466343037343231646133653737 Feb 13 12:56:00.898000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.898000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.898000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.898000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.898000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.898000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.898000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.898000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.898000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.898000 audit: BPF prog-id=169 op=LOAD Feb 13 12:56:00.898000 audit[4818]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4808 pid=4818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:00.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062333333623466646433313438643466343037343231646133653737 Feb 13 12:56:00.898000 audit: BPF prog-id=169 op=UNLOAD Feb 13 12:56:00.898000 audit: BPF prog-id=168 op=UNLOAD Feb 13 12:56:00.898000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.898000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.898000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.898000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.898000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.898000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.898000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.898000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.898000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.898000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:00.898000 audit: BPF prog-id=170 op=LOAD Feb 13 12:56:00.898000 audit[4818]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4808 pid=4818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:00.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062333333623466646433313438643466343037343231646133653737 Feb 13 12:56:01.005539 systemd[1]: run-netns-cni\x2d661d64c4\x2d8f26\x2d67bb\x2dfc3b\x2d3f37bbb6e19d.mount: Deactivated successfully. Feb 13 12:56:01.032273 env[1734]: time="2024-02-13T12:56:01.032186425Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-f8r2l,Uid:c08d9a76-a82d-4c00-8820-2e1b9426d7d6,Namespace:kube-system,Attempt:1,} returns sandbox id \"0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528\"" Feb 13 12:56:01.041883 env[1734]: time="2024-02-13T12:56:01.041825445Z" level=info msg="CreateContainer within sandbox \"0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 13 12:56:01.058795 kubelet[3074]: I0213 12:56:01.058582 3074 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-zgh7h" podStartSLOduration=42.058502706 pod.CreationTimestamp="2024-02-13 12:55:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 12:56:01.011720097 +0000 UTC m=+55.913492439" watchObservedRunningTime="2024-02-13 12:56:01.058502706 +0000 UTC m=+55.960275036" Feb 13 12:56:01.071176 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1917921489.mount: Deactivated successfully. Feb 13 12:56:01.086616 env[1734]: time="2024-02-13T12:56:01.086508085Z" level=info msg="CreateContainer within sandbox \"0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"9f5acc68ec44450c7d397a911d109798796227d72b19f52c2158af938f6a66d6\"" Feb 13 12:56:01.087605 env[1734]: time="2024-02-13T12:56:01.087534293Z" level=info msg="StartContainer for \"9f5acc68ec44450c7d397a911d109798796227d72b19f52c2158af938f6a66d6\"" Feb 13 12:56:01.135236 systemd[1]: Started cri-containerd-9f5acc68ec44450c7d397a911d109798796227d72b19f52c2158af938f6a66d6.scope. Feb 13 12:56:01.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.170000 audit: BPF prog-id=171 op=LOAD Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4808 pid=4852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:01.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966356163633638656334343435306337643339376139313164313039 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4808 pid=4852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:01.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966356163633638656334343435306337643339376139313164313039 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit: BPF prog-id=172 op=LOAD Feb 13 12:56:01.172000 audit[4852]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4808 pid=4852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:01.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966356163633638656334343435306337643339376139313164313039 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit: BPF prog-id=173 op=LOAD Feb 13 12:56:01.172000 audit[4852]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4808 pid=4852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:01.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966356163633638656334343435306337643339376139313164313039 Feb 13 12:56:01.172000 audit: BPF prog-id=173 op=UNLOAD Feb 13 12:56:01.172000 audit: BPF prog-id=172 op=UNLOAD Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:01.172000 audit: BPF prog-id=174 op=LOAD Feb 13 12:56:01.172000 audit[4852]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4808 pid=4852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:01.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966356163633638656334343435306337643339376139313164313039 Feb 13 12:56:01.203290 env[1734]: time="2024-02-13T12:56:01.203209494Z" level=info msg="StartContainer for \"9f5acc68ec44450c7d397a911d109798796227d72b19f52c2158af938f6a66d6\" returns successfully" Feb 13 12:56:01.212690 systemd-networkd[1541]: calib0d5272a82f: Gained IPv6LL Feb 13 12:56:01.218000 audit[2678]: AVC avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:56:01.218000 audit[2678]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=400abde000 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:56:01.218000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:56:01.219000 audit[2678]: AVC avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:56:01.219000 audit[2678]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=400404eda0 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:56:01.219000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:56:01.221000 audit[2678]: AVC avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:56:01.221000 audit[2678]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=400abde090 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:56:01.221000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:56:01.288000 audit[2678]: AVC avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:56:01.289000 audit[2678]: AVC avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:56:01.288000 audit[2678]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=400abde3c0 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:56:01.288000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:56:01.289000 audit[2678]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=400411f5a0 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:56:01.289000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:56:01.302000 audit[2678]: AVC avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:56:01.302000 audit[2678]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=400abdeb10 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:56:01.302000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:56:01.314000 audit[4903]: NETFILTER_CFG table=filter:118 family=2 entries=12 op=nft_register_rule pid=4903 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:56:01.314000 audit[4903]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=ffffe9927080 a2=0 a3=ffffab3336c0 items=0 ppid=3261 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:01.314000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:56:01.333000 audit[4903]: NETFILTER_CFG table=nat:119 family=2 entries=30 op=nft_register_rule pid=4903 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:56:01.333000 audit[4903]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8836 a0=3 a1=ffffe9927080 a2=0 a3=ffffab3336c0 items=0 ppid=3261 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:01.333000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:56:01.404579 systemd-networkd[1541]: cali0967dce8f1d: Gained IPv6LL Feb 13 12:56:01.437000 audit[4929]: NETFILTER_CFG table=filter:120 family=2 entries=9 op=nft_register_rule pid=4929 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:56:01.437000 audit[4929]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffdc15fd20 a2=0 a3=ffff953c86c0 items=0 ppid=3261 pid=4929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:01.437000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:56:01.441000 audit[4929]: NETFILTER_CFG table=nat:121 family=2 entries=51 op=nft_register_chain pid=4929 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:56:01.441000 audit[4929]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19324 a0=3 a1=ffffdc15fd20 a2=0 a3=ffff953c86c0 items=0 ppid=3261 pid=4929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:01.441000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:56:01.532620 systemd-networkd[1541]: cali6964aa00799: Gained IPv6LL Feb 13 12:56:01.762000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:56:01.762000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000e55ba0 a2=fc6 a3=0 items=0 ppid=2501 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 key=(null) Feb 13 12:56:01.762000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 12:56:01.762000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:56:01.762000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001da6570 a2=fc6 a3=0 items=0 ppid=2501 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 key=(null) Feb 13 12:56:01.762000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 12:56:02.048536 kubelet[3074]: I0213 12:56:02.048360 3074 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-f8r2l" podStartSLOduration=43.048282296 pod.CreationTimestamp="2024-02-13 12:55:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 12:56:02.018530448 +0000 UTC m=+56.920302778" watchObservedRunningTime="2024-02-13 12:56:02.048282296 +0000 UTC m=+56.950054650" Feb 13 12:56:02.238823 env[1734]: time="2024-02-13T12:56:02.238761820Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:56:02.242442 env[1734]: time="2024-02-13T12:56:02.242359628Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:56:02.246419 env[1734]: time="2024-02-13T12:56:02.246326190Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:56:02.247932 env[1734]: time="2024-02-13T12:56:02.247864418Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:56:02.249107 env[1734]: time="2024-02-13T12:56:02.249030832Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 13 12:56:02.250871 env[1734]: time="2024-02-13T12:56:02.250821438Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 13 12:56:02.254986 env[1734]: time="2024-02-13T12:56:02.252394873Z" level=info msg="CreateContainer within sandbox \"d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 13 12:56:02.331000 audit[4956]: NETFILTER_CFG table=filter:122 family=2 entries=6 op=nft_register_rule pid=4956 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:56:02.331000 audit[4956]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffd5937800 a2=0 a3=ffffafb836c0 items=0 ppid=3261 pid=4956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:02.331000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:56:02.358328 env[1734]: time="2024-02-13T12:56:02.358246157Z" level=info msg="CreateContainer within sandbox \"d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"dc51bba1140edac887a317f69e9e4fe987fa3bfff3d0c3063be4f3de7cc4f0dc\"" Feb 13 12:56:02.362898 env[1734]: time="2024-02-13T12:56:02.362815203Z" level=info msg="StartContainer for \"dc51bba1140edac887a317f69e9e4fe987fa3bfff3d0c3063be4f3de7cc4f0dc\"" Feb 13 12:56:02.355000 audit[4956]: NETFILTER_CFG table=nat:123 family=2 entries=72 op=nft_register_chain pid=4956 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:56:02.355000 audit[4956]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffd5937800 a2=0 a3=ffffafb836c0 items=0 ppid=3261 pid=4956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:02.355000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:56:02.454232 systemd[1]: Started cri-containerd-dc51bba1140edac887a317f69e9e4fe987fa3bfff3d0c3063be4f3de7cc4f0dc.scope. Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit[4965]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4675 pid=4965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:02.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463353162626131313430656461633838376133313766363965396534 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit: BPF prog-id=175 op=LOAD Feb 13 12:56:02.513000 audit[4965]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4675 pid=4965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:02.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463353162626131313430656461633838376133313766363965396534 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit: BPF prog-id=176 op=LOAD Feb 13 12:56:02.513000 audit[4965]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4675 pid=4965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:02.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463353162626131313430656461633838376133313766363965396534 Feb 13 12:56:02.513000 audit: BPF prog-id=176 op=UNLOAD Feb 13 12:56:02.513000 audit: BPF prog-id=175 op=UNLOAD Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { perfmon } for pid=4965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit[4965]: AVC avc: denied { bpf } for pid=4965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:02.513000 audit: BPF prog-id=177 op=LOAD Feb 13 12:56:02.513000 audit[4965]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4675 pid=4965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:02.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463353162626131313430656461633838376133313766363965396534 Feb 13 12:56:02.547559 env[1734]: time="2024-02-13T12:56:02.547474032Z" level=info msg="StartContainer for \"dc51bba1140edac887a317f69e9e4fe987fa3bfff3d0c3063be4f3de7cc4f0dc\" returns successfully" Feb 13 12:56:02.556772 systemd-networkd[1541]: calibe90c3d0d46: Gained IPv6LL Feb 13 12:56:03.706244 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2106787671.mount: Deactivated successfully. Feb 13 12:56:05.348596 env[1734]: time="2024-02-13T12:56:05.348539944Z" level=info msg="StopPodSandbox for \"681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e\"" Feb 13 12:56:05.626532 env[1734]: 2024-02-13 12:56:05.515 [WARNING][5012] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--232-k8s-coredns--787d4945fb--f8r2l-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"c08d9a76-a82d-4c00-8820-2e1b9426d7d6", ResourceVersion:"738", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 12, 55, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-232", ContainerID:"0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528", Pod:"coredns-787d4945fb-f8r2l", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibe90c3d0d46", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 12:56:05.626532 env[1734]: 2024-02-13 12:56:05.516 [INFO][5012] k8s.go 578: Cleaning up netns ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" Feb 13 12:56:05.626532 env[1734]: 2024-02-13 12:56:05.516 [INFO][5012] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" iface="eth0" netns="" Feb 13 12:56:05.626532 env[1734]: 2024-02-13 12:56:05.516 [INFO][5012] k8s.go 585: Releasing IP address(es) ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" Feb 13 12:56:05.626532 env[1734]: 2024-02-13 12:56:05.516 [INFO][5012] utils.go 188: Calico CNI releasing IP address ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" Feb 13 12:56:05.626532 env[1734]: 2024-02-13 12:56:05.581 [INFO][5018] ipam_plugin.go 415: Releasing address using handleID ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" HandleID="k8s-pod-network.681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" Workload="ip--172--31--23--232-k8s-coredns--787d4945fb--f8r2l-eth0" Feb 13 12:56:05.626532 env[1734]: 2024-02-13 12:56:05.581 [INFO][5018] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 12:56:05.626532 env[1734]: 2024-02-13 12:56:05.582 [INFO][5018] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 12:56:05.626532 env[1734]: 2024-02-13 12:56:05.602 [WARNING][5018] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" HandleID="k8s-pod-network.681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" Workload="ip--172--31--23--232-k8s-coredns--787d4945fb--f8r2l-eth0" Feb 13 12:56:05.626532 env[1734]: 2024-02-13 12:56:05.603 [INFO][5018] ipam_plugin.go 443: Releasing address using workloadID ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" HandleID="k8s-pod-network.681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" Workload="ip--172--31--23--232-k8s-coredns--787d4945fb--f8r2l-eth0" Feb 13 12:56:05.626532 env[1734]: 2024-02-13 12:56:05.605 [INFO][5018] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 12:56:05.626532 env[1734]: 2024-02-13 12:56:05.609 [INFO][5012] k8s.go 591: Teardown processing complete. ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" Feb 13 12:56:05.627740 env[1734]: time="2024-02-13T12:56:05.627688873Z" level=info msg="TearDown network for sandbox \"681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e\" successfully" Feb 13 12:56:05.627887 env[1734]: time="2024-02-13T12:56:05.627851254Z" level=info msg="StopPodSandbox for \"681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e\" returns successfully" Feb 13 12:56:05.634790 env[1734]: time="2024-02-13T12:56:05.634711426Z" level=info msg="RemovePodSandbox for \"681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e\"" Feb 13 12:56:05.635015 env[1734]: time="2024-02-13T12:56:05.634787445Z" level=info msg="Forcibly stopping sandbox \"681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e\"" Feb 13 12:56:05.800769 env[1734]: time="2024-02-13T12:56:05.800687014Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:56:05.804514 env[1734]: time="2024-02-13T12:56:05.804430686Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:56:05.808137 env[1734]: time="2024-02-13T12:56:05.808064499Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:56:05.815670 env[1734]: time="2024-02-13T12:56:05.815594525Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:56:05.818234 env[1734]: time="2024-02-13T12:56:05.818159345Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8\"" Feb 13 12:56:05.822836 env[1734]: time="2024-02-13T12:56:05.822415457Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 13 12:56:05.849998 env[1734]: time="2024-02-13T12:56:05.849238273Z" level=info msg="CreateContainer within sandbox \"cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 13 12:56:05.869057 env[1734]: 2024-02-13 12:56:05.761 [WARNING][5041] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--232-k8s-coredns--787d4945fb--f8r2l-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"c08d9a76-a82d-4c00-8820-2e1b9426d7d6", ResourceVersion:"738", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 12, 55, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-232", ContainerID:"0b333b4fdd3148d4f407421da3e77023cfeae1dfb8edad52a1f5116bbdf3a528", Pod:"coredns-787d4945fb-f8r2l", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibe90c3d0d46", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 12:56:05.869057 env[1734]: 2024-02-13 12:56:05.762 [INFO][5041] k8s.go 578: Cleaning up netns ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" Feb 13 12:56:05.869057 env[1734]: 2024-02-13 12:56:05.762 [INFO][5041] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" iface="eth0" netns="" Feb 13 12:56:05.869057 env[1734]: 2024-02-13 12:56:05.762 [INFO][5041] k8s.go 585: Releasing IP address(es) ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" Feb 13 12:56:05.869057 env[1734]: 2024-02-13 12:56:05.762 [INFO][5041] utils.go 188: Calico CNI releasing IP address ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" Feb 13 12:56:05.869057 env[1734]: 2024-02-13 12:56:05.844 [INFO][5048] ipam_plugin.go 415: Releasing address using handleID ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" HandleID="k8s-pod-network.681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" Workload="ip--172--31--23--232-k8s-coredns--787d4945fb--f8r2l-eth0" Feb 13 12:56:05.869057 env[1734]: 2024-02-13 12:56:05.844 [INFO][5048] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 12:56:05.869057 env[1734]: 2024-02-13 12:56:05.845 [INFO][5048] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 12:56:05.869057 env[1734]: 2024-02-13 12:56:05.859 [WARNING][5048] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" HandleID="k8s-pod-network.681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" Workload="ip--172--31--23--232-k8s-coredns--787d4945fb--f8r2l-eth0" Feb 13 12:56:05.869057 env[1734]: 2024-02-13 12:56:05.859 [INFO][5048] ipam_plugin.go 443: Releasing address using workloadID ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" HandleID="k8s-pod-network.681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" Workload="ip--172--31--23--232-k8s-coredns--787d4945fb--f8r2l-eth0" Feb 13 12:56:05.869057 env[1734]: 2024-02-13 12:56:05.862 [INFO][5048] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 12:56:05.869057 env[1734]: 2024-02-13 12:56:05.866 [INFO][5041] k8s.go 591: Teardown processing complete. ContainerID="681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e" Feb 13 12:56:05.870253 env[1734]: time="2024-02-13T12:56:05.870203347Z" level=info msg="TearDown network for sandbox \"681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e\" successfully" Feb 13 12:56:05.886411 env[1734]: time="2024-02-13T12:56:05.885118706Z" level=info msg="RemovePodSandbox \"681091db65d2517e9302910dfdd2df1f8394dc4f2df1be7ed5a1e5b9aba89f6e\" returns successfully" Feb 13 12:56:05.889091 env[1734]: time="2024-02-13T12:56:05.889040431Z" level=info msg="StopPodSandbox for \"eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3\"" Feb 13 12:56:05.894549 env[1734]: time="2024-02-13T12:56:05.891845415Z" level=info msg="CreateContainer within sandbox \"cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"772295ff091cd8be7083a1b60105dc40139aa9685bee88cc4fac1d41994a36e8\"" Feb 13 12:56:05.892162 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2399498757.mount: Deactivated successfully. Feb 13 12:56:05.896382 env[1734]: time="2024-02-13T12:56:05.896155251Z" level=info msg="StartContainer for \"772295ff091cd8be7083a1b60105dc40139aa9685bee88cc4fac1d41994a36e8\"" Feb 13 12:56:05.983558 systemd[1]: Started cri-containerd-772295ff091cd8be7083a1b60105dc40139aa9685bee88cc4fac1d41994a36e8.scope. Feb 13 12:56:06.056091 kernel: kauditd_printk_skb: 192 callbacks suppressed Feb 13 12:56:06.056244 kernel: audit: type=1400 audit(1707828966.052:1323): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.077340 kernel: audit: type=1400 audit(1707828966.052:1324): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.085317 kernel: audit: type=1400 audit(1707828966.052:1325): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.094188 kernel: audit: type=1400 audit(1707828966.052:1326): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.103001 kernel: audit: type=1400 audit(1707828966.052:1327): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.112979 kernel: audit: type=1400 audit(1707828966.052:1328): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.125038 kernel: audit: type=1400 audit(1707828966.052:1329): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.134134 kernel: audit: type=1400 audit(1707828966.052:1330): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.142259 kernel: audit: type=1400 audit(1707828966.052:1331): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.054000 audit: BPF prog-id=178 op=LOAD Feb 13 12:56:06.151343 kernel: audit: type=1400 audit(1707828966.054:1332): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.062000 audit[5073]: AVC avc: denied { bpf } for pid=5073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.062000 audit[5073]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4642 pid=5073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:06.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737323239356666303931636438626537303833613162363031303564 Feb 13 12:56:06.062000 audit[5073]: AVC avc: denied { perfmon } for pid=5073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.062000 audit[5073]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4642 pid=5073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:06.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737323239356666303931636438626537303833613162363031303564 Feb 13 12:56:06.062000 audit[5073]: AVC avc: denied { bpf } for pid=5073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.062000 audit[5073]: AVC avc: denied { bpf } for pid=5073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.062000 audit[5073]: AVC avc: denied { bpf } for pid=5073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.062000 audit[5073]: AVC avc: denied { perfmon } for pid=5073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.062000 audit[5073]: AVC avc: denied { perfmon } for pid=5073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.062000 audit[5073]: AVC avc: denied { perfmon } for pid=5073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.062000 audit[5073]: AVC avc: denied { perfmon } for pid=5073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.062000 audit[5073]: AVC avc: denied { perfmon } for pid=5073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.062000 audit[5073]: AVC avc: denied { bpf } for pid=5073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.062000 audit[5073]: AVC avc: denied { bpf } for pid=5073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.062000 audit: BPF prog-id=179 op=LOAD Feb 13 12:56:06.062000 audit[5073]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4642 pid=5073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:06.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737323239356666303931636438626537303833613162363031303564 Feb 13 12:56:06.062000 audit[5073]: AVC avc: denied { bpf } for pid=5073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.062000 audit[5073]: AVC avc: denied { bpf } for pid=5073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.062000 audit[5073]: AVC avc: denied { perfmon } for pid=5073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.062000 audit[5073]: AVC avc: denied { perfmon } for pid=5073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.062000 audit[5073]: AVC avc: denied { perfmon } for pid=5073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.062000 audit[5073]: AVC avc: denied { perfmon } for pid=5073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.062000 audit[5073]: AVC avc: denied { perfmon } for pid=5073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.062000 audit[5073]: AVC avc: denied { bpf } for pid=5073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.062000 audit[5073]: AVC avc: denied { bpf } for pid=5073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.062000 audit: BPF prog-id=180 op=LOAD Feb 13 12:56:06.062000 audit[5073]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4642 pid=5073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:06.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737323239356666303931636438626537303833613162363031303564 Feb 13 12:56:06.062000 audit: BPF prog-id=180 op=UNLOAD Feb 13 12:56:06.063000 audit: BPF prog-id=179 op=UNLOAD Feb 13 12:56:06.063000 audit[5073]: AVC avc: denied { bpf } for pid=5073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.063000 audit[5073]: AVC avc: denied { bpf } for pid=5073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.063000 audit[5073]: AVC avc: denied { bpf } for pid=5073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.063000 audit[5073]: AVC avc: denied { perfmon } for pid=5073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.063000 audit[5073]: AVC avc: denied { perfmon } for pid=5073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.063000 audit[5073]: AVC avc: denied { perfmon } for pid=5073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.063000 audit[5073]: AVC avc: denied { perfmon } for pid=5073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.063000 audit[5073]: AVC avc: denied { perfmon } for pid=5073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.063000 audit[5073]: AVC avc: denied { bpf } for pid=5073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.063000 audit[5073]: AVC avc: denied { bpf } for pid=5073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:06.063000 audit: BPF prog-id=181 op=LOAD Feb 13 12:56:06.063000 audit[5073]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4642 pid=5073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:06.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737323239356666303931636438626537303833613162363031303564 Feb 13 12:56:06.168111 env[1734]: time="2024-02-13T12:56:06.168027436Z" level=info msg="StartContainer for \"772295ff091cd8be7083a1b60105dc40139aa9685bee88cc4fac1d41994a36e8\" returns successfully" Feb 13 12:56:06.209882 env[1734]: 2024-02-13 12:56:06.116 [WARNING][5082] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--232-k8s-calico--kube--controllers--59fd566959--qljwd-eth0", GenerateName:"calico-kube-controllers-59fd566959-", Namespace:"calico-system", SelfLink:"", UID:"081a0ef1-5542-49e3-9722-6bef7e5d16e8", ResourceVersion:"708", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 12, 55, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"59fd566959", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-232", ContainerID:"cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7", Pod:"calico-kube-controllers-59fd566959-qljwd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.110.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6964aa00799", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 12:56:06.209882 env[1734]: 2024-02-13 12:56:06.116 [INFO][5082] k8s.go 578: Cleaning up netns ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" Feb 13 12:56:06.209882 env[1734]: 2024-02-13 12:56:06.116 [INFO][5082] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" iface="eth0" netns="" Feb 13 12:56:06.209882 env[1734]: 2024-02-13 12:56:06.117 [INFO][5082] k8s.go 585: Releasing IP address(es) ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" Feb 13 12:56:06.209882 env[1734]: 2024-02-13 12:56:06.117 [INFO][5082] utils.go 188: Calico CNI releasing IP address ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" Feb 13 12:56:06.209882 env[1734]: 2024-02-13 12:56:06.186 [INFO][5101] ipam_plugin.go 415: Releasing address using handleID ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" HandleID="k8s-pod-network.eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" Workload="ip--172--31--23--232-k8s-calico--kube--controllers--59fd566959--qljwd-eth0" Feb 13 12:56:06.209882 env[1734]: 2024-02-13 12:56:06.186 [INFO][5101] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 12:56:06.209882 env[1734]: 2024-02-13 12:56:06.186 [INFO][5101] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 12:56:06.209882 env[1734]: 2024-02-13 12:56:06.202 [WARNING][5101] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" HandleID="k8s-pod-network.eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" Workload="ip--172--31--23--232-k8s-calico--kube--controllers--59fd566959--qljwd-eth0" Feb 13 12:56:06.209882 env[1734]: 2024-02-13 12:56:06.202 [INFO][5101] ipam_plugin.go 443: Releasing address using workloadID ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" HandleID="k8s-pod-network.eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" Workload="ip--172--31--23--232-k8s-calico--kube--controllers--59fd566959--qljwd-eth0" Feb 13 12:56:06.209882 env[1734]: 2024-02-13 12:56:06.205 [INFO][5101] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 12:56:06.209882 env[1734]: 2024-02-13 12:56:06.207 [INFO][5082] k8s.go 591: Teardown processing complete. ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" Feb 13 12:56:06.210832 env[1734]: time="2024-02-13T12:56:06.209920301Z" level=info msg="TearDown network for sandbox \"eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3\" successfully" Feb 13 12:56:06.210832 env[1734]: time="2024-02-13T12:56:06.210010144Z" level=info msg="StopPodSandbox for \"eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3\" returns successfully" Feb 13 12:56:06.210832 env[1734]: time="2024-02-13T12:56:06.210567777Z" level=info msg="RemovePodSandbox for \"eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3\"" Feb 13 12:56:06.210832 env[1734]: time="2024-02-13T12:56:06.210616280Z" level=info msg="Forcibly stopping sandbox \"eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3\"" Feb 13 12:56:06.413820 env[1734]: 2024-02-13 12:56:06.308 [WARNING][5128] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--232-k8s-calico--kube--controllers--59fd566959--qljwd-eth0", GenerateName:"calico-kube-controllers-59fd566959-", Namespace:"calico-system", SelfLink:"", UID:"081a0ef1-5542-49e3-9722-6bef7e5d16e8", ResourceVersion:"708", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 12, 55, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"59fd566959", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-232", ContainerID:"cc3832d8beefb4168f02376dba21ca7b41c5c5fa50fb0f4da1a95f47b6f95ea7", Pod:"calico-kube-controllers-59fd566959-qljwd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.110.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6964aa00799", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 12:56:06.413820 env[1734]: 2024-02-13 12:56:06.309 [INFO][5128] k8s.go 578: Cleaning up netns ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" Feb 13 12:56:06.413820 env[1734]: 2024-02-13 12:56:06.309 [INFO][5128] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" iface="eth0" netns="" Feb 13 12:56:06.413820 env[1734]: 2024-02-13 12:56:06.309 [INFO][5128] k8s.go 585: Releasing IP address(es) ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" Feb 13 12:56:06.413820 env[1734]: 2024-02-13 12:56:06.309 [INFO][5128] utils.go 188: Calico CNI releasing IP address ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" Feb 13 12:56:06.413820 env[1734]: 2024-02-13 12:56:06.387 [INFO][5134] ipam_plugin.go 415: Releasing address using handleID ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" HandleID="k8s-pod-network.eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" Workload="ip--172--31--23--232-k8s-calico--kube--controllers--59fd566959--qljwd-eth0" Feb 13 12:56:06.413820 env[1734]: 2024-02-13 12:56:06.388 [INFO][5134] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 12:56:06.413820 env[1734]: 2024-02-13 12:56:06.388 [INFO][5134] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 12:56:06.413820 env[1734]: 2024-02-13 12:56:06.405 [WARNING][5134] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" HandleID="k8s-pod-network.eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" Workload="ip--172--31--23--232-k8s-calico--kube--controllers--59fd566959--qljwd-eth0" Feb 13 12:56:06.413820 env[1734]: 2024-02-13 12:56:06.405 [INFO][5134] ipam_plugin.go 443: Releasing address using workloadID ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" HandleID="k8s-pod-network.eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" Workload="ip--172--31--23--232-k8s-calico--kube--controllers--59fd566959--qljwd-eth0" Feb 13 12:56:06.413820 env[1734]: 2024-02-13 12:56:06.409 [INFO][5134] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 12:56:06.413820 env[1734]: 2024-02-13 12:56:06.411 [INFO][5128] k8s.go 591: Teardown processing complete. ContainerID="eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3" Feb 13 12:56:06.416463 env[1734]: time="2024-02-13T12:56:06.413770114Z" level=info msg="TearDown network for sandbox \"eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3\" successfully" Feb 13 12:56:06.422908 env[1734]: time="2024-02-13T12:56:06.422806636Z" level=info msg="RemovePodSandbox \"eaf7e0180a01fd72b413a86b028ee0015b1657e1f7cdee84cc14c9329f8378d3\" returns successfully" Feb 13 12:56:06.423594 env[1734]: time="2024-02-13T12:56:06.423543439Z" level=info msg="StopPodSandbox for \"7762061072217d63d09dc652c32102557758496730844678805468e604e286fb\"" Feb 13 12:56:06.630090 env[1734]: 2024-02-13 12:56:06.508 [WARNING][5153] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--232-k8s-coredns--787d4945fb--zgh7h-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"746068bd-2374-4d72-801d-12cadc04a979", ResourceVersion:"728", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 12, 55, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-232", ContainerID:"0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7", Pod:"coredns-787d4945fb-zgh7h", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0967dce8f1d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 12:56:06.630090 env[1734]: 2024-02-13 12:56:06.508 [INFO][5153] k8s.go 578: Cleaning up netns ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" Feb 13 12:56:06.630090 env[1734]: 2024-02-13 12:56:06.509 [INFO][5153] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" iface="eth0" netns="" Feb 13 12:56:06.630090 env[1734]: 2024-02-13 12:56:06.509 [INFO][5153] k8s.go 585: Releasing IP address(es) ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" Feb 13 12:56:06.630090 env[1734]: 2024-02-13 12:56:06.509 [INFO][5153] utils.go 188: Calico CNI releasing IP address ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" Feb 13 12:56:06.630090 env[1734]: 2024-02-13 12:56:06.594 [INFO][5159] ipam_plugin.go 415: Releasing address using handleID ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" HandleID="k8s-pod-network.7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" Workload="ip--172--31--23--232-k8s-coredns--787d4945fb--zgh7h-eth0" Feb 13 12:56:06.630090 env[1734]: 2024-02-13 12:56:06.594 [INFO][5159] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 12:56:06.630090 env[1734]: 2024-02-13 12:56:06.594 [INFO][5159] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 12:56:06.630090 env[1734]: 2024-02-13 12:56:06.613 [WARNING][5159] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" HandleID="k8s-pod-network.7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" Workload="ip--172--31--23--232-k8s-coredns--787d4945fb--zgh7h-eth0" Feb 13 12:56:06.630090 env[1734]: 2024-02-13 12:56:06.613 [INFO][5159] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" HandleID="k8s-pod-network.7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" Workload="ip--172--31--23--232-k8s-coredns--787d4945fb--zgh7h-eth0" Feb 13 12:56:06.630090 env[1734]: 2024-02-13 12:56:06.624 [INFO][5159] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 12:56:06.630090 env[1734]: 2024-02-13 12:56:06.627 [INFO][5153] k8s.go 591: Teardown processing complete. ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" Feb 13 12:56:06.631401 env[1734]: time="2024-02-13T12:56:06.631322722Z" level=info msg="TearDown network for sandbox \"7762061072217d63d09dc652c32102557758496730844678805468e604e286fb\" successfully" Feb 13 12:56:06.631545 env[1734]: time="2024-02-13T12:56:06.631510951Z" level=info msg="StopPodSandbox for \"7762061072217d63d09dc652c32102557758496730844678805468e604e286fb\" returns successfully" Feb 13 12:56:06.632788 env[1734]: time="2024-02-13T12:56:06.632720296Z" level=info msg="RemovePodSandbox for \"7762061072217d63d09dc652c32102557758496730844678805468e604e286fb\"" Feb 13 12:56:06.633343 env[1734]: time="2024-02-13T12:56:06.633272205Z" level=info msg="Forcibly stopping sandbox \"7762061072217d63d09dc652c32102557758496730844678805468e604e286fb\"" Feb 13 12:56:06.818373 env[1734]: 2024-02-13 12:56:06.727 [WARNING][5180] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--232-k8s-coredns--787d4945fb--zgh7h-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"746068bd-2374-4d72-801d-12cadc04a979", ResourceVersion:"728", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 12, 55, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-232", ContainerID:"0ba284f448563fc818fe240811287d0991dc26b9969fc789aa74574a2259b5c7", Pod:"coredns-787d4945fb-zgh7h", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0967dce8f1d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 12:56:06.818373 env[1734]: 2024-02-13 12:56:06.728 [INFO][5180] k8s.go 578: Cleaning up netns ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" Feb 13 12:56:06.818373 env[1734]: 2024-02-13 12:56:06.728 [INFO][5180] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" iface="eth0" netns="" Feb 13 12:56:06.818373 env[1734]: 2024-02-13 12:56:06.728 [INFO][5180] k8s.go 585: Releasing IP address(es) ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" Feb 13 12:56:06.818373 env[1734]: 2024-02-13 12:56:06.728 [INFO][5180] utils.go 188: Calico CNI releasing IP address ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" Feb 13 12:56:06.818373 env[1734]: 2024-02-13 12:56:06.784 [INFO][5186] ipam_plugin.go 415: Releasing address using handleID ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" HandleID="k8s-pod-network.7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" Workload="ip--172--31--23--232-k8s-coredns--787d4945fb--zgh7h-eth0" Feb 13 12:56:06.818373 env[1734]: 2024-02-13 12:56:06.789 [INFO][5186] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 12:56:06.818373 env[1734]: 2024-02-13 12:56:06.789 [INFO][5186] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 12:56:06.818373 env[1734]: 2024-02-13 12:56:06.811 [WARNING][5186] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" HandleID="k8s-pod-network.7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" Workload="ip--172--31--23--232-k8s-coredns--787d4945fb--zgh7h-eth0" Feb 13 12:56:06.818373 env[1734]: 2024-02-13 12:56:06.811 [INFO][5186] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" HandleID="k8s-pod-network.7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" Workload="ip--172--31--23--232-k8s-coredns--787d4945fb--zgh7h-eth0" Feb 13 12:56:06.818373 env[1734]: 2024-02-13 12:56:06.814 [INFO][5186] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 12:56:06.818373 env[1734]: 2024-02-13 12:56:06.816 [INFO][5180] k8s.go 591: Teardown processing complete. ContainerID="7762061072217d63d09dc652c32102557758496730844678805468e604e286fb" Feb 13 12:56:06.819422 env[1734]: time="2024-02-13T12:56:06.819367869Z" level=info msg="TearDown network for sandbox \"7762061072217d63d09dc652c32102557758496730844678805468e604e286fb\" successfully" Feb 13 12:56:06.830433 env[1734]: time="2024-02-13T12:56:06.830367099Z" level=info msg="RemovePodSandbox \"7762061072217d63d09dc652c32102557758496730844678805468e604e286fb\" returns successfully" Feb 13 12:56:06.831368 env[1734]: time="2024-02-13T12:56:06.831305043Z" level=info msg="StopPodSandbox for \"cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da\"" Feb 13 12:56:07.019061 env[1734]: 2024-02-13 12:56:06.933 [WARNING][5204] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--232-k8s-csi--node--driver--jv8nx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f202d5b3-f8a1-45a5-a109-2d38cf1ff107", ResourceVersion:"711", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 12, 55, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-232", ContainerID:"d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21", Pod:"csi-node-driver-jv8nx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.110.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calib0d5272a82f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 12:56:07.019061 env[1734]: 2024-02-13 12:56:06.934 [INFO][5204] k8s.go 578: Cleaning up netns ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" Feb 13 12:56:07.019061 env[1734]: 2024-02-13 12:56:06.934 [INFO][5204] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" iface="eth0" netns="" Feb 13 12:56:07.019061 env[1734]: 2024-02-13 12:56:06.934 [INFO][5204] k8s.go 585: Releasing IP address(es) ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" Feb 13 12:56:07.019061 env[1734]: 2024-02-13 12:56:06.934 [INFO][5204] utils.go 188: Calico CNI releasing IP address ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" Feb 13 12:56:07.019061 env[1734]: 2024-02-13 12:56:06.996 [INFO][5210] ipam_plugin.go 415: Releasing address using handleID ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" HandleID="k8s-pod-network.cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" Workload="ip--172--31--23--232-k8s-csi--node--driver--jv8nx-eth0" Feb 13 12:56:07.019061 env[1734]: 2024-02-13 12:56:06.996 [INFO][5210] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 12:56:07.019061 env[1734]: 2024-02-13 12:56:06.996 [INFO][5210] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 12:56:07.019061 env[1734]: 2024-02-13 12:56:07.011 [WARNING][5210] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" HandleID="k8s-pod-network.cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" Workload="ip--172--31--23--232-k8s-csi--node--driver--jv8nx-eth0" Feb 13 12:56:07.019061 env[1734]: 2024-02-13 12:56:07.011 [INFO][5210] ipam_plugin.go 443: Releasing address using workloadID ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" HandleID="k8s-pod-network.cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" Workload="ip--172--31--23--232-k8s-csi--node--driver--jv8nx-eth0" Feb 13 12:56:07.019061 env[1734]: 2024-02-13 12:56:07.014 [INFO][5210] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 12:56:07.019061 env[1734]: 2024-02-13 12:56:07.017 [INFO][5204] k8s.go 591: Teardown processing complete. ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" Feb 13 12:56:07.019978 env[1734]: time="2024-02-13T12:56:07.019103811Z" level=info msg="TearDown network for sandbox \"cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da\" successfully" Feb 13 12:56:07.019978 env[1734]: time="2024-02-13T12:56:07.019149507Z" level=info msg="StopPodSandbox for \"cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da\" returns successfully" Feb 13 12:56:07.020621 env[1734]: time="2024-02-13T12:56:07.020553491Z" level=info msg="RemovePodSandbox for \"cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da\"" Feb 13 12:56:07.020787 env[1734]: time="2024-02-13T12:56:07.020621410Z" level=info msg="Forcibly stopping sandbox \"cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da\"" Feb 13 12:56:07.089154 kubelet[3074]: I0213 12:56:07.088983 3074 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-59fd566959-qljwd" podStartSLOduration=-9.223371997765907e+09 pod.CreationTimestamp="2024-02-13 12:55:28 +0000 UTC" firstStartedPulling="2024-02-13 12:56:00.583543468 +0000 UTC m=+55.485315798" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 12:56:07.081266681 +0000 UTC m=+61.983039023" watchObservedRunningTime="2024-02-13 12:56:07.088867852 +0000 UTC m=+61.990640182" Feb 13 12:56:07.160902 systemd[1]: run-containerd-runc-k8s.io-772295ff091cd8be7083a1b60105dc40139aa9685bee88cc4fac1d41994a36e8-runc.CeU4Fy.mount: Deactivated successfully. Feb 13 12:56:07.297130 env[1734]: 2024-02-13 12:56:07.184 [WARNING][5229] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--232-k8s-csi--node--driver--jv8nx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f202d5b3-f8a1-45a5-a109-2d38cf1ff107", ResourceVersion:"711", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 12, 55, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-232", ContainerID:"d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21", Pod:"csi-node-driver-jv8nx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.110.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calib0d5272a82f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 12:56:07.297130 env[1734]: 2024-02-13 12:56:07.185 [INFO][5229] k8s.go 578: Cleaning up netns ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" Feb 13 12:56:07.297130 env[1734]: 2024-02-13 12:56:07.185 [INFO][5229] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" iface="eth0" netns="" Feb 13 12:56:07.297130 env[1734]: 2024-02-13 12:56:07.185 [INFO][5229] k8s.go 585: Releasing IP address(es) ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" Feb 13 12:56:07.297130 env[1734]: 2024-02-13 12:56:07.185 [INFO][5229] utils.go 188: Calico CNI releasing IP address ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" Feb 13 12:56:07.297130 env[1734]: 2024-02-13 12:56:07.245 [INFO][5248] ipam_plugin.go 415: Releasing address using handleID ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" HandleID="k8s-pod-network.cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" Workload="ip--172--31--23--232-k8s-csi--node--driver--jv8nx-eth0" Feb 13 12:56:07.297130 env[1734]: 2024-02-13 12:56:07.245 [INFO][5248] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 12:56:07.297130 env[1734]: 2024-02-13 12:56:07.245 [INFO][5248] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 12:56:07.297130 env[1734]: 2024-02-13 12:56:07.280 [WARNING][5248] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" HandleID="k8s-pod-network.cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" Workload="ip--172--31--23--232-k8s-csi--node--driver--jv8nx-eth0" Feb 13 12:56:07.297130 env[1734]: 2024-02-13 12:56:07.280 [INFO][5248] ipam_plugin.go 443: Releasing address using workloadID ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" HandleID="k8s-pod-network.cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" Workload="ip--172--31--23--232-k8s-csi--node--driver--jv8nx-eth0" Feb 13 12:56:07.297130 env[1734]: 2024-02-13 12:56:07.290 [INFO][5248] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 12:56:07.297130 env[1734]: 2024-02-13 12:56:07.294 [INFO][5229] k8s.go 591: Teardown processing complete. ContainerID="cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da" Feb 13 12:56:07.298217 env[1734]: time="2024-02-13T12:56:07.297174233Z" level=info msg="TearDown network for sandbox \"cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da\" successfully" Feb 13 12:56:07.303647 env[1734]: time="2024-02-13T12:56:07.303563010Z" level=info msg="RemovePodSandbox \"cce0e1d6bfb327975acb3ce563d102abb1f813e2d4d37c9506675db7e2aac4da\" returns successfully" Feb 13 12:56:07.709860 env[1734]: time="2024-02-13T12:56:07.709792913Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:56:07.715139 env[1734]: time="2024-02-13T12:56:07.715061886Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:56:07.724468 env[1734]: time="2024-02-13T12:56:07.724391902Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:56:07.728485 env[1734]: time="2024-02-13T12:56:07.728409745Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:56:07.729725 env[1734]: time="2024-02-13T12:56:07.729650135Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 13 12:56:07.733557 env[1734]: time="2024-02-13T12:56:07.733472549Z" level=info msg="CreateContainer within sandbox \"d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 13 12:56:07.758891 env[1734]: time="2024-02-13T12:56:07.758813374Z" level=info msg="CreateContainer within sandbox \"d91410d10c74a5f32e558eb51c6922ecf1f84d77ef3732b4eff585cc2a1bcf21\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"71d06c229e2297820b15c5d71f09ea8a36be4587c82380c4dd8a155b208d180e\"" Feb 13 12:56:07.760067 env[1734]: time="2024-02-13T12:56:07.759932937Z" level=info msg="StartContainer for \"71d06c229e2297820b15c5d71f09ea8a36be4587c82380c4dd8a155b208d180e\"" Feb 13 12:56:07.805268 systemd[1]: Started cri-containerd-71d06c229e2297820b15c5d71f09ea8a36be4587c82380c4dd8a155b208d180e.scope. Feb 13 12:56:07.856000 audit[5270]: AVC avc: denied { perfmon } for pid=5270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.856000 audit[5270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=4675 pid=5270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:07.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731643036633232396532323937383230623135633564373166303965 Feb 13 12:56:07.857000 audit[5270]: AVC avc: denied { bpf } for pid=5270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.857000 audit[5270]: AVC avc: denied { bpf } for pid=5270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.857000 audit[5270]: AVC avc: denied { bpf } for pid=5270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.857000 audit[5270]: AVC avc: denied { perfmon } for pid=5270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.857000 audit[5270]: AVC avc: denied { perfmon } for pid=5270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.857000 audit[5270]: AVC avc: denied { perfmon } for pid=5270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.857000 audit[5270]: AVC avc: denied { perfmon } for pid=5270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.857000 audit[5270]: AVC avc: denied { perfmon } for pid=5270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.857000 audit[5270]: AVC avc: denied { bpf } for pid=5270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.857000 audit[5270]: AVC avc: denied { bpf } for pid=5270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.857000 audit: BPF prog-id=182 op=LOAD Feb 13 12:56:07.857000 audit[5270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=4675 pid=5270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:07.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731643036633232396532323937383230623135633564373166303965 Feb 13 12:56:07.859000 audit[5270]: AVC avc: denied { bpf } for pid=5270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.859000 audit[5270]: AVC avc: denied { bpf } for pid=5270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.859000 audit[5270]: AVC avc: denied { perfmon } for pid=5270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.859000 audit[5270]: AVC avc: denied { perfmon } for pid=5270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.859000 audit[5270]: AVC avc: denied { perfmon } for pid=5270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.859000 audit[5270]: AVC avc: denied { perfmon } for pid=5270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.859000 audit[5270]: AVC avc: denied { perfmon } for pid=5270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.859000 audit[5270]: AVC avc: denied { bpf } for pid=5270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.859000 audit[5270]: AVC avc: denied { bpf } for pid=5270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.859000 audit: BPF prog-id=183 op=LOAD Feb 13 12:56:07.859000 audit[5270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=4675 pid=5270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:07.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731643036633232396532323937383230623135633564373166303965 Feb 13 12:56:07.861000 audit: BPF prog-id=183 op=UNLOAD Feb 13 12:56:07.861000 audit: BPF prog-id=182 op=UNLOAD Feb 13 12:56:07.861000 audit[5270]: AVC avc: denied { bpf } for pid=5270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.861000 audit[5270]: AVC avc: denied { bpf } for pid=5270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.861000 audit[5270]: AVC avc: denied { bpf } for pid=5270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.861000 audit[5270]: AVC avc: denied { perfmon } for pid=5270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.861000 audit[5270]: AVC avc: denied { perfmon } for pid=5270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.861000 audit[5270]: AVC avc: denied { perfmon } for pid=5270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.861000 audit[5270]: AVC avc: denied { perfmon } for pid=5270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.861000 audit[5270]: AVC avc: denied { perfmon } for pid=5270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.861000 audit[5270]: AVC avc: denied { bpf } for pid=5270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.861000 audit[5270]: AVC avc: denied { bpf } for pid=5270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:07.861000 audit: BPF prog-id=184 op=LOAD Feb 13 12:56:07.861000 audit[5270]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=4675 pid=5270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:07.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731643036633232396532323937383230623135633564373166303965 Feb 13 12:56:07.897180 env[1734]: time="2024-02-13T12:56:07.893310176Z" level=info msg="StartContainer for \"71d06c229e2297820b15c5d71f09ea8a36be4587c82380c4dd8a155b208d180e\" returns successfully" Feb 13 12:56:08.674291 kubelet[3074]: I0213 12:56:08.674245 3074 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 13 12:56:08.674291 kubelet[3074]: I0213 12:56:08.674293 3074 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 13 12:56:13.947678 systemd[1]: run-containerd-runc-k8s.io-772295ff091cd8be7083a1b60105dc40139aa9685bee88cc4fac1d41994a36e8-runc.c8xktG.mount: Deactivated successfully. Feb 13 12:56:16.776122 kernel: kauditd_printk_skb: 90 callbacks suppressed Feb 13 12:56:16.776283 kernel: audit: type=1400 audit(1707828976.772:1347): avc: denied { watch } for pid=2638 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:56:16.772000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:56:16.772000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400241e7e0 a2=fc6 a3=0 items=0 ppid=2501 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 key=(null) Feb 13 12:56:16.796899 kernel: audit: type=1300 audit(1707828976.772:1347): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400241e7e0 a2=fc6 a3=0 items=0 ppid=2501 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 key=(null) Feb 13 12:56:16.797020 kernel: audit: type=1327 audit(1707828976.772:1347): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 12:56:16.772000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 12:56:16.773000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:56:16.816564 kernel: audit: type=1400 audit(1707828976.773:1348): avc: denied { watch } for pid=2638 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:56:16.816687 kernel: audit: type=1300 audit(1707828976.773:1348): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400241e900 a2=fc6 a3=0 items=0 ppid=2501 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 key=(null) Feb 13 12:56:16.773000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400241e900 a2=fc6 a3=0 items=0 ppid=2501 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 key=(null) Feb 13 12:56:16.773000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 12:56:16.838968 kernel: audit: type=1327 audit(1707828976.773:1348): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 12:56:16.839075 kernel: audit: type=1400 audit(1707828976.775:1349): avc: denied { watch } for pid=2638 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:56:16.775000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:56:16.775000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400241ea20 a2=fc6 a3=0 items=0 ppid=2501 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 key=(null) Feb 13 12:56:16.860429 kernel: audit: type=1300 audit(1707828976.775:1349): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400241ea20 a2=fc6 a3=0 items=0 ppid=2501 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 key=(null) Feb 13 12:56:16.860521 kernel: audit: type=1327 audit(1707828976.775:1349): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 12:56:16.775000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 12:56:16.776000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:56:16.879902 kernel: audit: type=1400 audit(1707828976.776:1350): avc: denied { watch } for pid=2638 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:56:16.776000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40023cc500 a2=fc6 a3=0 items=0 ppid=2501 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 key=(null) Feb 13 12:56:16.776000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 12:56:17.290214 systemd[1]: run-containerd-runc-k8s.io-4dce4cd2eb2595a3f68304f24173f0fa33f666f655025b1814a8c8522ada9f41-runc.v1nUGE.mount: Deactivated successfully. Feb 13 12:56:17.432453 kubelet[3074]: I0213 12:56:17.432372 3074 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-jv8nx" podStartSLOduration=-9.223371987422483e+09 pod.CreationTimestamp="2024-02-13 12:55:28 +0000 UTC" firstStartedPulling="2024-02-13 12:56:00.490638298 +0000 UTC m=+55.392410616" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 12:56:08.09450932 +0000 UTC m=+62.996281746" watchObservedRunningTime="2024-02-13 12:56:17.432292393 +0000 UTC m=+72.334064723" Feb 13 12:56:18.466651 update_engine[1731]: I0213 12:56:18.466576 1731 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 13 12:56:18.466651 update_engine[1731]: I0213 12:56:18.466650 1731 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 13 12:56:18.467714 update_engine[1731]: I0213 12:56:18.467670 1731 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 13 12:56:18.468846 update_engine[1731]: I0213 12:56:18.468796 1731 omaha_request_params.cc:62] Current group set to lts Feb 13 12:56:18.469232 update_engine[1731]: I0213 12:56:18.469012 1731 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 13 12:56:18.469232 update_engine[1731]: I0213 12:56:18.469034 1731 update_attempter.cc:643] Scheduling an action processor start. Feb 13 12:56:18.469232 update_engine[1731]: I0213 12:56:18.469064 1731 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 12:56:18.469232 update_engine[1731]: I0213 12:56:18.469115 1731 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 13 12:56:18.470101 update_engine[1731]: I0213 12:56:18.470048 1731 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 12:56:18.470101 update_engine[1731]: I0213 12:56:18.470086 1731 omaha_request_action.cc:271] Request: Feb 13 12:56:18.470101 update_engine[1731]: Feb 13 12:56:18.470101 update_engine[1731]: Feb 13 12:56:18.470101 update_engine[1731]: Feb 13 12:56:18.470101 update_engine[1731]: Feb 13 12:56:18.470101 update_engine[1731]: Feb 13 12:56:18.470101 update_engine[1731]: Feb 13 12:56:18.470101 update_engine[1731]: Feb 13 12:56:18.470101 update_engine[1731]: Feb 13 12:56:18.470101 update_engine[1731]: I0213 12:56:18.470100 1731 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 12:56:18.471091 locksmithd[1792]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 13 12:56:18.475482 update_engine[1731]: I0213 12:56:18.475422 1731 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 12:56:18.475819 update_engine[1731]: I0213 12:56:18.475767 1731 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 13 12:56:18.499505 update_engine[1731]: E0213 12:56:18.499446 1731 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 12:56:18.499675 update_engine[1731]: I0213 12:56:18.499603 1731 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 13 12:56:20.106791 kubelet[3074]: I0213 12:56:20.106745 3074 topology_manager.go:210] "Topology Admit Handler" Feb 13 12:56:20.121067 systemd[1]: Created slice kubepods-besteffort-pod5a21da51_c326_4597_ab4c_1a258deb48b9.slice. Feb 13 12:56:20.155414 kubelet[3074]: I0213 12:56:20.155349 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/5a21da51-c326-4597-ab4c-1a258deb48b9-calico-apiserver-certs\") pod \"calico-apiserver-549689f884-jlkk2\" (UID: \"5a21da51-c326-4597-ab4c-1a258deb48b9\") " pod="calico-apiserver/calico-apiserver-549689f884-jlkk2" Feb 13 12:56:20.155583 kubelet[3074]: I0213 12:56:20.155461 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gplgp\" (UniqueName: \"kubernetes.io/projected/5a21da51-c326-4597-ab4c-1a258deb48b9-kube-api-access-gplgp\") pod \"calico-apiserver-549689f884-jlkk2\" (UID: \"5a21da51-c326-4597-ab4c-1a258deb48b9\") " pod="calico-apiserver/calico-apiserver-549689f884-jlkk2" Feb 13 12:56:20.185782 kubelet[3074]: I0213 12:56:20.185677 3074 topology_manager.go:210] "Topology Admit Handler" Feb 13 12:56:20.198209 systemd[1]: Created slice kubepods-besteffort-pod2bbe185c_5c82_4981_87b5_da6f0b4809b2.slice. Feb 13 12:56:20.256511 kubelet[3074]: I0213 12:56:20.256445 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/2bbe185c-5c82-4981-87b5-da6f0b4809b2-calico-apiserver-certs\") pod \"calico-apiserver-549689f884-zjt8s\" (UID: \"2bbe185c-5c82-4981-87b5-da6f0b4809b2\") " pod="calico-apiserver/calico-apiserver-549689f884-zjt8s" Feb 13 12:56:20.256732 kubelet[3074]: I0213 12:56:20.256552 3074 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vktj5\" (UniqueName: \"kubernetes.io/projected/2bbe185c-5c82-4981-87b5-da6f0b4809b2-kube-api-access-vktj5\") pod \"calico-apiserver-549689f884-zjt8s\" (UID: \"2bbe185c-5c82-4981-87b5-da6f0b4809b2\") " pod="calico-apiserver/calico-apiserver-549689f884-zjt8s" Feb 13 12:56:20.256940 kubelet[3074]: E0213 12:56:20.256898 3074 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 13 12:56:20.257096 kubelet[3074]: E0213 12:56:20.257062 3074 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/5a21da51-c326-4597-ab4c-1a258deb48b9-calico-apiserver-certs podName:5a21da51-c326-4597-ab4c-1a258deb48b9 nodeName:}" failed. No retries permitted until 2024-02-13 12:56:20.757008136 +0000 UTC m=+75.658780454 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/5a21da51-c326-4597-ab4c-1a258deb48b9-calico-apiserver-certs") pod "calico-apiserver-549689f884-jlkk2" (UID: "5a21da51-c326-4597-ab4c-1a258deb48b9") : secret "calico-apiserver-certs" not found Feb 13 12:56:20.358334 kubelet[3074]: E0213 12:56:20.358191 3074 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 13 12:56:20.358334 kubelet[3074]: E0213 12:56:20.358287 3074 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/2bbe185c-5c82-4981-87b5-da6f0b4809b2-calico-apiserver-certs podName:2bbe185c-5c82-4981-87b5-da6f0b4809b2 nodeName:}" failed. No retries permitted until 2024-02-13 12:56:20.858262674 +0000 UTC m=+75.760034992 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/2bbe185c-5c82-4981-87b5-da6f0b4809b2-calico-apiserver-certs") pod "calico-apiserver-549689f884-zjt8s" (UID: "2bbe185c-5c82-4981-87b5-da6f0b4809b2") : secret "calico-apiserver-certs" not found Feb 13 12:56:20.585604 systemd[1]: Started sshd@7-172.31.23.232:22-147.75.109.163:55246.service. Feb 13 12:56:20.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.23.232:22-147.75.109.163:55246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:56:20.685000 audit[5394]: NETFILTER_CFG table=filter:124 family=2 entries=7 op=nft_register_rule pid=5394 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:56:20.685000 audit[5394]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffddc6c6c0 a2=0 a3=ffffb82956c0 items=0 ppid=3261 pid=5394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:20.685000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:56:20.701000 audit[5394]: NETFILTER_CFG table=nat:125 family=2 entries=78 op=nft_register_rule pid=5394 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:56:20.701000 audit[5394]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffddc6c6c0 a2=0 a3=ffffb82956c0 items=0 ppid=3261 pid=5394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:20.701000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:56:20.778349 sshd[5381]: Accepted publickey for core from 147.75.109.163 port 55246 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:56:20.777000 audit[5381]: USER_ACCT pid=5381 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:20.779000 audit[5381]: CRED_ACQ pid=5381 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:20.779000 audit[5381]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe34bb140 a2=3 a3=1 items=0 ppid=1 pid=5381 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:20.779000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 12:56:20.781589 sshd[5381]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:56:20.799034 systemd-logind[1730]: New session 8 of user core. Feb 13 12:56:20.801282 systemd[1]: Started session-8.scope. Feb 13 12:56:20.813000 audit[5381]: USER_START pid=5381 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:20.816000 audit[5405]: CRED_ACQ pid=5405 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:21.011000 audit[5432]: NETFILTER_CFG table=filter:126 family=2 entries=8 op=nft_register_rule pid=5432 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:56:21.011000 audit[5432]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffd8ec3e20 a2=0 a3=ffffbdb346c0 items=0 ppid=3261 pid=5432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:21.011000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:56:21.017000 audit[5432]: NETFILTER_CFG table=nat:127 family=2 entries=78 op=nft_register_rule pid=5432 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:56:21.017000 audit[5432]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffd8ec3e20 a2=0 a3=ffffbdb346c0 items=0 ppid=3261 pid=5432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:21.017000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:56:21.027871 env[1734]: time="2024-02-13T12:56:21.027808899Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-549689f884-jlkk2,Uid:5a21da51-c326-4597-ab4c-1a258deb48b9,Namespace:calico-apiserver,Attempt:0,}" Feb 13 12:56:21.105713 env[1734]: time="2024-02-13T12:56:21.105636724Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-549689f884-zjt8s,Uid:2bbe185c-5c82-4981-87b5-da6f0b4809b2,Namespace:calico-apiserver,Attempt:0,}" Feb 13 12:56:21.369375 sshd[5381]: pam_unix(sshd:session): session closed for user core Feb 13 12:56:21.372000 audit[5381]: USER_END pid=5381 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:21.372000 audit[5381]: CRED_DISP pid=5381 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:21.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.23.232:22-147.75.109.163:55246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:56:21.376229 systemd[1]: sshd@7-172.31.23.232:22-147.75.109.163:55246.service: Deactivated successfully. Feb 13 12:56:21.377822 systemd[1]: session-8.scope: Deactivated successfully. Feb 13 12:56:21.383665 systemd-logind[1730]: Session 8 logged out. Waiting for processes to exit. Feb 13 12:56:21.387755 systemd-logind[1730]: Removed session 8. Feb 13 12:56:21.482261 (udev-worker)[5482]: Network interface NamePolicy= disabled on kernel command line. Feb 13 12:56:21.488321 systemd-networkd[1541]: calibffba3e2beb: Link UP Feb 13 12:56:21.501590 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 13 12:56:21.501747 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibffba3e2beb: link becomes ready Feb 13 12:56:21.503722 systemd-networkd[1541]: calibffba3e2beb: Gained carrier Feb 13 12:56:21.527537 env[1734]: 2024-02-13 12:56:21.189 [INFO][5433] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--23--232-k8s-calico--apiserver--549689f884--jlkk2-eth0 calico-apiserver-549689f884- calico-apiserver 5a21da51-c326-4597-ab4c-1a258deb48b9 849 0 2024-02-13 12:56:20 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:549689f884 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-23-232 calico-apiserver-549689f884-jlkk2 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calibffba3e2beb [] []}} ContainerID="275b66ed7b01f1ad21f21b4af622bff76f3852469a53ceb6a1c4a184e68fd49f" Namespace="calico-apiserver" Pod="calico-apiserver-549689f884-jlkk2" WorkloadEndpoint="ip--172--31--23--232-k8s-calico--apiserver--549689f884--jlkk2-" Feb 13 12:56:21.527537 env[1734]: 2024-02-13 12:56:21.190 [INFO][5433] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="275b66ed7b01f1ad21f21b4af622bff76f3852469a53ceb6a1c4a184e68fd49f" Namespace="calico-apiserver" Pod="calico-apiserver-549689f884-jlkk2" WorkloadEndpoint="ip--172--31--23--232-k8s-calico--apiserver--549689f884--jlkk2-eth0" Feb 13 12:56:21.527537 env[1734]: 2024-02-13 12:56:21.350 [INFO][5469] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="275b66ed7b01f1ad21f21b4af622bff76f3852469a53ceb6a1c4a184e68fd49f" HandleID="k8s-pod-network.275b66ed7b01f1ad21f21b4af622bff76f3852469a53ceb6a1c4a184e68fd49f" Workload="ip--172--31--23--232-k8s-calico--apiserver--549689f884--jlkk2-eth0" Feb 13 12:56:21.527537 env[1734]: 2024-02-13 12:56:21.395 [INFO][5469] ipam_plugin.go 268: Auto assigning IP ContainerID="275b66ed7b01f1ad21f21b4af622bff76f3852469a53ceb6a1c4a184e68fd49f" HandleID="k8s-pod-network.275b66ed7b01f1ad21f21b4af622bff76f3852469a53ceb6a1c4a184e68fd49f" Workload="ip--172--31--23--232-k8s-calico--apiserver--549689f884--jlkk2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000506b20), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-23-232", "pod":"calico-apiserver-549689f884-jlkk2", "timestamp":"2024-02-13 12:56:21.350332641 +0000 UTC"}, Hostname:"ip-172-31-23-232", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 12:56:21.527537 env[1734]: 2024-02-13 12:56:21.395 [INFO][5469] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 12:56:21.527537 env[1734]: 2024-02-13 12:56:21.395 [INFO][5469] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 12:56:21.527537 env[1734]: 2024-02-13 12:56:21.396 [INFO][5469] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-23-232' Feb 13 12:56:21.527537 env[1734]: 2024-02-13 12:56:21.399 [INFO][5469] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.275b66ed7b01f1ad21f21b4af622bff76f3852469a53ceb6a1c4a184e68fd49f" host="ip-172-31-23-232" Feb 13 12:56:21.527537 env[1734]: 2024-02-13 12:56:21.408 [INFO][5469] ipam.go 372: Looking up existing affinities for host host="ip-172-31-23-232" Feb 13 12:56:21.527537 env[1734]: 2024-02-13 12:56:21.419 [INFO][5469] ipam.go 489: Trying affinity for 192.168.110.192/26 host="ip-172-31-23-232" Feb 13 12:56:21.527537 env[1734]: 2024-02-13 12:56:21.428 [INFO][5469] ipam.go 155: Attempting to load block cidr=192.168.110.192/26 host="ip-172-31-23-232" Feb 13 12:56:21.527537 env[1734]: 2024-02-13 12:56:21.432 [INFO][5469] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="ip-172-31-23-232" Feb 13 12:56:21.527537 env[1734]: 2024-02-13 12:56:21.432 [INFO][5469] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.275b66ed7b01f1ad21f21b4af622bff76f3852469a53ceb6a1c4a184e68fd49f" host="ip-172-31-23-232" Feb 13 12:56:21.527537 env[1734]: 2024-02-13 12:56:21.435 [INFO][5469] ipam.go 1682: Creating new handle: k8s-pod-network.275b66ed7b01f1ad21f21b4af622bff76f3852469a53ceb6a1c4a184e68fd49f Feb 13 12:56:21.527537 env[1734]: 2024-02-13 12:56:21.442 [INFO][5469] ipam.go 1203: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.275b66ed7b01f1ad21f21b4af622bff76f3852469a53ceb6a1c4a184e68fd49f" host="ip-172-31-23-232" Feb 13 12:56:21.527537 env[1734]: 2024-02-13 12:56:21.457 [INFO][5469] ipam.go 1216: Successfully claimed IPs: [192.168.110.197/26] block=192.168.110.192/26 handle="k8s-pod-network.275b66ed7b01f1ad21f21b4af622bff76f3852469a53ceb6a1c4a184e68fd49f" host="ip-172-31-23-232" Feb 13 12:56:21.527537 env[1734]: 2024-02-13 12:56:21.457 [INFO][5469] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.110.197/26] handle="k8s-pod-network.275b66ed7b01f1ad21f21b4af622bff76f3852469a53ceb6a1c4a184e68fd49f" host="ip-172-31-23-232" Feb 13 12:56:21.527537 env[1734]: 2024-02-13 12:56:21.457 [INFO][5469] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 12:56:21.527537 env[1734]: 2024-02-13 12:56:21.457 [INFO][5469] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.110.197/26] IPv6=[] ContainerID="275b66ed7b01f1ad21f21b4af622bff76f3852469a53ceb6a1c4a184e68fd49f" HandleID="k8s-pod-network.275b66ed7b01f1ad21f21b4af622bff76f3852469a53ceb6a1c4a184e68fd49f" Workload="ip--172--31--23--232-k8s-calico--apiserver--549689f884--jlkk2-eth0" Feb 13 12:56:21.529082 env[1734]: 2024-02-13 12:56:21.460 [INFO][5433] k8s.go 385: Populated endpoint ContainerID="275b66ed7b01f1ad21f21b4af622bff76f3852469a53ceb6a1c4a184e68fd49f" Namespace="calico-apiserver" Pod="calico-apiserver-549689f884-jlkk2" WorkloadEndpoint="ip--172--31--23--232-k8s-calico--apiserver--549689f884--jlkk2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--232-k8s-calico--apiserver--549689f884--jlkk2-eth0", GenerateName:"calico-apiserver-549689f884-", Namespace:"calico-apiserver", SelfLink:"", UID:"5a21da51-c326-4597-ab4c-1a258deb48b9", ResourceVersion:"849", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 12, 56, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"549689f884", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-232", ContainerID:"", Pod:"calico-apiserver-549689f884-jlkk2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibffba3e2beb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 12:56:21.529082 env[1734]: 2024-02-13 12:56:21.460 [INFO][5433] k8s.go 386: Calico CNI using IPs: [192.168.110.197/32] ContainerID="275b66ed7b01f1ad21f21b4af622bff76f3852469a53ceb6a1c4a184e68fd49f" Namespace="calico-apiserver" Pod="calico-apiserver-549689f884-jlkk2" WorkloadEndpoint="ip--172--31--23--232-k8s-calico--apiserver--549689f884--jlkk2-eth0" Feb 13 12:56:21.529082 env[1734]: 2024-02-13 12:56:21.463 [INFO][5433] dataplane_linux.go 68: Setting the host side veth name to calibffba3e2beb ContainerID="275b66ed7b01f1ad21f21b4af622bff76f3852469a53ceb6a1c4a184e68fd49f" Namespace="calico-apiserver" Pod="calico-apiserver-549689f884-jlkk2" WorkloadEndpoint="ip--172--31--23--232-k8s-calico--apiserver--549689f884--jlkk2-eth0" Feb 13 12:56:21.529082 env[1734]: 2024-02-13 12:56:21.503 [INFO][5433] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="275b66ed7b01f1ad21f21b4af622bff76f3852469a53ceb6a1c4a184e68fd49f" Namespace="calico-apiserver" Pod="calico-apiserver-549689f884-jlkk2" WorkloadEndpoint="ip--172--31--23--232-k8s-calico--apiserver--549689f884--jlkk2-eth0" Feb 13 12:56:21.529082 env[1734]: 2024-02-13 12:56:21.511 [INFO][5433] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="275b66ed7b01f1ad21f21b4af622bff76f3852469a53ceb6a1c4a184e68fd49f" Namespace="calico-apiserver" Pod="calico-apiserver-549689f884-jlkk2" WorkloadEndpoint="ip--172--31--23--232-k8s-calico--apiserver--549689f884--jlkk2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--232-k8s-calico--apiserver--549689f884--jlkk2-eth0", GenerateName:"calico-apiserver-549689f884-", Namespace:"calico-apiserver", SelfLink:"", UID:"5a21da51-c326-4597-ab4c-1a258deb48b9", ResourceVersion:"849", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 12, 56, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"549689f884", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-232", ContainerID:"275b66ed7b01f1ad21f21b4af622bff76f3852469a53ceb6a1c4a184e68fd49f", Pod:"calico-apiserver-549689f884-jlkk2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibffba3e2beb", MAC:"6a:e8:f8:79:64:d6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 12:56:21.529082 env[1734]: 2024-02-13 12:56:21.525 [INFO][5433] k8s.go 491: Wrote updated endpoint to datastore ContainerID="275b66ed7b01f1ad21f21b4af622bff76f3852469a53ceb6a1c4a184e68fd49f" Namespace="calico-apiserver" Pod="calico-apiserver-549689f884-jlkk2" WorkloadEndpoint="ip--172--31--23--232-k8s-calico--apiserver--549689f884--jlkk2-eth0" Feb 13 12:56:21.565763 env[1734]: time="2024-02-13T12:56:21.565620733Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 12:56:21.566096 env[1734]: time="2024-02-13T12:56:21.565788878Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 12:56:21.566096 env[1734]: time="2024-02-13T12:56:21.565876887Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 12:56:21.566329 env[1734]: time="2024-02-13T12:56:21.566250592Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/275b66ed7b01f1ad21f21b4af622bff76f3852469a53ceb6a1c4a184e68fd49f pid=5506 runtime=io.containerd.runc.v2 Feb 13 12:56:21.650162 systemd[1]: Started cri-containerd-275b66ed7b01f1ad21f21b4af622bff76f3852469a53ceb6a1c4a184e68fd49f.scope. Feb 13 12:56:21.669635 (udev-worker)[5486]: Network interface NamePolicy= disabled on kernel command line. Feb 13 12:56:21.676109 systemd-networkd[1541]: cali00272675c0c: Link UP Feb 13 12:56:21.679251 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali00272675c0c: link becomes ready Feb 13 12:56:21.680344 systemd-networkd[1541]: cali00272675c0c: Gained carrier Feb 13 12:56:21.706534 env[1734]: 2024-02-13 12:56:21.325 [INFO][5446] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--23--232-k8s-calico--apiserver--549689f884--zjt8s-eth0 calico-apiserver-549689f884- calico-apiserver 2bbe185c-5c82-4981-87b5-da6f0b4809b2 855 0 2024-02-13 12:56:20 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:549689f884 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-23-232 calico-apiserver-549689f884-zjt8s eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali00272675c0c [] []}} ContainerID="7325eb941eb703437600941c06ebd0a0ff2e397bf54f665bcbf137254bb30b03" Namespace="calico-apiserver" Pod="calico-apiserver-549689f884-zjt8s" WorkloadEndpoint="ip--172--31--23--232-k8s-calico--apiserver--549689f884--zjt8s-" Feb 13 12:56:21.706534 env[1734]: 2024-02-13 12:56:21.325 [INFO][5446] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="7325eb941eb703437600941c06ebd0a0ff2e397bf54f665bcbf137254bb30b03" Namespace="calico-apiserver" Pod="calico-apiserver-549689f884-zjt8s" WorkloadEndpoint="ip--172--31--23--232-k8s-calico--apiserver--549689f884--zjt8s-eth0" Feb 13 12:56:21.706534 env[1734]: 2024-02-13 12:56:21.464 [INFO][5476] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7325eb941eb703437600941c06ebd0a0ff2e397bf54f665bcbf137254bb30b03" HandleID="k8s-pod-network.7325eb941eb703437600941c06ebd0a0ff2e397bf54f665bcbf137254bb30b03" Workload="ip--172--31--23--232-k8s-calico--apiserver--549689f884--zjt8s-eth0" Feb 13 12:56:21.706534 env[1734]: 2024-02-13 12:56:21.523 [INFO][5476] ipam_plugin.go 268: Auto assigning IP ContainerID="7325eb941eb703437600941c06ebd0a0ff2e397bf54f665bcbf137254bb30b03" HandleID="k8s-pod-network.7325eb941eb703437600941c06ebd0a0ff2e397bf54f665bcbf137254bb30b03" Workload="ip--172--31--23--232-k8s-calico--apiserver--549689f884--zjt8s-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002036f0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-23-232", "pod":"calico-apiserver-549689f884-zjt8s", "timestamp":"2024-02-13 12:56:21.464563829 +0000 UTC"}, Hostname:"ip-172-31-23-232", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 12:56:21.706534 env[1734]: 2024-02-13 12:56:21.524 [INFO][5476] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 12:56:21.706534 env[1734]: 2024-02-13 12:56:21.524 [INFO][5476] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 12:56:21.706534 env[1734]: 2024-02-13 12:56:21.524 [INFO][5476] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-23-232' Feb 13 12:56:21.706534 env[1734]: 2024-02-13 12:56:21.539 [INFO][5476] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7325eb941eb703437600941c06ebd0a0ff2e397bf54f665bcbf137254bb30b03" host="ip-172-31-23-232" Feb 13 12:56:21.706534 env[1734]: 2024-02-13 12:56:21.554 [INFO][5476] ipam.go 372: Looking up existing affinities for host host="ip-172-31-23-232" Feb 13 12:56:21.706534 env[1734]: 2024-02-13 12:56:21.581 [INFO][5476] ipam.go 489: Trying affinity for 192.168.110.192/26 host="ip-172-31-23-232" Feb 13 12:56:21.706534 env[1734]: 2024-02-13 12:56:21.592 [INFO][5476] ipam.go 155: Attempting to load block cidr=192.168.110.192/26 host="ip-172-31-23-232" Feb 13 12:56:21.706534 env[1734]: 2024-02-13 12:56:21.608 [INFO][5476] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="ip-172-31-23-232" Feb 13 12:56:21.706534 env[1734]: 2024-02-13 12:56:21.609 [INFO][5476] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.7325eb941eb703437600941c06ebd0a0ff2e397bf54f665bcbf137254bb30b03" host="ip-172-31-23-232" Feb 13 12:56:21.706534 env[1734]: 2024-02-13 12:56:21.618 [INFO][5476] ipam.go 1682: Creating new handle: k8s-pod-network.7325eb941eb703437600941c06ebd0a0ff2e397bf54f665bcbf137254bb30b03 Feb 13 12:56:21.706534 env[1734]: 2024-02-13 12:56:21.650 [INFO][5476] ipam.go 1203: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.7325eb941eb703437600941c06ebd0a0ff2e397bf54f665bcbf137254bb30b03" host="ip-172-31-23-232" Feb 13 12:56:21.706534 env[1734]: 2024-02-13 12:56:21.663 [INFO][5476] ipam.go 1216: Successfully claimed IPs: [192.168.110.198/26] block=192.168.110.192/26 handle="k8s-pod-network.7325eb941eb703437600941c06ebd0a0ff2e397bf54f665bcbf137254bb30b03" host="ip-172-31-23-232" Feb 13 12:56:21.706534 env[1734]: 2024-02-13 12:56:21.663 [INFO][5476] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.110.198/26] handle="k8s-pod-network.7325eb941eb703437600941c06ebd0a0ff2e397bf54f665bcbf137254bb30b03" host="ip-172-31-23-232" Feb 13 12:56:21.706534 env[1734]: 2024-02-13 12:56:21.663 [INFO][5476] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 12:56:21.706534 env[1734]: 2024-02-13 12:56:21.663 [INFO][5476] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.110.198/26] IPv6=[] ContainerID="7325eb941eb703437600941c06ebd0a0ff2e397bf54f665bcbf137254bb30b03" HandleID="k8s-pod-network.7325eb941eb703437600941c06ebd0a0ff2e397bf54f665bcbf137254bb30b03" Workload="ip--172--31--23--232-k8s-calico--apiserver--549689f884--zjt8s-eth0" Feb 13 12:56:21.707833 env[1734]: 2024-02-13 12:56:21.666 [INFO][5446] k8s.go 385: Populated endpoint ContainerID="7325eb941eb703437600941c06ebd0a0ff2e397bf54f665bcbf137254bb30b03" Namespace="calico-apiserver" Pod="calico-apiserver-549689f884-zjt8s" WorkloadEndpoint="ip--172--31--23--232-k8s-calico--apiserver--549689f884--zjt8s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--232-k8s-calico--apiserver--549689f884--zjt8s-eth0", GenerateName:"calico-apiserver-549689f884-", Namespace:"calico-apiserver", SelfLink:"", UID:"2bbe185c-5c82-4981-87b5-da6f0b4809b2", ResourceVersion:"855", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 12, 56, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"549689f884", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-232", ContainerID:"", Pod:"calico-apiserver-549689f884-zjt8s", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali00272675c0c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 12:56:21.707833 env[1734]: 2024-02-13 12:56:21.666 [INFO][5446] k8s.go 386: Calico CNI using IPs: [192.168.110.198/32] ContainerID="7325eb941eb703437600941c06ebd0a0ff2e397bf54f665bcbf137254bb30b03" Namespace="calico-apiserver" Pod="calico-apiserver-549689f884-zjt8s" WorkloadEndpoint="ip--172--31--23--232-k8s-calico--apiserver--549689f884--zjt8s-eth0" Feb 13 12:56:21.707833 env[1734]: 2024-02-13 12:56:21.667 [INFO][5446] dataplane_linux.go 68: Setting the host side veth name to cali00272675c0c ContainerID="7325eb941eb703437600941c06ebd0a0ff2e397bf54f665bcbf137254bb30b03" Namespace="calico-apiserver" Pod="calico-apiserver-549689f884-zjt8s" WorkloadEndpoint="ip--172--31--23--232-k8s-calico--apiserver--549689f884--zjt8s-eth0" Feb 13 12:56:21.707833 env[1734]: 2024-02-13 12:56:21.680 [INFO][5446] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7325eb941eb703437600941c06ebd0a0ff2e397bf54f665bcbf137254bb30b03" Namespace="calico-apiserver" Pod="calico-apiserver-549689f884-zjt8s" WorkloadEndpoint="ip--172--31--23--232-k8s-calico--apiserver--549689f884--zjt8s-eth0" Feb 13 12:56:21.707833 env[1734]: 2024-02-13 12:56:21.685 [INFO][5446] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="7325eb941eb703437600941c06ebd0a0ff2e397bf54f665bcbf137254bb30b03" Namespace="calico-apiserver" Pod="calico-apiserver-549689f884-zjt8s" WorkloadEndpoint="ip--172--31--23--232-k8s-calico--apiserver--549689f884--zjt8s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--23--232-k8s-calico--apiserver--549689f884--zjt8s-eth0", GenerateName:"calico-apiserver-549689f884-", Namespace:"calico-apiserver", SelfLink:"", UID:"2bbe185c-5c82-4981-87b5-da6f0b4809b2", ResourceVersion:"855", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 12, 56, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"549689f884", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-23-232", ContainerID:"7325eb941eb703437600941c06ebd0a0ff2e397bf54f665bcbf137254bb30b03", Pod:"calico-apiserver-549689f884-zjt8s", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali00272675c0c", MAC:"86:30:3d:30:60:8c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 12:56:21.707833 env[1734]: 2024-02-13 12:56:21.704 [INFO][5446] k8s.go 491: Wrote updated endpoint to datastore ContainerID="7325eb941eb703437600941c06ebd0a0ff2e397bf54f665bcbf137254bb30b03" Namespace="calico-apiserver" Pod="calico-apiserver-549689f884-zjt8s" WorkloadEndpoint="ip--172--31--23--232-k8s-calico--apiserver--549689f884--zjt8s-eth0" Feb 13 12:56:21.738134 env[1734]: time="2024-02-13T12:56:21.738005814Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 12:56:21.738338 env[1734]: time="2024-02-13T12:56:21.738161827Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 12:56:21.738338 env[1734]: time="2024-02-13T12:56:21.738249595Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 12:56:21.738630 env[1734]: time="2024-02-13T12:56:21.738558320Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7325eb941eb703437600941c06ebd0a0ff2e397bf54f665bcbf137254bb30b03 pid=5555 runtime=io.containerd.runc.v2 Feb 13 12:56:21.782727 systemd[1]: Started cri-containerd-7325eb941eb703437600941c06ebd0a0ff2e397bf54f665bcbf137254bb30b03.scope. Feb 13 12:56:21.776000 audit[5573]: NETFILTER_CFG table=filter:128 family=2 entries=51 op=nft_register_chain pid=5573 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 12:56:21.788492 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 13 12:56:21.788602 kernel: audit: type=1325 audit(1707828981.776:1364): table=filter:128 family=2 entries=51 op=nft_register_chain pid=5573 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 12:56:21.776000 audit[5573]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=26936 a0=3 a1=fffff517f090 a2=0 a3=ffff8e999fa8 items=0 ppid=4240 pid=5573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:21.809073 kernel: audit: type=1300 audit(1707828981.776:1364): arch=c00000b7 syscall=211 success=yes exit=26936 a0=3 a1=fffff517f090 a2=0 a3=ffff8e999fa8 items=0 ppid=4240 pid=5573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:21.776000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 12:56:21.819889 kernel: audit: type=1327 audit(1707828981.776:1364): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 12:56:21.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.831442 kernel: audit: type=1400 audit(1707828981.811:1365): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.841512 kernel: audit: type=1400 audit(1707828981.811:1366): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.850148 kernel: audit: type=1400 audit(1707828981.811:1367): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.857199 kernel: audit: type=1400 audit(1707828981.811:1368): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.881341 kernel: audit: type=1400 audit(1707828981.811:1369): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.897791 kernel: audit: type=1400 audit(1707828981.811:1370): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.908684 kernel: audit: type=1400 audit(1707828981.811:1371): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.811000 audit: BPF prog-id=185 op=LOAD Feb 13 12:56:21.819000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.819000 audit[5519]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=5506 pid=5519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:21.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237356236366564376230316631616432316632316234616636323262 Feb 13 12:56:21.819000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.819000 audit[5519]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=5506 pid=5519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:21.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237356236366564376230316631616432316632316234616636323262 Feb 13 12:56:21.819000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.819000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.819000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.819000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.819000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.819000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.819000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.819000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.819000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.819000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.819000 audit: BPF prog-id=186 op=LOAD Feb 13 12:56:21.819000 audit[5519]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=5506 pid=5519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:21.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237356236366564376230316631616432316632316234616636323262 Feb 13 12:56:21.819000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.819000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.819000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.819000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.819000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.819000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.819000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.819000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.819000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.819000 audit: BPF prog-id=187 op=LOAD Feb 13 12:56:21.819000 audit[5519]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=5506 pid=5519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:21.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237356236366564376230316631616432316632316234616636323262 Feb 13 12:56:21.819000 audit: BPF prog-id=187 op=UNLOAD Feb 13 12:56:21.819000 audit: BPF prog-id=186 op=UNLOAD Feb 13 12:56:21.820000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.820000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.820000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.820000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.820000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.820000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.820000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.820000 audit[5519]: AVC avc: denied { perfmon } for pid=5519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.820000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.820000 audit[5519]: AVC avc: denied { bpf } for pid=5519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.820000 audit: BPF prog-id=188 op=LOAD Feb 13 12:56:21.820000 audit[5519]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=5506 pid=5519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:21.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237356236366564376230316631616432316632316234616636323262 Feb 13 12:56:21.856000 audit[5583]: NETFILTER_CFG table=filter:129 family=2 entries=48 op=nft_register_chain pid=5583 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 12:56:21.856000 audit[5583]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24956 a0=3 a1=ffffc9643d60 a2=0 a3=ffff82fd0fa8 items=0 ppid=4240 pid=5583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:21.856000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 12:56:21.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.911000 audit: BPF prog-id=189 op=LOAD Feb 13 12:56:21.915000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.915000 audit[5567]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=5555 pid=5567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:21.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733323565623934316562373033343337363030393431633036656264 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit[5567]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=5555 pid=5567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:21.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733323565623934316562373033343337363030393431633036656264 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit: BPF prog-id=190 op=LOAD Feb 13 12:56:21.916000 audit[5567]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=5555 pid=5567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:21.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733323565623934316562373033343337363030393431633036656264 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit: BPF prog-id=191 op=LOAD Feb 13 12:56:21.916000 audit[5567]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=5555 pid=5567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:21.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733323565623934316562373033343337363030393431633036656264 Feb 13 12:56:21.916000 audit: BPF prog-id=191 op=UNLOAD Feb 13 12:56:21.916000 audit: BPF prog-id=190 op=UNLOAD Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { perfmon } for pid=5567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit[5567]: AVC avc: denied { bpf } for pid=5567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:21.916000 audit: BPF prog-id=192 op=LOAD Feb 13 12:56:21.916000 audit[5567]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=5555 pid=5567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:21.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733323565623934316562373033343337363030393431633036656264 Feb 13 12:56:21.932034 env[1734]: time="2024-02-13T12:56:21.930013214Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-549689f884-jlkk2,Uid:5a21da51-c326-4597-ab4c-1a258deb48b9,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"275b66ed7b01f1ad21f21b4af622bff76f3852469a53ceb6a1c4a184e68fd49f\"" Feb 13 12:56:21.934333 env[1734]: time="2024-02-13T12:56:21.934196073Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 13 12:56:21.972466 env[1734]: time="2024-02-13T12:56:21.972410400Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-549689f884-zjt8s,Uid:2bbe185c-5c82-4981-87b5-da6f0b4809b2,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"7325eb941eb703437600941c06ebd0a0ff2e397bf54f665bcbf137254bb30b03\"" Feb 13 12:56:23.292317 systemd-networkd[1541]: calibffba3e2beb: Gained IPv6LL Feb 13 12:56:23.676200 systemd-networkd[1541]: cali00272675c0c: Gained IPv6LL Feb 13 12:56:25.967044 env[1734]: time="2024-02-13T12:56:25.966914445Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:56:25.971726 env[1734]: time="2024-02-13T12:56:25.971669686Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:56:25.976402 env[1734]: time="2024-02-13T12:56:25.976331111Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:56:25.981037 env[1734]: time="2024-02-13T12:56:25.980939195Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:56:25.984193 env[1734]: time="2024-02-13T12:56:25.982691508Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 13 12:56:25.985620 env[1734]: time="2024-02-13T12:56:25.985549259Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 13 12:56:25.988174 env[1734]: time="2024-02-13T12:56:25.988095775Z" level=info msg="CreateContainer within sandbox \"275b66ed7b01f1ad21f21b4af622bff76f3852469a53ceb6a1c4a184e68fd49f\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 13 12:56:26.017928 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2353702913.mount: Deactivated successfully. Feb 13 12:56:26.024789 env[1734]: time="2024-02-13T12:56:26.024721291Z" level=info msg="CreateContainer within sandbox \"275b66ed7b01f1ad21f21b4af622bff76f3852469a53ceb6a1c4a184e68fd49f\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"5367a3ecfe180a0efba43cbf651210be89f3f9aaa3fedf0fbdfca6eca8d0dbc1\"" Feb 13 12:56:26.028984 env[1734]: time="2024-02-13T12:56:26.025647723Z" level=info msg="StartContainer for \"5367a3ecfe180a0efba43cbf651210be89f3f9aaa3fedf0fbdfca6eca8d0dbc1\"" Feb 13 12:56:26.120454 systemd[1]: Started cri-containerd-5367a3ecfe180a0efba43cbf651210be89f3f9aaa3fedf0fbdfca6eca8d0dbc1.scope. Feb 13 12:56:26.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.172000 audit: BPF prog-id=193 op=LOAD Feb 13 12:56:26.173000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.173000 audit[5608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=5506 pid=5608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:26.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533363761336563666531383061306566626134336362663635313231 Feb 13 12:56:26.174000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.174000 audit[5608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=5506 pid=5608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:26.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533363761336563666531383061306566626134336362663635313231 Feb 13 12:56:26.174000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.174000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.174000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.174000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.174000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.174000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.174000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.174000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.174000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.174000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.174000 audit: BPF prog-id=194 op=LOAD Feb 13 12:56:26.174000 audit[5608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=5506 pid=5608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:26.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533363761336563666531383061306566626134336362663635313231 Feb 13 12:56:26.176000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.176000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.176000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.176000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.176000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.176000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.176000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.176000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.176000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.176000 audit: BPF prog-id=195 op=LOAD Feb 13 12:56:26.176000 audit[5608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=5506 pid=5608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:26.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533363761336563666531383061306566626134336362663635313231 Feb 13 12:56:26.178000 audit: BPF prog-id=195 op=UNLOAD Feb 13 12:56:26.179000 audit: BPF prog-id=194 op=UNLOAD Feb 13 12:56:26.179000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.179000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.179000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.179000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.179000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.179000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.179000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.179000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.179000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.179000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.179000 audit: BPF prog-id=196 op=LOAD Feb 13 12:56:26.179000 audit[5608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=5506 pid=5608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:26.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533363761336563666531383061306566626134336362663635313231 Feb 13 12:56:26.245926 env[1734]: time="2024-02-13T12:56:26.245773293Z" level=info msg="StartContainer for \"5367a3ecfe180a0efba43cbf651210be89f3f9aaa3fedf0fbdfca6eca8d0dbc1\" returns successfully" Feb 13 12:56:26.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.23.232:22-147.75.109.163:37730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:56:26.398074 systemd[1]: Started sshd@8-172.31.23.232:22-147.75.109.163:37730.service. Feb 13 12:56:26.441999 env[1734]: time="2024-02-13T12:56:26.441910537Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:56:26.445284 env[1734]: time="2024-02-13T12:56:26.445210277Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:56:26.449260 env[1734]: time="2024-02-13T12:56:26.449192812Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:56:26.454124 env[1734]: time="2024-02-13T12:56:26.453755839Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 12:56:26.455296 env[1734]: time="2024-02-13T12:56:26.454394040Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 13 12:56:26.461298 env[1734]: time="2024-02-13T12:56:26.461242355Z" level=info msg="CreateContainer within sandbox \"7325eb941eb703437600941c06ebd0a0ff2e397bf54f665bcbf137254bb30b03\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 13 12:56:26.491772 env[1734]: time="2024-02-13T12:56:26.491650952Z" level=info msg="CreateContainer within sandbox \"7325eb941eb703437600941c06ebd0a0ff2e397bf54f665bcbf137254bb30b03\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"f3ff59739846810bbfd9cff1f3de7a37b3111a512e93e0bc2bfc84c73859fcae\"" Feb 13 12:56:26.493238 env[1734]: time="2024-02-13T12:56:26.493172793Z" level=info msg="StartContainer for \"f3ff59739846810bbfd9cff1f3de7a37b3111a512e93e0bc2bfc84c73859fcae\"" Feb 13 12:56:26.556335 systemd[1]: Started cri-containerd-f3ff59739846810bbfd9cff1f3de7a37b3111a512e93e0bc2bfc84c73859fcae.scope. Feb 13 12:56:26.582000 audit[5639]: USER_ACCT pid=5639 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:26.585710 sshd[5639]: Accepted publickey for core from 147.75.109.163 port 37730 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:56:26.586000 audit[5639]: CRED_ACQ pid=5639 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:26.586000 audit[5639]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffecedc9c0 a2=3 a3=1 items=0 ppid=1 pid=5639 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:26.586000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 12:56:26.590483 sshd[5639]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:56:26.604231 systemd-logind[1730]: New session 9 of user core. Feb 13 12:56:26.605820 systemd[1]: Started session-9.scope. Feb 13 12:56:26.622000 audit[5639]: USER_START pid=5639 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:26.633000 audit[5663]: CRED_ACQ pid=5663 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:26.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.649000 audit: BPF prog-id=197 op=LOAD Feb 13 12:56:26.650000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.650000 audit[5648]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=5555 pid=5648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:26.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633666635393733393834363831306262666439636666316633646537 Feb 13 12:56:26.650000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.650000 audit[5648]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=5555 pid=5648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:26.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633666635393733393834363831306262666439636666316633646537 Feb 13 12:56:26.651000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.651000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.651000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.651000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.651000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.651000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.651000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.651000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.651000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.651000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.651000 audit: BPF prog-id=198 op=LOAD Feb 13 12:56:26.651000 audit[5648]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=5555 pid=5648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:26.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633666635393733393834363831306262666439636666316633646537 Feb 13 12:56:26.653000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.653000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.653000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.653000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.653000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.653000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.653000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.653000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.653000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.653000 audit: BPF prog-id=199 op=LOAD Feb 13 12:56:26.653000 audit[5648]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=5555 pid=5648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:26.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633666635393733393834363831306262666439636666316633646537 Feb 13 12:56:26.654000 audit: BPF prog-id=199 op=UNLOAD Feb 13 12:56:26.655000 audit: BPF prog-id=198 op=UNLOAD Feb 13 12:56:26.655000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.655000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.655000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.655000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.655000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.655000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.655000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.655000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.655000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.655000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:56:26.655000 audit: BPF prog-id=200 op=LOAD Feb 13 12:56:26.655000 audit[5648]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=5555 pid=5648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:26.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633666635393733393834363831306262666439636666316633646537 Feb 13 12:56:26.729136 env[1734]: time="2024-02-13T12:56:26.729068035Z" level=info msg="StartContainer for \"f3ff59739846810bbfd9cff1f3de7a37b3111a512e93e0bc2bfc84c73859fcae\" returns successfully" Feb 13 12:56:27.024513 sshd[5639]: pam_unix(sshd:session): session closed for user core Feb 13 12:56:27.028743 kernel: kauditd_printk_skb: 238 callbacks suppressed Feb 13 12:56:27.028894 kernel: audit: type=1106 audit(1707828987.025:1441): pid=5639 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:27.025000 audit[5639]: USER_END pid=5639 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:27.040543 systemd[1]: sshd@8-172.31.23.232:22-147.75.109.163:37730.service: Deactivated successfully. Feb 13 12:56:27.050310 systemd[1]: session-9.scope: Deactivated successfully. Feb 13 12:56:27.025000 audit[5639]: CRED_DISP pid=5639 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:27.060795 kernel: audit: type=1104 audit(1707828987.025:1442): pid=5639 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:27.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.23.232:22-147.75.109.163:37730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:56:27.061320 systemd-logind[1730]: Session 9 logged out. Waiting for processes to exit. Feb 13 12:56:27.070017 kernel: audit: type=1131 audit(1707828987.048:1443): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.23.232:22-147.75.109.163:37730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:56:27.071222 systemd-logind[1730]: Removed session 9. Feb 13 12:56:27.189407 kubelet[3074]: I0213 12:56:27.189352 3074 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-549689f884-zjt8s" podStartSLOduration=-9.223372029665504e+09 pod.CreationTimestamp="2024-02-13 12:56:20 +0000 UTC" firstStartedPulling="2024-02-13 12:56:21.974905488 +0000 UTC m=+76.876677806" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 12:56:27.189218162 +0000 UTC m=+82.090990528" watchObservedRunningTime="2024-02-13 12:56:27.18927227 +0000 UTC m=+82.091044612" Feb 13 12:56:27.191622 kubelet[3074]: I0213 12:56:27.191551 3074 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-549689f884-jlkk2" podStartSLOduration=-9.223372029663284e+09 pod.CreationTimestamp="2024-02-13 12:56:20 +0000 UTC" firstStartedPulling="2024-02-13 12:56:21.932715086 +0000 UTC m=+76.834487404" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 12:56:27.170290205 +0000 UTC m=+82.072062583" watchObservedRunningTime="2024-02-13 12:56:27.191490911 +0000 UTC m=+82.093263253" Feb 13 12:56:27.424000 audit[5714]: NETFILTER_CFG table=filter:130 family=2 entries=8 op=nft_register_rule pid=5714 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:56:27.432982 kernel: audit: type=1325 audit(1707828987.424:1444): table=filter:130 family=2 entries=8 op=nft_register_rule pid=5714 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:56:27.424000 audit[5714]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffd20b5ad0 a2=0 a3=ffff8b1db6c0 items=0 ppid=3261 pid=5714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:27.424000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:56:27.454499 kernel: audit: type=1300 audit(1707828987.424:1444): arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffd20b5ad0 a2=0 a3=ffff8b1db6c0 items=0 ppid=3261 pid=5714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:27.454602 kernel: audit: type=1327 audit(1707828987.424:1444): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:56:27.460000 audit[5714]: NETFILTER_CFG table=nat:131 family=2 entries=78 op=nft_register_rule pid=5714 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:56:27.467985 kernel: audit: type=1325 audit(1707828987.460:1445): table=nat:131 family=2 entries=78 op=nft_register_rule pid=5714 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:56:27.468126 kernel: audit: type=1300 audit(1707828987.460:1445): arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffd20b5ad0 a2=0 a3=ffff8b1db6c0 items=0 ppid=3261 pid=5714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:27.460000 audit[5714]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffd20b5ad0 a2=0 a3=ffff8b1db6c0 items=0 ppid=3261 pid=5714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:27.460000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:56:27.486001 kernel: audit: type=1327 audit(1707828987.460:1445): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:56:27.684000 audit[5740]: NETFILTER_CFG table=filter:132 family=2 entries=8 op=nft_register_rule pid=5740 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:56:27.684000 audit[5740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffd06d7da0 a2=0 a3=ffff8b31f6c0 items=0 ppid=3261 pid=5740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:27.684000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:56:27.692983 kernel: audit: type=1325 audit(1707828987.684:1446): table=filter:132 family=2 entries=8 op=nft_register_rule pid=5740 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:56:27.694000 audit[5740]: NETFILTER_CFG table=nat:133 family=2 entries=78 op=nft_register_rule pid=5740 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:56:27.694000 audit[5740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffd06d7da0 a2=0 a3=ffff8b31f6c0 items=0 ppid=3261 pid=5740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:27.694000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:56:28.192000 audit[5618]: AVC avc: denied { watch } for pid=5618 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_12_56_20.1052009840/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c291,c911 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c291,c911 tclass=file permissive=0 Feb 13 12:56:28.192000 audit[5618]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400106a860 a2=fc6 a3=0 items=0 ppid=5506 pid=5618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c291,c911 key=(null) Feb 13 12:56:28.192000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 12:56:28.462175 update_engine[1731]: I0213 12:56:28.462028 1731 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 12:56:28.462866 update_engine[1731]: I0213 12:56:28.462352 1731 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 12:56:28.462866 update_engine[1731]: I0213 12:56:28.462601 1731 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 13 12:56:28.463433 update_engine[1731]: E0213 12:56:28.463389 1731 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 12:56:28.463547 update_engine[1731]: I0213 12:56:28.463527 1731 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 13 12:56:28.895000 audit[5658]: AVC avc: denied { watch } for pid=5658 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_12_56_20.2124729172/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c857,c903 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c857,c903 tclass=file permissive=0 Feb 13 12:56:28.895000 audit[5658]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000e68a20 a2=fc6 a3=0 items=0 ppid=5555 pid=5658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c857,c903 key=(null) Feb 13 12:56:28.895000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 12:56:32.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.23.232:22-147.75.109.163:37734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:56:32.050769 systemd[1]: Started sshd@9-172.31.23.232:22-147.75.109.163:37734.service. Feb 13 12:56:32.053785 kernel: kauditd_printk_skb: 11 callbacks suppressed Feb 13 12:56:32.053899 kernel: audit: type=1130 audit(1707828992.050:1450): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.23.232:22-147.75.109.163:37734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:56:32.229000 audit[5747]: USER_ACCT pid=5747 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:32.240569 sshd[5747]: Accepted publickey for core from 147.75.109.163 port 37734 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:56:32.252565 kernel: audit: type=1101 audit(1707828992.229:1451): pid=5747 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:32.252698 kernel: audit: type=1103 audit(1707828992.242:1452): pid=5747 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:32.242000 audit[5747]: CRED_ACQ pid=5747 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:32.244132 sshd[5747]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:56:32.253812 systemd[1]: Started session-10.scope. Feb 13 12:56:32.260611 kernel: audit: type=1006 audit(1707828992.242:1453): pid=5747 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 13 12:56:32.256739 systemd-logind[1730]: New session 10 of user core. Feb 13 12:56:32.242000 audit[5747]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffffbc3d50 a2=3 a3=1 items=0 ppid=1 pid=5747 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:32.242000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 12:56:32.276839 kernel: audit: type=1300 audit(1707828992.242:1453): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffffbc3d50 a2=3 a3=1 items=0 ppid=1 pid=5747 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:32.277011 kernel: audit: type=1327 audit(1707828992.242:1453): proctitle=737368643A20636F7265205B707269765D Feb 13 12:56:32.277000 audit[5747]: USER_START pid=5747 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:32.282000 audit[5749]: CRED_ACQ pid=5749 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:32.299012 kernel: audit: type=1105 audit(1707828992.277:1454): pid=5747 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:32.299268 kernel: audit: type=1103 audit(1707828992.282:1455): pid=5749 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:32.585670 sshd[5747]: pam_unix(sshd:session): session closed for user core Feb 13 12:56:32.586000 audit[5747]: USER_END pid=5747 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:32.592726 systemd[1]: session-10.scope: Deactivated successfully. Feb 13 12:56:32.594122 systemd[1]: sshd@9-172.31.23.232:22-147.75.109.163:37734.service: Deactivated successfully. Feb 13 12:56:32.589000 audit[5747]: CRED_DISP pid=5747 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:32.600742 systemd-logind[1730]: Session 10 logged out. Waiting for processes to exit. Feb 13 12:56:32.602865 systemd-logind[1730]: Removed session 10. Feb 13 12:56:32.608295 kernel: audit: type=1106 audit(1707828992.586:1456): pid=5747 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:32.608462 kernel: audit: type=1104 audit(1707828992.589:1457): pid=5747 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:32.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.23.232:22-147.75.109.163:37734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:56:37.620302 systemd[1]: Started sshd@10-172.31.23.232:22-147.75.109.163:47148.service. Feb 13 12:56:37.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.23.232:22-147.75.109.163:47148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:56:37.623226 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 12:56:37.623361 kernel: audit: type=1130 audit(1707828997.619:1459): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.23.232:22-147.75.109.163:47148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:56:37.800000 audit[5761]: USER_ACCT pid=5761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:37.801907 sshd[5761]: Accepted publickey for core from 147.75.109.163 port 47148 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:56:37.805811 sshd[5761]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:56:37.813585 kernel: audit: type=1101 audit(1707828997.800:1460): pid=5761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:37.813723 kernel: audit: type=1103 audit(1707828997.804:1461): pid=5761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:37.804000 audit[5761]: CRED_ACQ pid=5761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:37.829060 kernel: audit: type=1006 audit(1707828997.804:1462): pid=5761 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 13 12:56:37.828884 systemd-logind[1730]: New session 11 of user core. Feb 13 12:56:37.831265 systemd[1]: Started session-11.scope. Feb 13 12:56:37.804000 audit[5761]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd362600 a2=3 a3=1 items=0 ppid=1 pid=5761 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:37.843080 kernel: audit: type=1300 audit(1707828997.804:1462): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd362600 a2=3 a3=1 items=0 ppid=1 pid=5761 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:37.804000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 12:56:37.848390 kernel: audit: type=1327 audit(1707828997.804:1462): proctitle=737368643A20636F7265205B707269765D Feb 13 12:56:37.855000 audit[5761]: USER_START pid=5761 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:37.858000 audit[5763]: CRED_ACQ pid=5763 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:37.878416 kernel: audit: type=1105 audit(1707828997.855:1463): pid=5761 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:37.878616 kernel: audit: type=1103 audit(1707828997.858:1464): pid=5763 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:38.190172 sshd[5761]: pam_unix(sshd:session): session closed for user core Feb 13 12:56:38.191000 audit[5761]: USER_END pid=5761 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:38.195692 systemd-logind[1730]: Session 11 logged out. Waiting for processes to exit. Feb 13 12:56:38.199390 systemd[1]: sshd@10-172.31.23.232:22-147.75.109.163:47148.service: Deactivated successfully. Feb 13 12:56:38.201467 systemd[1]: session-11.scope: Deactivated successfully. Feb 13 12:56:38.203842 systemd-logind[1730]: Removed session 11. Feb 13 12:56:38.191000 audit[5761]: CRED_DISP pid=5761 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:38.214746 kernel: audit: type=1106 audit(1707828998.191:1465): pid=5761 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:38.214825 kernel: audit: type=1104 audit(1707828998.191:1466): pid=5761 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:38.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.23.232:22-147.75.109.163:47148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:56:38.461968 update_engine[1731]: I0213 12:56:38.461787 1731 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 12:56:38.462589 update_engine[1731]: I0213 12:56:38.462154 1731 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 12:56:38.462589 update_engine[1731]: I0213 12:56:38.462406 1731 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 13 12:56:38.463257 update_engine[1731]: E0213 12:56:38.463214 1731 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 12:56:38.463398 update_engine[1731]: I0213 12:56:38.463351 1731 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 13 12:56:43.222605 systemd[1]: Started sshd@11-172.31.23.232:22-147.75.109.163:47156.service. Feb 13 12:56:43.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.23.232:22-147.75.109.163:47156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:56:43.230029 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 12:56:43.230163 kernel: audit: type=1130 audit(1707829003.222:1468): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.23.232:22-147.75.109.163:47156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:56:43.393000 audit[5784]: USER_ACCT pid=5784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:43.394775 sshd[5784]: Accepted publickey for core from 147.75.109.163 port 47156 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:56:43.406049 kernel: audit: type=1101 audit(1707829003.393:1469): pid=5784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:43.405000 audit[5784]: CRED_ACQ pid=5784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:43.407777 sshd[5784]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:56:43.417998 systemd[1]: Started session-12.scope. Feb 13 12:56:43.421472 systemd-logind[1730]: New session 12 of user core. Feb 13 12:56:43.423226 kernel: audit: type=1103 audit(1707829003.405:1470): pid=5784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:43.423349 kernel: audit: type=1006 audit(1707829003.405:1471): pid=5784 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 13 12:56:43.423401 kernel: audit: type=1300 audit(1707829003.405:1471): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff51cb060 a2=3 a3=1 items=0 ppid=1 pid=5784 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:43.405000 audit[5784]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff51cb060 a2=3 a3=1 items=0 ppid=1 pid=5784 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:43.405000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 12:56:43.437161 kernel: audit: type=1327 audit(1707829003.405:1471): proctitle=737368643A20636F7265205B707269765D Feb 13 12:56:43.434000 audit[5784]: USER_START pid=5784 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:43.449719 kernel: audit: type=1105 audit(1707829003.434:1472): pid=5784 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:43.449000 audit[5786]: CRED_ACQ pid=5786 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:43.460693 kernel: audit: type=1103 audit(1707829003.449:1473): pid=5786 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:43.749382 sshd[5784]: pam_unix(sshd:session): session closed for user core Feb 13 12:56:43.750000 audit[5784]: USER_END pid=5784 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:43.754860 systemd-logind[1730]: Session 12 logged out. Waiting for processes to exit. Feb 13 12:56:43.757331 systemd[1]: session-12.scope: Deactivated successfully. Feb 13 12:56:43.759374 systemd-logind[1730]: Removed session 12. Feb 13 12:56:43.760721 systemd[1]: sshd@11-172.31.23.232:22-147.75.109.163:47156.service: Deactivated successfully. Feb 13 12:56:43.750000 audit[5784]: CRED_DISP pid=5784 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:43.772728 kernel: audit: type=1106 audit(1707829003.750:1474): pid=5784 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:43.773057 kernel: audit: type=1104 audit(1707829003.750:1475): pid=5784 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:43.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.23.232:22-147.75.109.163:47156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:56:43.781332 systemd[1]: Started sshd@12-172.31.23.232:22-147.75.109.163:47166.service. Feb 13 12:56:43.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.23.232:22-147.75.109.163:47166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:56:43.974000 audit[5797]: USER_ACCT pid=5797 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:43.977262 sshd[5797]: Accepted publickey for core from 147.75.109.163 port 47166 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:56:43.976000 audit[5797]: CRED_ACQ pid=5797 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:43.976000 audit[5797]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd9290920 a2=3 a3=1 items=0 ppid=1 pid=5797 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:43.976000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 12:56:43.978436 sshd[5797]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:56:43.986667 systemd-logind[1730]: New session 13 of user core. Feb 13 12:56:43.987652 systemd[1]: Started session-13.scope. Feb 13 12:56:43.999000 audit[5797]: USER_START pid=5797 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:44.002000 audit[5816]: CRED_ACQ pid=5816 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:46.100278 sshd[5797]: pam_unix(sshd:session): session closed for user core Feb 13 12:56:46.102000 audit[5797]: USER_END pid=5797 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:46.102000 audit[5797]: CRED_DISP pid=5797 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:46.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.23.232:22-147.75.109.163:47166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:56:46.106916 systemd-logind[1730]: Session 13 logged out. Waiting for processes to exit. Feb 13 12:56:46.107318 systemd[1]: sshd@12-172.31.23.232:22-147.75.109.163:47166.service: Deactivated successfully. Feb 13 12:56:46.108724 systemd[1]: session-13.scope: Deactivated successfully. Feb 13 12:56:46.111487 systemd-logind[1730]: Removed session 13. Feb 13 12:56:46.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.23.232:22-147.75.109.163:56590 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:56:46.130529 systemd[1]: Started sshd@13-172.31.23.232:22-147.75.109.163:56590.service. Feb 13 12:56:46.308000 audit[5827]: USER_ACCT pid=5827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:46.311430 sshd[5827]: Accepted publickey for core from 147.75.109.163 port 56590 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:56:46.311000 audit[5827]: CRED_ACQ pid=5827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:46.311000 audit[5827]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdf662300 a2=3 a3=1 items=0 ppid=1 pid=5827 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:46.311000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 12:56:46.313237 sshd[5827]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:56:46.323671 systemd[1]: Started session-14.scope. Feb 13 12:56:46.325090 systemd-logind[1730]: New session 14 of user core. Feb 13 12:56:46.335000 audit[5827]: USER_START pid=5827 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:46.338000 audit[5829]: CRED_ACQ pid=5829 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:46.662334 sshd[5827]: pam_unix(sshd:session): session closed for user core Feb 13 12:56:46.663000 audit[5827]: USER_END pid=5827 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:46.664000 audit[5827]: CRED_DISP pid=5827 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:46.668200 systemd-logind[1730]: Session 14 logged out. Waiting for processes to exit. Feb 13 12:56:46.669138 systemd[1]: sshd@13-172.31.23.232:22-147.75.109.163:56590.service: Deactivated successfully. Feb 13 12:56:46.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.23.232:22-147.75.109.163:56590 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:56:46.670588 systemd[1]: session-14.scope: Deactivated successfully. Feb 13 12:56:46.672855 systemd-logind[1730]: Removed session 14. Feb 13 12:56:47.293742 systemd[1]: run-containerd-runc-k8s.io-4dce4cd2eb2595a3f68304f24173f0fa33f666f655025b1814a8c8522ada9f41-runc.LcD4Sh.mount: Deactivated successfully. Feb 13 12:56:48.462903 update_engine[1731]: I0213 12:56:48.462628 1731 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 12:56:48.463614 update_engine[1731]: I0213 12:56:48.462985 1731 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 12:56:48.463614 update_engine[1731]: I0213 12:56:48.463269 1731 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 13 12:56:48.463922 update_engine[1731]: E0213 12:56:48.463886 1731 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 12:56:48.467935 update_engine[1731]: I0213 12:56:48.464044 1731 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 12:56:48.467935 update_engine[1731]: I0213 12:56:48.464061 1731 omaha_request_action.cc:621] Omaha request response: Feb 13 12:56:48.467935 update_engine[1731]: E0213 12:56:48.467902 1731 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 13 12:56:48.467935 update_engine[1731]: I0213 12:56:48.467934 1731 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 13 12:56:48.468242 update_engine[1731]: I0213 12:56:48.467974 1731 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 12:56:48.468242 update_engine[1731]: I0213 12:56:48.467988 1731 update_attempter.cc:306] Processing Done. Feb 13 12:56:48.468242 update_engine[1731]: E0213 12:56:48.468009 1731 update_attempter.cc:619] Update failed. Feb 13 12:56:48.468242 update_engine[1731]: I0213 12:56:48.468021 1731 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 13 12:56:48.468242 update_engine[1731]: I0213 12:56:48.468030 1731 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 13 12:56:48.468242 update_engine[1731]: I0213 12:56:48.468040 1731 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 13 12:56:48.468242 update_engine[1731]: I0213 12:56:48.468142 1731 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 12:56:48.468242 update_engine[1731]: I0213 12:56:48.468174 1731 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 12:56:48.468242 update_engine[1731]: I0213 12:56:48.468185 1731 omaha_request_action.cc:271] Request: Feb 13 12:56:48.468242 update_engine[1731]: Feb 13 12:56:48.468242 update_engine[1731]: Feb 13 12:56:48.468242 update_engine[1731]: Feb 13 12:56:48.468242 update_engine[1731]: Feb 13 12:56:48.468242 update_engine[1731]: Feb 13 12:56:48.468242 update_engine[1731]: Feb 13 12:56:48.468242 update_engine[1731]: I0213 12:56:48.468196 1731 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 12:56:48.469121 update_engine[1731]: I0213 12:56:48.468416 1731 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 12:56:48.469121 update_engine[1731]: I0213 12:56:48.468721 1731 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 13 12:56:48.469419 locksmithd[1792]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 13 12:56:48.469919 update_engine[1731]: E0213 12:56:48.469488 1731 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 12:56:48.469919 update_engine[1731]: I0213 12:56:48.469610 1731 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 12:56:48.469919 update_engine[1731]: I0213 12:56:48.469624 1731 omaha_request_action.cc:621] Omaha request response: Feb 13 12:56:48.469919 update_engine[1731]: I0213 12:56:48.469635 1731 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 12:56:48.469919 update_engine[1731]: I0213 12:56:48.469643 1731 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 12:56:48.469919 update_engine[1731]: I0213 12:56:48.469652 1731 update_attempter.cc:306] Processing Done. Feb 13 12:56:48.469919 update_engine[1731]: I0213 12:56:48.469662 1731 update_attempter.cc:310] Error event sent. Feb 13 12:56:48.469919 update_engine[1731]: I0213 12:56:48.469677 1731 update_check_scheduler.cc:74] Next update check in 41m37s Feb 13 12:56:48.470416 locksmithd[1792]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 13 12:56:51.066302 systemd[1]: run-containerd-runc-k8s.io-5367a3ecfe180a0efba43cbf651210be89f3f9aaa3fedf0fbdfca6eca8d0dbc1-runc.19JGtK.mount: Deactivated successfully. Feb 13 12:56:51.152930 systemd[1]: run-containerd-runc-k8s.io-f3ff59739846810bbfd9cff1f3de7a37b3111a512e93e0bc2bfc84c73859fcae-runc.rKo3bP.mount: Deactivated successfully. Feb 13 12:56:51.400009 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 13 12:56:51.400180 kernel: audit: type=1325 audit(1707829011.391:1495): table=filter:134 family=2 entries=7 op=nft_register_rule pid=5927 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:56:51.400245 kernel: audit: type=1300 audit(1707829011.391:1495): arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffe482a2e0 a2=0 a3=ffffb99a26c0 items=0 ppid=3261 pid=5927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:51.391000 audit[5927]: NETFILTER_CFG table=filter:134 family=2 entries=7 op=nft_register_rule pid=5927 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:56:51.391000 audit[5927]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffe482a2e0 a2=0 a3=ffffb99a26c0 items=0 ppid=3261 pid=5927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:51.391000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:56:51.417596 kernel: audit: type=1327 audit(1707829011.391:1495): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:56:51.393000 audit[5927]: NETFILTER_CFG table=nat:135 family=2 entries=85 op=nft_register_chain pid=5927 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:56:51.423914 kernel: audit: type=1325 audit(1707829011.393:1496): table=nat:135 family=2 entries=85 op=nft_register_chain pid=5927 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:56:51.393000 audit[5927]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=28484 a0=3 a1=ffffe482a2e0 a2=0 a3=ffffb99a26c0 items=0 ppid=3261 pid=5927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:51.436109 kernel: audit: type=1300 audit(1707829011.393:1496): arch=c00000b7 syscall=211 success=yes exit=28484 a0=3 a1=ffffe482a2e0 a2=0 a3=ffffb99a26c0 items=0 ppid=3261 pid=5927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:51.393000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:56:51.442102 kernel: audit: type=1327 audit(1707829011.393:1496): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:56:51.548000 audit[5953]: NETFILTER_CFG table=filter:136 family=2 entries=6 op=nft_register_rule pid=5953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:56:51.548000 audit[5953]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=fffff0d69450 a2=0 a3=ffffa633a6c0 items=0 ppid=3261 pid=5953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:51.567519 kernel: audit: type=1325 audit(1707829011.548:1497): table=filter:136 family=2 entries=6 op=nft_register_rule pid=5953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:56:51.567656 kernel: audit: type=1300 audit(1707829011.548:1497): arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=fffff0d69450 a2=0 a3=ffffa633a6c0 items=0 ppid=3261 pid=5953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:51.567718 kernel: audit: type=1327 audit(1707829011.548:1497): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:56:51.548000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:56:51.553000 audit[5953]: NETFILTER_CFG table=nat:137 family=2 entries=92 op=nft_register_chain pid=5953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:56:51.553000 audit[5953]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30372 a0=3 a1=fffff0d69450 a2=0 a3=ffffa633a6c0 items=0 ppid=3261 pid=5953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:51.586107 kernel: audit: type=1325 audit(1707829011.553:1498): table=nat:137 family=2 entries=92 op=nft_register_chain pid=5953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:56:51.553000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:56:51.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.23.232:22-147.75.109.163:56598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:56:51.691769 systemd[1]: Started sshd@14-172.31.23.232:22-147.75.109.163:56598.service. Feb 13 12:56:51.861000 audit[5956]: USER_ACCT pid=5956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:51.862796 sshd[5956]: Accepted publickey for core from 147.75.109.163 port 56598 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:56:51.863000 audit[5956]: CRED_ACQ pid=5956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:51.863000 audit[5956]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd5305830 a2=3 a3=1 items=0 ppid=1 pid=5956 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:51.863000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 12:56:51.865426 sshd[5956]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:56:51.874078 systemd-logind[1730]: New session 15 of user core. Feb 13 12:56:51.874696 systemd[1]: Started session-15.scope. Feb 13 12:56:51.884000 audit[5956]: USER_START pid=5956 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:51.886000 audit[5958]: CRED_ACQ pid=5958 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:52.179342 sshd[5956]: pam_unix(sshd:session): session closed for user core Feb 13 12:56:52.181000 audit[5956]: USER_END pid=5956 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:52.181000 audit[5956]: CRED_DISP pid=5956 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:52.185374 systemd-logind[1730]: Session 15 logged out. Waiting for processes to exit. Feb 13 12:56:52.185538 systemd[1]: session-15.scope: Deactivated successfully. Feb 13 12:56:52.187605 systemd[1]: sshd@14-172.31.23.232:22-147.75.109.163:56598.service: Deactivated successfully. Feb 13 12:56:52.187000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.23.232:22-147.75.109.163:56598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:56:52.189894 systemd-logind[1730]: Removed session 15. Feb 13 12:56:57.208691 systemd[1]: Started sshd@15-172.31.23.232:22-147.75.109.163:55024.service. Feb 13 12:56:57.220419 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 13 12:56:57.220557 kernel: audit: type=1130 audit(1707829017.208:1508): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.23.232:22-147.75.109.163:55024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:56:57.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.23.232:22-147.75.109.163:55024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:56:57.382000 audit[5972]: USER_ACCT pid=5972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:57.383302 sshd[5972]: Accepted publickey for core from 147.75.109.163 port 55024 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:56:57.387585 sshd[5972]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:56:57.385000 audit[5972]: CRED_ACQ pid=5972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:57.403042 kernel: audit: type=1101 audit(1707829017.382:1509): pid=5972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:57.403213 kernel: audit: type=1103 audit(1707829017.385:1510): pid=5972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:57.409612 kernel: audit: type=1006 audit(1707829017.385:1511): pid=5972 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 13 12:56:57.385000 audit[5972]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe7a5a240 a2=3 a3=1 items=0 ppid=1 pid=5972 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:57.413198 systemd-logind[1730]: New session 16 of user core. Feb 13 12:56:57.415681 systemd[1]: Started session-16.scope. Feb 13 12:56:57.385000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 12:56:57.426993 kernel: audit: type=1300 audit(1707829017.385:1511): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe7a5a240 a2=3 a3=1 items=0 ppid=1 pid=5972 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:56:57.431071 kernel: audit: type=1327 audit(1707829017.385:1511): proctitle=737368643A20636F7265205B707269765D Feb 13 12:56:57.437000 audit[5972]: USER_START pid=5972 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:57.449000 audit[5974]: CRED_ACQ pid=5974 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:57.451176 kernel: audit: type=1105 audit(1707829017.437:1512): pid=5972 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:57.461060 kernel: audit: type=1103 audit(1707829017.449:1513): pid=5974 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:57.697351 sshd[5972]: pam_unix(sshd:session): session closed for user core Feb 13 12:56:57.698000 audit[5972]: USER_END pid=5972 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:57.711336 systemd[1]: sshd@15-172.31.23.232:22-147.75.109.163:55024.service: Deactivated successfully. Feb 13 12:56:57.712810 systemd[1]: session-16.scope: Deactivated successfully. Feb 13 12:56:57.699000 audit[5972]: CRED_DISP pid=5972 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:57.722625 kernel: audit: type=1106 audit(1707829017.698:1514): pid=5972 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:57.722759 kernel: audit: type=1104 audit(1707829017.699:1515): pid=5972 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:56:57.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.23.232:22-147.75.109.163:55024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:56:57.723587 systemd-logind[1730]: Session 16 logged out. Waiting for processes to exit. Feb 13 12:56:57.725605 systemd-logind[1730]: Removed session 16. Feb 13 12:57:01.219000 audit[2678]: AVC avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:57:01.219000 audit[2678]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7b a1=400b6b5f80 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:57:01.219000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:57:01.220000 audit[2678]: AVC avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:57:01.220000 audit[2678]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7b a1=4002eeffc0 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:57:01.220000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:57:01.223000 audit[2678]: AVC avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:57:01.223000 audit[2678]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7b a1=400c079890 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:57:01.223000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:57:01.291000 audit[2678]: AVC avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:57:01.291000 audit[2678]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7b a1=400c0799b0 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:57:01.291000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:57:01.295000 audit[2678]: AVC avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:57:01.295000 audit[2678]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7b a1=4003006280 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:57:01.295000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:57:01.305000 audit[2678]: AVC avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:57:01.305000 audit[2678]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7b a1=400c079a40 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:57:01.305000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:57:01.763000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:57:01.763000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:57:01.763000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40021aad20 a2=fc6 a3=0 items=0 ppid=2501 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 key=(null) Feb 13 12:57:01.763000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 12:57:01.763000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40023e8180 a2=fc6 a3=0 items=0 ppid=2501 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 key=(null) Feb 13 12:57:01.763000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 12:57:01.889500 systemd[1]: run-containerd-runc-k8s.io-772295ff091cd8be7083a1b60105dc40139aa9685bee88cc4fac1d41994a36e8-runc.9x07zG.mount: Deactivated successfully. Feb 13 12:57:02.737815 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 13 12:57:02.738004 kernel: audit: type=1130 audit(1707829022.725:1525): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.23.232:22-147.75.109.163:55036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:02.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.23.232:22-147.75.109.163:55036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:02.726180 systemd[1]: Started sshd@16-172.31.23.232:22-147.75.109.163:55036.service. Feb 13 12:57:02.896456 sshd[6005]: Accepted publickey for core from 147.75.109.163 port 55036 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:57:02.895000 audit[6005]: USER_ACCT pid=6005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:02.906000 audit[6005]: CRED_ACQ pid=6005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:02.917787 kernel: audit: type=1101 audit(1707829022.895:1526): pid=6005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:02.917960 kernel: audit: type=1103 audit(1707829022.906:1527): pid=6005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:02.908610 sshd[6005]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:57:02.925495 kernel: audit: type=1006 audit(1707829022.906:1528): pid=6005 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 13 12:57:02.906000 audit[6005]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe8b52ea0 a2=3 a3=1 items=0 ppid=1 pid=6005 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:02.939664 kernel: audit: type=1300 audit(1707829022.906:1528): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe8b52ea0 a2=3 a3=1 items=0 ppid=1 pid=6005 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:02.933913 systemd-logind[1730]: New session 17 of user core. Feb 13 12:57:02.936393 systemd[1]: Started session-17.scope. Feb 13 12:57:02.944438 kernel: audit: type=1327 audit(1707829022.906:1528): proctitle=737368643A20636F7265205B707269765D Feb 13 12:57:02.906000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 12:57:02.955000 audit[6005]: USER_START pid=6005 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:02.968154 kernel: audit: type=1105 audit(1707829022.955:1529): pid=6005 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:02.967000 audit[6007]: CRED_ACQ pid=6007 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:02.979119 kernel: audit: type=1103 audit(1707829022.967:1530): pid=6007 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:03.251324 sshd[6005]: pam_unix(sshd:session): session closed for user core Feb 13 12:57:03.252000 audit[6005]: USER_END pid=6005 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:03.267257 systemd[1]: sshd@16-172.31.23.232:22-147.75.109.163:55036.service: Deactivated successfully. Feb 13 12:57:03.268634 systemd[1]: session-17.scope: Deactivated successfully. Feb 13 12:57:03.270455 systemd-logind[1730]: Session 17 logged out. Waiting for processes to exit. Feb 13 12:57:03.272826 systemd-logind[1730]: Removed session 17. Feb 13 12:57:03.274003 kernel: audit: type=1106 audit(1707829023.252:1531): pid=6005 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:03.274130 kernel: audit: type=1104 audit(1707829023.252:1532): pid=6005 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:03.252000 audit[6005]: CRED_DISP pid=6005 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:03.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.23.232:22-147.75.109.163:55036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:08.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.23.232:22-147.75.109.163:59910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:08.279431 systemd[1]: Started sshd@17-172.31.23.232:22-147.75.109.163:59910.service. Feb 13 12:57:08.282722 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 12:57:08.282861 kernel: audit: type=1130 audit(1707829028.277:1534): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.23.232:22-147.75.109.163:59910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:08.462000 audit[6020]: USER_ACCT pid=6020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:08.468199 sshd[6020]: Accepted publickey for core from 147.75.109.163 port 59910 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:57:08.473066 sshd[6020]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:57:08.470000 audit[6020]: CRED_ACQ pid=6020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:08.486165 kernel: audit: type=1101 audit(1707829028.462:1535): pid=6020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:08.486270 kernel: audit: type=1103 audit(1707829028.470:1536): pid=6020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:08.492585 kernel: audit: type=1006 audit(1707829028.470:1537): pid=6020 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Feb 13 12:57:08.470000 audit[6020]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5f03620 a2=3 a3=1 items=0 ppid=1 pid=6020 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:08.502967 kernel: audit: type=1300 audit(1707829028.470:1537): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5f03620 a2=3 a3=1 items=0 ppid=1 pid=6020 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:08.505431 kernel: audit: type=1327 audit(1707829028.470:1537): proctitle=737368643A20636F7265205B707269765D Feb 13 12:57:08.470000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 12:57:08.504321 systemd-logind[1730]: New session 18 of user core. Feb 13 12:57:08.506299 systemd[1]: Started session-18.scope. Feb 13 12:57:08.516000 audit[6020]: USER_START pid=6020 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:08.516000 audit[6022]: CRED_ACQ pid=6022 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:08.539201 kernel: audit: type=1105 audit(1707829028.516:1538): pid=6020 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:08.539282 kernel: audit: type=1103 audit(1707829028.516:1539): pid=6022 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:08.761696 sshd[6020]: pam_unix(sshd:session): session closed for user core Feb 13 12:57:08.762000 audit[6020]: USER_END pid=6020 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:08.767529 systemd[1]: session-18.scope: Deactivated successfully. Feb 13 12:57:08.769041 systemd[1]: sshd@17-172.31.23.232:22-147.75.109.163:59910.service: Deactivated successfully. Feb 13 12:57:08.763000 audit[6020]: CRED_DISP pid=6020 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:08.776636 systemd-logind[1730]: Session 18 logged out. Waiting for processes to exit. Feb 13 12:57:08.787022 kernel: audit: type=1106 audit(1707829028.762:1540): pid=6020 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:08.787180 kernel: audit: type=1104 audit(1707829028.763:1541): pid=6020 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:08.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.23.232:22-147.75.109.163:59910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:08.794676 systemd[1]: Started sshd@18-172.31.23.232:22-147.75.109.163:59924.service. Feb 13 12:57:08.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.23.232:22-147.75.109.163:59924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:08.799142 systemd-logind[1730]: Removed session 18. Feb 13 12:57:08.970597 sshd[6031]: Accepted publickey for core from 147.75.109.163 port 59924 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:57:08.969000 audit[6031]: USER_ACCT pid=6031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:08.973385 sshd[6031]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:57:08.971000 audit[6031]: CRED_ACQ pid=6031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:08.971000 audit[6031]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff1d18120 a2=3 a3=1 items=0 ppid=1 pid=6031 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:08.971000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 12:57:08.983694 systemd[1]: Started session-19.scope. Feb 13 12:57:08.986702 systemd-logind[1730]: New session 19 of user core. Feb 13 12:57:08.997000 audit[6031]: USER_START pid=6031 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:09.000000 audit[6033]: CRED_ACQ pid=6033 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:09.578729 sshd[6031]: pam_unix(sshd:session): session closed for user core Feb 13 12:57:09.581000 audit[6031]: USER_END pid=6031 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:09.581000 audit[6031]: CRED_DISP pid=6031 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:09.585744 systemd[1]: sshd@18-172.31.23.232:22-147.75.109.163:59924.service: Deactivated successfully. Feb 13 12:57:09.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.23.232:22-147.75.109.163:59924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:09.588348 systemd[1]: session-19.scope: Deactivated successfully. Feb 13 12:57:09.590534 systemd-logind[1730]: Session 19 logged out. Waiting for processes to exit. Feb 13 12:57:09.593645 systemd-logind[1730]: Removed session 19. Feb 13 12:57:09.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.23.232:22-147.75.109.163:59934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:09.619381 systemd[1]: Started sshd@19-172.31.23.232:22-147.75.109.163:59934.service. Feb 13 12:57:09.796000 audit[6041]: USER_ACCT pid=6041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:09.797520 sshd[6041]: Accepted publickey for core from 147.75.109.163 port 59934 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:57:09.798000 audit[6041]: CRED_ACQ pid=6041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:09.798000 audit[6041]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd03502b0 a2=3 a3=1 items=0 ppid=1 pid=6041 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:09.798000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 12:57:09.799941 sshd[6041]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:57:09.809671 systemd[1]: Started session-20.scope. Feb 13 12:57:09.810596 systemd-logind[1730]: New session 20 of user core. Feb 13 12:57:09.822000 audit[6041]: USER_START pid=6041 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:09.825000 audit[6043]: CRED_ACQ pid=6043 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:13.625547 sshd[6041]: pam_unix(sshd:session): session closed for user core Feb 13 12:57:13.626000 audit[6041]: USER_END pid=6041 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:13.631819 kernel: kauditd_printk_skb: 20 callbacks suppressed Feb 13 12:57:13.632020 kernel: audit: type=1106 audit(1707829033.626:1558): pid=6041 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:13.643592 systemd[1]: sshd@19-172.31.23.232:22-147.75.109.163:59934.service: Deactivated successfully. Feb 13 12:57:13.645045 systemd[1]: session-20.scope: Deactivated successfully. Feb 13 12:57:13.645421 systemd[1]: session-20.scope: Consumed 1.109s CPU time. Feb 13 12:57:13.646413 systemd-logind[1730]: Session 20 logged out. Waiting for processes to exit. Feb 13 12:57:13.656577 systemd[1]: Started sshd@20-172.31.23.232:22-147.75.109.163:59944.service. Feb 13 12:57:13.661328 kernel: audit: type=1104 audit(1707829033.626:1559): pid=6041 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:13.626000 audit[6041]: CRED_DISP pid=6041 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:13.660152 systemd-logind[1730]: Removed session 20. Feb 13 12:57:13.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.23.232:22-147.75.109.163:59934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:13.684739 kernel: audit: type=1131 audit(1707829033.643:1560): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.23.232:22-147.75.109.163:59934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:13.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.23.232:22-147.75.109.163:59944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:13.706060 kernel: audit: type=1130 audit(1707829033.655:1561): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.23.232:22-147.75.109.163:59944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:13.846000 audit[6064]: USER_ACCT pid=6064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:13.847446 sshd[6064]: Accepted publickey for core from 147.75.109.163 port 59944 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:57:13.850650 sshd[6064]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:57:13.848000 audit[6064]: CRED_ACQ pid=6064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:13.870569 kernel: audit: type=1101 audit(1707829033.846:1562): pid=6064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:13.870736 kernel: audit: type=1103 audit(1707829033.848:1563): pid=6064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:13.876089 systemd-logind[1730]: New session 21 of user core. Feb 13 12:57:13.877262 systemd[1]: Started session-21.scope. Feb 13 12:57:13.888736 kernel: audit: type=1006 audit(1707829033.849:1564): pid=6064 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Feb 13 12:57:13.849000 audit[6064]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc19bb860 a2=3 a3=1 items=0 ppid=1 pid=6064 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:13.903298 kernel: audit: type=1300 audit(1707829033.849:1564): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc19bb860 a2=3 a3=1 items=0 ppid=1 pid=6064 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:13.849000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 12:57:13.916296 kernel: audit: type=1327 audit(1707829033.849:1564): proctitle=737368643A20636F7265205B707269765D Feb 13 12:57:13.909000 audit[6064]: USER_START pid=6064 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:13.932081 kernel: audit: type=1105 audit(1707829033.909:1565): pid=6064 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:13.913000 audit[6085]: CRED_ACQ pid=6085 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:13.926000 audit[6087]: NETFILTER_CFG table=filter:138 family=2 entries=6 op=nft_register_rule pid=6087 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:57:13.926000 audit[6087]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffc5b72bc0 a2=0 a3=ffffb50326c0 items=0 ppid=3261 pid=6087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:13.926000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:57:13.933000 audit[6087]: NETFILTER_CFG table=nat:139 family=2 entries=94 op=nft_register_rule pid=6087 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:57:13.933000 audit[6087]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30372 a0=3 a1=ffffc5b72bc0 a2=0 a3=ffffb50326c0 items=0 ppid=3261 pid=6087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:13.933000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:57:14.313000 audit[6136]: NETFILTER_CFG table=filter:140 family=2 entries=18 op=nft_register_rule pid=6136 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:57:14.313000 audit[6136]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10364 a0=3 a1=ffffdd52b370 a2=0 a3=ffff919146c0 items=0 ppid=3261 pid=6136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:14.313000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:57:14.318000 audit[6136]: NETFILTER_CFG table=nat:141 family=2 entries=94 op=nft_register_rule pid=6136 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:57:14.318000 audit[6136]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30372 a0=3 a1=ffffdd52b370 a2=0 a3=ffff919146c0 items=0 ppid=3261 pid=6136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:14.318000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:57:14.524771 sshd[6064]: pam_unix(sshd:session): session closed for user core Feb 13 12:57:14.526000 audit[6064]: USER_END pid=6064 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:14.526000 audit[6064]: CRED_DISP pid=6064 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:14.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.23.232:22-147.75.109.163:59944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:14.531826 systemd-logind[1730]: Session 21 logged out. Waiting for processes to exit. Feb 13 12:57:14.532314 systemd[1]: sshd@20-172.31.23.232:22-147.75.109.163:59944.service: Deactivated successfully. Feb 13 12:57:14.533717 systemd[1]: session-21.scope: Deactivated successfully. Feb 13 12:57:14.536026 systemd-logind[1730]: Removed session 21. Feb 13 12:57:14.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.23.232:22-147.75.109.163:56984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:14.554998 systemd[1]: Started sshd@21-172.31.23.232:22-147.75.109.163:56984.service. Feb 13 12:57:14.731000 audit[6139]: USER_ACCT pid=6139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:14.732323 sshd[6139]: Accepted publickey for core from 147.75.109.163 port 56984 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:57:14.733000 audit[6139]: CRED_ACQ pid=6139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:14.733000 audit[6139]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd820e960 a2=3 a3=1 items=0 ppid=1 pid=6139 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:14.733000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 12:57:14.735398 sshd[6139]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:57:14.744072 systemd-logind[1730]: New session 22 of user core. Feb 13 12:57:14.745021 systemd[1]: Started session-22.scope. Feb 13 12:57:14.755000 audit[6139]: USER_START pid=6139 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:14.758000 audit[6141]: CRED_ACQ pid=6141 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:15.006597 sshd[6139]: pam_unix(sshd:session): session closed for user core Feb 13 12:57:15.007000 audit[6139]: USER_END pid=6139 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:15.007000 audit[6139]: CRED_DISP pid=6139 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:15.012252 systemd-logind[1730]: Session 22 logged out. Waiting for processes to exit. Feb 13 12:57:15.012791 systemd[1]: sshd@21-172.31.23.232:22-147.75.109.163:56984.service: Deactivated successfully. Feb 13 12:57:15.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.23.232:22-147.75.109.163:56984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:15.014804 systemd[1]: session-22.scope: Deactivated successfully. Feb 13 12:57:15.016804 systemd-logind[1730]: Removed session 22. Feb 13 12:57:16.773000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:57:16.773000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002bd8980 a2=fc6 a3=0 items=0 ppid=2501 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 key=(null) Feb 13 12:57:16.773000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 12:57:16.774000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:57:16.774000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002a6db60 a2=fc6 a3=0 items=0 ppid=2501 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 key=(null) Feb 13 12:57:16.774000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 12:57:16.777000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:57:16.777000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:57:16.777000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4002bd8aa0 a2=fc6 a3=0 items=0 ppid=2501 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 key=(null) Feb 13 12:57:16.777000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 12:57:16.777000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002a6db80 a2=fc6 a3=0 items=0 ppid=2501 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 key=(null) Feb 13 12:57:16.777000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 12:57:20.039542 kernel: kauditd_printk_skb: 39 callbacks suppressed Feb 13 12:57:20.039718 kernel: audit: type=1130 audit(1707829040.036:1587): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.23.232:22-147.75.109.163:56990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:20.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.23.232:22-147.75.109.163:56990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:20.037134 systemd[1]: Started sshd@22-172.31.23.232:22-147.75.109.163:56990.service. Feb 13 12:57:20.214000 audit[6181]: USER_ACCT pid=6181 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:20.219158 sshd[6181]: Accepted publickey for core from 147.75.109.163 port 56990 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:57:20.223782 sshd[6181]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:57:20.226989 kernel: audit: type=1101 audit(1707829040.214:1588): pid=6181 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:20.222000 audit[6181]: CRED_ACQ pid=6181 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:20.244654 kernel: audit: type=1103 audit(1707829040.222:1589): pid=6181 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:20.244777 kernel: audit: type=1006 audit(1707829040.222:1590): pid=6181 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 13 12:57:20.256406 kernel: audit: type=1300 audit(1707829040.222:1590): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff260ed70 a2=3 a3=1 items=0 ppid=1 pid=6181 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:20.222000 audit[6181]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff260ed70 a2=3 a3=1 items=0 ppid=1 pid=6181 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:20.255642 systemd-logind[1730]: New session 23 of user core. Feb 13 12:57:20.255826 systemd[1]: Started session-23.scope. Feb 13 12:57:20.222000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 12:57:20.261802 kernel: audit: type=1327 audit(1707829040.222:1590): proctitle=737368643A20636F7265205B707269765D Feb 13 12:57:20.270000 audit[6181]: USER_START pid=6181 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:20.283013 kernel: audit: type=1105 audit(1707829040.270:1591): pid=6181 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:20.282000 audit[6185]: CRED_ACQ pid=6185 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:20.292981 kernel: audit: type=1103 audit(1707829040.282:1592): pid=6185 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:20.511719 sshd[6181]: pam_unix(sshd:session): session closed for user core Feb 13 12:57:20.512000 audit[6181]: USER_END pid=6181 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:20.526472 systemd[1]: sshd@22-172.31.23.232:22-147.75.109.163:56990.service: Deactivated successfully. Feb 13 12:57:20.528062 systemd[1]: session-23.scope: Deactivated successfully. Feb 13 12:57:20.518000 audit[6181]: CRED_DISP pid=6181 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:20.538183 kernel: audit: type=1106 audit(1707829040.512:1593): pid=6181 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:20.538302 kernel: audit: type=1104 audit(1707829040.518:1594): pid=6181 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:20.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.23.232:22-147.75.109.163:56990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:20.538601 systemd-logind[1730]: Session 23 logged out. Waiting for processes to exit. Feb 13 12:57:20.540857 systemd-logind[1730]: Removed session 23. Feb 13 12:57:23.173000 audit[6257]: NETFILTER_CFG table=filter:142 family=2 entries=18 op=nft_register_rule pid=6257 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:57:23.173000 audit[6257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffd2e8f1a0 a2=0 a3=ffff9151a6c0 items=0 ppid=3261 pid=6257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:23.173000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:57:23.182000 audit[6257]: NETFILTER_CFG table=nat:143 family=2 entries=178 op=nft_register_chain pid=6257 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 12:57:23.182000 audit[6257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=72324 a0=3 a1=ffffd2e8f1a0 a2=0 a3=ffff9151a6c0 items=0 ppid=3261 pid=6257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:23.182000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 12:57:25.542516 systemd[1]: Started sshd@23-172.31.23.232:22-147.75.109.163:52466.service. Feb 13 12:57:25.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.23.232:22-147.75.109.163:52466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:25.546984 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 13 12:57:25.547128 kernel: audit: type=1130 audit(1707829045.542:1598): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.23.232:22-147.75.109.163:52466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:25.721000 audit[6260]: USER_ACCT pid=6260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:25.724475 sshd[6260]: Accepted publickey for core from 147.75.109.163 port 52466 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:57:25.726191 sshd[6260]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:57:25.724000 audit[6260]: CRED_ACQ pid=6260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:25.742763 kernel: audit: type=1101 audit(1707829045.721:1599): pid=6260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:25.742850 kernel: audit: type=1103 audit(1707829045.724:1600): pid=6260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:25.749101 kernel: audit: type=1006 audit(1707829045.724:1601): pid=6260 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 13 12:57:25.724000 audit[6260]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffee18e080 a2=3 a3=1 items=0 ppid=1 pid=6260 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:25.759532 kernel: audit: type=1300 audit(1707829045.724:1601): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffee18e080 a2=3 a3=1 items=0 ppid=1 pid=6260 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:25.724000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 12:57:25.763302 kernel: audit: type=1327 audit(1707829045.724:1601): proctitle=737368643A20636F7265205B707269765D Feb 13 12:57:25.769015 systemd-logind[1730]: New session 24 of user core. Feb 13 12:57:25.770427 systemd[1]: Started session-24.scope. Feb 13 12:57:25.786000 audit[6260]: USER_START pid=6260 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:25.797000 audit[6262]: CRED_ACQ pid=6262 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:25.808160 kernel: audit: type=1105 audit(1707829045.786:1602): pid=6260 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:25.808318 kernel: audit: type=1103 audit(1707829045.797:1603): pid=6262 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:26.025262 sshd[6260]: pam_unix(sshd:session): session closed for user core Feb 13 12:57:26.026000 audit[6260]: USER_END pid=6260 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:26.029322 systemd[1]: session-24.scope: Deactivated successfully. Feb 13 12:57:26.030512 systemd[1]: sshd@23-172.31.23.232:22-147.75.109.163:52466.service: Deactivated successfully. Feb 13 12:57:26.026000 audit[6260]: CRED_DISP pid=6260 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:26.048957 kernel: audit: type=1106 audit(1707829046.026:1604): pid=6260 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:26.049087 kernel: audit: type=1104 audit(1707829046.026:1605): pid=6260 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:26.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.23.232:22-147.75.109.163:52466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:26.049695 systemd-logind[1730]: Session 24 logged out. Waiting for processes to exit. Feb 13 12:57:26.051191 systemd-logind[1730]: Removed session 24. Feb 13 12:57:28.193000 audit[5618]: AVC avc: denied { watch } for pid=5618 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_12_56_20.1052009840/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c291,c911 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c291,c911 tclass=file permissive=0 Feb 13 12:57:28.193000 audit[5618]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400106ba00 a2=fc6 a3=0 items=0 ppid=5506 pid=5618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c291,c911 key=(null) Feb 13 12:57:28.193000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 12:57:28.897000 audit[5658]: AVC avc: denied { watch } for pid=5658 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_12_56_20.2124729172/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c857,c903 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c857,c903 tclass=file permissive=0 Feb 13 12:57:28.897000 audit[5658]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001a28e20 a2=fc6 a3=0 items=0 ppid=5555 pid=5658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c857,c903 key=(null) Feb 13 12:57:28.897000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 12:57:31.065151 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 13 12:57:31.065295 kernel: audit: type=1130 audit(1707829051.053:1609): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.23.232:22-147.75.109.163:52480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:31.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.23.232:22-147.75.109.163:52480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:31.053898 systemd[1]: Started sshd@24-172.31.23.232:22-147.75.109.163:52480.service. Feb 13 12:57:31.225000 audit[6283]: USER_ACCT pid=6283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:31.232183 sshd[6283]: Accepted publickey for core from 147.75.109.163 port 52480 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:57:31.237000 audit[6283]: CRED_ACQ pid=6283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:31.239865 sshd[6283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:57:31.248748 kernel: audit: type=1101 audit(1707829051.225:1610): pid=6283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:31.248897 kernel: audit: type=1103 audit(1707829051.237:1611): pid=6283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:31.255312 systemd-logind[1730]: New session 25 of user core. Feb 13 12:57:31.258038 kernel: audit: type=1006 audit(1707829051.237:1612): pid=6283 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 13 12:57:31.237000 audit[6283]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3a5cdb0 a2=3 a3=1 items=0 ppid=1 pid=6283 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:31.260260 systemd[1]: Started session-25.scope. Feb 13 12:57:31.269153 kernel: audit: type=1300 audit(1707829051.237:1612): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3a5cdb0 a2=3 a3=1 items=0 ppid=1 pid=6283 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:31.237000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 12:57:31.275435 kernel: audit: type=1327 audit(1707829051.237:1612): proctitle=737368643A20636F7265205B707269765D Feb 13 12:57:31.278000 audit[6283]: USER_START pid=6283 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:31.290871 kernel: audit: type=1105 audit(1707829051.278:1613): pid=6283 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:31.292000 audit[6286]: CRED_ACQ pid=6286 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:31.302896 kernel: audit: type=1103 audit(1707829051.292:1614): pid=6286 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:31.551872 sshd[6283]: pam_unix(sshd:session): session closed for user core Feb 13 12:57:31.553000 audit[6283]: USER_END pid=6283 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:31.557442 systemd-logind[1730]: Session 25 logged out. Waiting for processes to exit. Feb 13 12:57:31.560057 systemd[1]: session-25.scope: Deactivated successfully. Feb 13 12:57:31.562202 systemd-logind[1730]: Removed session 25. Feb 13 12:57:31.563797 systemd[1]: sshd@24-172.31.23.232:22-147.75.109.163:52480.service: Deactivated successfully. Feb 13 12:57:31.553000 audit[6283]: CRED_DISP pid=6283 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:31.574899 kernel: audit: type=1106 audit(1707829051.553:1615): pid=6283 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:31.575019 kernel: audit: type=1104 audit(1707829051.553:1616): pid=6283 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:31.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.23.232:22-147.75.109.163:52480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:36.587734 systemd[1]: Started sshd@25-172.31.23.232:22-147.75.109.163:45078.service. Feb 13 12:57:36.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.23.232:22-147.75.109.163:45078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:36.590653 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 12:57:36.590766 kernel: audit: type=1130 audit(1707829056.587:1618): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.23.232:22-147.75.109.163:45078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:36.772000 audit[6296]: USER_ACCT pid=6296 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:36.773839 sshd[6296]: Accepted publickey for core from 147.75.109.163 port 45078 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:57:36.785011 kernel: audit: type=1101 audit(1707829056.772:1619): pid=6296 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:36.784000 audit[6296]: CRED_ACQ pid=6296 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:36.786641 sshd[6296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:57:36.802157 kernel: audit: type=1103 audit(1707829056.784:1620): pid=6296 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:36.802279 kernel: audit: type=1006 audit(1707829056.784:1621): pid=6296 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 13 12:57:36.784000 audit[6296]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffefe519c0 a2=3 a3=1 items=0 ppid=1 pid=6296 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:36.808127 systemd[1]: Started session-26.scope. Feb 13 12:57:36.811054 systemd-logind[1730]: New session 26 of user core. Feb 13 12:57:36.816343 kernel: audit: type=1300 audit(1707829056.784:1621): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffefe519c0 a2=3 a3=1 items=0 ppid=1 pid=6296 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:36.816468 kernel: audit: type=1327 audit(1707829056.784:1621): proctitle=737368643A20636F7265205B707269765D Feb 13 12:57:36.784000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 12:57:36.837000 audit[6296]: USER_START pid=6296 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:36.852000 audit[6298]: CRED_ACQ pid=6298 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:36.855972 kernel: audit: type=1105 audit(1707829056.837:1622): pid=6296 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:36.856083 kernel: audit: type=1103 audit(1707829056.852:1623): pid=6298 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:37.112145 sshd[6296]: pam_unix(sshd:session): session closed for user core Feb 13 12:57:37.113000 audit[6296]: USER_END pid=6296 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:37.114000 audit[6296]: CRED_DISP pid=6296 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:37.126676 systemd[1]: sshd@25-172.31.23.232:22-147.75.109.163:45078.service: Deactivated successfully. Feb 13 12:57:37.136240 kernel: audit: type=1106 audit(1707829057.113:1624): pid=6296 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:37.136384 kernel: audit: type=1104 audit(1707829057.114:1625): pid=6296 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:37.128027 systemd[1]: session-26.scope: Deactivated successfully. Feb 13 12:57:37.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.23.232:22-147.75.109.163:45078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:37.137250 systemd-logind[1730]: Session 26 logged out. Waiting for processes to exit. Feb 13 12:57:37.138976 systemd-logind[1730]: Removed session 26. Feb 13 12:57:42.142648 systemd[1]: Started sshd@26-172.31.23.232:22-147.75.109.163:45094.service. Feb 13 12:57:42.155594 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 12:57:42.155716 kernel: audit: type=1130 audit(1707829062.143:1627): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.23.232:22-147.75.109.163:45094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:42.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.23.232:22-147.75.109.163:45094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:42.329000 audit[6311]: USER_ACCT pid=6311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:42.330799 sshd[6311]: Accepted publickey for core from 147.75.109.163 port 45094 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:57:42.334302 sshd[6311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:57:42.332000 audit[6311]: CRED_ACQ pid=6311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:42.350565 kernel: audit: type=1101 audit(1707829062.329:1628): pid=6311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:42.350679 kernel: audit: type=1103 audit(1707829062.332:1629): pid=6311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:42.358303 kernel: audit: type=1006 audit(1707829062.332:1630): pid=6311 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 13 12:57:42.332000 audit[6311]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc5ae2da0 a2=3 a3=1 items=0 ppid=1 pid=6311 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:42.368708 kernel: audit: type=1300 audit(1707829062.332:1630): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc5ae2da0 a2=3 a3=1 items=0 ppid=1 pid=6311 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:42.359277 systemd-logind[1730]: New session 27 of user core. Feb 13 12:57:42.369769 systemd[1]: Started session-27.scope. Feb 13 12:57:42.375791 kernel: audit: type=1327 audit(1707829062.332:1630): proctitle=737368643A20636F7265205B707269765D Feb 13 12:57:42.332000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 12:57:42.381000 audit[6311]: USER_START pid=6311 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:42.384000 audit[6314]: CRED_ACQ pid=6314 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:42.395098 kernel: audit: type=1105 audit(1707829062.381:1631): pid=6311 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:42.405014 kernel: audit: type=1103 audit(1707829062.384:1632): pid=6314 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:42.624125 sshd[6311]: pam_unix(sshd:session): session closed for user core Feb 13 12:57:42.625000 audit[6311]: USER_END pid=6311 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:42.631651 systemd[1]: sshd@26-172.31.23.232:22-147.75.109.163:45094.service: Deactivated successfully. Feb 13 12:57:42.633636 systemd[1]: session-27.scope: Deactivated successfully. Feb 13 12:57:42.635328 systemd-logind[1730]: Session 27 logged out. Waiting for processes to exit. Feb 13 12:57:42.637325 systemd-logind[1730]: Removed session 27. Feb 13 12:57:42.625000 audit[6311]: CRED_DISP pid=6311 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:42.651173 kernel: audit: type=1106 audit(1707829062.625:1633): pid=6311 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:42.651319 kernel: audit: type=1104 audit(1707829062.625:1634): pid=6311 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:42.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.23.232:22-147.75.109.163:45094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:47.302670 systemd[1]: run-containerd-runc-k8s.io-4dce4cd2eb2595a3f68304f24173f0fa33f666f655025b1814a8c8522ada9f41-runc.KTmJCc.mount: Deactivated successfully. Feb 13 12:57:47.655745 systemd[1]: Started sshd@27-172.31.23.232:22-147.75.109.163:59662.service. Feb 13 12:57:47.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.23.232:22-147.75.109.163:59662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:47.663169 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 12:57:47.663323 kernel: audit: type=1130 audit(1707829067.654:1636): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.23.232:22-147.75.109.163:59662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:47.832000 audit[6366]: USER_ACCT pid=6366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:47.834857 sshd[6366]: Accepted publickey for core from 147.75.109.163 port 59662 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:57:47.838008 sshd[6366]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:57:47.835000 audit[6366]: CRED_ACQ pid=6366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:47.847679 systemd[1]: Started session-28.scope. Feb 13 12:57:47.849163 systemd-logind[1730]: New session 28 of user core. Feb 13 12:57:47.854771 kernel: audit: type=1101 audit(1707829067.832:1637): pid=6366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:47.855019 kernel: audit: type=1103 audit(1707829067.835:1638): pid=6366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:47.862043 kernel: audit: type=1006 audit(1707829067.835:1639): pid=6366 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 13 12:57:47.862174 kernel: audit: type=1300 audit(1707829067.835:1639): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffb00c8e0 a2=3 a3=1 items=0 ppid=1 pid=6366 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:47.835000 audit[6366]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffb00c8e0 a2=3 a3=1 items=0 ppid=1 pid=6366 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:47.835000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 12:57:47.875718 kernel: audit: type=1327 audit(1707829067.835:1639): proctitle=737368643A20636F7265205B707269765D Feb 13 12:57:47.875797 kernel: audit: type=1105 audit(1707829067.861:1640): pid=6366 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:47.861000 audit[6366]: USER_START pid=6366 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:47.863000 audit[6368]: CRED_ACQ pid=6368 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:47.895969 kernel: audit: type=1103 audit(1707829067.863:1641): pid=6368 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:48.096305 sshd[6366]: pam_unix(sshd:session): session closed for user core Feb 13 12:57:48.096000 audit[6366]: USER_END pid=6366 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:48.102643 systemd-logind[1730]: Session 28 logged out. Waiting for processes to exit. Feb 13 12:57:48.105047 systemd[1]: session-28.scope: Deactivated successfully. Feb 13 12:57:48.106918 systemd-logind[1730]: Removed session 28. Feb 13 12:57:48.108288 systemd[1]: sshd@27-172.31.23.232:22-147.75.109.163:59662.service: Deactivated successfully. Feb 13 12:57:48.098000 audit[6366]: CRED_DISP pid=6366 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:48.119794 kernel: audit: type=1106 audit(1707829068.096:1642): pid=6366 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:48.119901 kernel: audit: type=1104 audit(1707829068.098:1643): pid=6366 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:48.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.23.232:22-147.75.109.163:59662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:53.130338 systemd[1]: Started sshd@28-172.31.23.232:22-147.75.109.163:59672.service. Feb 13 12:57:53.142782 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 12:57:53.142858 kernel: audit: type=1130 audit(1707829073.130:1645): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.23.232:22-147.75.109.163:59672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:53.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.23.232:22-147.75.109.163:59672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:53.304000 audit[6420]: USER_ACCT pid=6420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:53.305942 sshd[6420]: Accepted publickey for core from 147.75.109.163 port 59672 ssh2: RSA SHA256:0wY9QCHpMNNqvNt1+y+i13Utf9IphnJXF70dkIdJYcE Feb 13 12:57:53.309157 sshd[6420]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 12:57:53.307000 audit[6420]: CRED_ACQ pid=6420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:53.319032 systemd[1]: Started session-29.scope. Feb 13 12:57:53.321809 systemd-logind[1730]: New session 29 of user core. Feb 13 12:57:53.325782 kernel: audit: type=1101 audit(1707829073.304:1646): pid=6420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:53.325932 kernel: audit: type=1103 audit(1707829073.307:1647): pid=6420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:53.333589 kernel: audit: type=1006 audit(1707829073.307:1648): pid=6420 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Feb 13 12:57:53.333726 kernel: audit: type=1300 audit(1707829073.307:1648): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff3281e70 a2=3 a3=1 items=0 ppid=1 pid=6420 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:53.307000 audit[6420]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff3281e70 a2=3 a3=1 items=0 ppid=1 pid=6420 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:57:53.307000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 12:57:53.347330 kernel: audit: type=1327 audit(1707829073.307:1648): proctitle=737368643A20636F7265205B707269765D Feb 13 12:57:53.347562 kernel: audit: type=1105 audit(1707829073.333:1649): pid=6420 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:53.333000 audit[6420]: USER_START pid=6420 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:53.337000 audit[6422]: CRED_ACQ pid=6422 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:53.367532 kernel: audit: type=1103 audit(1707829073.337:1650): pid=6422 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:53.583527 sshd[6420]: pam_unix(sshd:session): session closed for user core Feb 13 12:57:53.584000 audit[6420]: USER_END pid=6420 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:53.588852 systemd[1]: session-29.scope: Deactivated successfully. Feb 13 12:57:53.590244 systemd[1]: sshd@28-172.31.23.232:22-147.75.109.163:59672.service: Deactivated successfully. Feb 13 12:57:53.585000 audit[6420]: CRED_DISP pid=6420 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:53.598313 systemd-logind[1730]: Session 29 logged out. Waiting for processes to exit. Feb 13 12:57:53.607703 kernel: audit: type=1106 audit(1707829073.584:1651): pid=6420 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:53.607787 kernel: audit: type=1104 audit(1707829073.585:1652): pid=6420 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 13 12:57:53.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.23.232:22-147.75.109.163:59672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 12:57:53.609452 systemd-logind[1730]: Removed session 29. Feb 13 12:58:01.220000 audit[2678]: AVC avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:58:01.224023 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 12:58:01.224111 kernel: audit: type=1400 audit(1707829081.220:1654): avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:58:01.220000 audit[2678]: AVC avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:58:01.243101 kernel: audit: type=1400 audit(1707829081.220:1655): avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:58:01.243197 kernel: audit: type=1300 audit(1707829081.220:1654): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001977de0 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:58:01.220000 audit[2678]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001977de0 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:58:01.220000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:58:01.265303 kernel: audit: type=1327 audit(1707829081.220:1654): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:58:01.220000 audit[2678]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400fe291d0 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:58:01.277404 kernel: audit: type=1300 audit(1707829081.220:1655): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400fe291d0 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:58:01.220000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:58:01.288643 kernel: audit: type=1327 audit(1707829081.220:1655): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:58:01.288748 kernel: audit: type=1400 audit(1707829081.223:1656): avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:58:01.223000 audit[2678]: AVC avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:58:01.223000 audit[2678]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4010313590 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:58:01.310144 kernel: audit: type=1300 audit(1707829081.223:1656): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4010313590 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:58:01.310269 kernel: audit: type=1327 audit(1707829081.223:1656): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:58:01.223000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:58:01.291000 audit[2678]: AVC avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:58:01.330005 kernel: audit: type=1400 audit(1707829081.291:1657): avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:58:01.291000 audit[2678]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40103135c0 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:58:01.291000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:58:01.295000 audit[2678]: AVC avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:58:01.295000 audit[2678]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40041763c0 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:58:01.295000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:58:01.305000 audit[2678]: AVC avc: denied { watch } for pid=2678 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:58:01.305000 audit[2678]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400fe29350 a2=fc6 a3=0 items=0 ppid=2541 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c185,c736 key=(null) Feb 13 12:58:01.305000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E323332002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 12:58:01.763000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:58:01.763000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000d6d300 a2=fc6 a3=0 items=0 ppid=2501 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 key=(null) Feb 13 12:58:01.763000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 12:58:01.763000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 12:58:01.763000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000f37e30 a2=fc6 a3=0 items=0 ppid=2501 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c256,c335 key=(null) Feb 13 12:58:01.763000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 12:58:01.875155 systemd[1]: run-containerd-runc-k8s.io-772295ff091cd8be7083a1b60105dc40139aa9685bee88cc4fac1d41994a36e8-runc.LQwNeh.mount: Deactivated successfully. Feb 13 12:58:07.146315 systemd[1]: cri-containerd-c945b8a8c66b41504bbad81047ef16f472cafe4d2b573fbe4b112a9c2f0f7ab5.scope: Deactivated successfully. Feb 13 12:58:07.146863 systemd[1]: cri-containerd-c945b8a8c66b41504bbad81047ef16f472cafe4d2b573fbe4b112a9c2f0f7ab5.scope: Consumed 14.859s CPU time. Feb 13 12:58:07.145000 audit: BPF prog-id=123 op=UNLOAD Feb 13 12:58:07.149691 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 13 12:58:07.149835 kernel: audit: type=1334 audit(1707829087.145:1662): prog-id=123 op=UNLOAD Feb 13 12:58:07.153000 audit: BPF prog-id=126 op=UNLOAD Feb 13 12:58:07.158021 kernel: audit: type=1334 audit(1707829087.153:1663): prog-id=126 op=UNLOAD Feb 13 12:58:07.182565 env[1734]: time="2024-02-13T12:58:07.182499132Z" level=info msg="shim disconnected" id=c945b8a8c66b41504bbad81047ef16f472cafe4d2b573fbe4b112a9c2f0f7ab5 Feb 13 12:58:07.183356 env[1734]: time="2024-02-13T12:58:07.183295441Z" level=warning msg="cleaning up after shim disconnected" id=c945b8a8c66b41504bbad81047ef16f472cafe4d2b573fbe4b112a9c2f0f7ab5 namespace=k8s.io Feb 13 12:58:07.183494 env[1734]: time="2024-02-13T12:58:07.183464840Z" level=info msg="cleaning up dead shim" Feb 13 12:58:07.189225 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c945b8a8c66b41504bbad81047ef16f472cafe4d2b573fbe4b112a9c2f0f7ab5-rootfs.mount: Deactivated successfully. Feb 13 12:58:07.200399 env[1734]: time="2024-02-13T12:58:07.200342881Z" level=warning msg="cleanup warnings time=\"2024-02-13T12:58:07Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6465 runtime=io.containerd.runc.v2\n" Feb 13 12:58:07.440420 kubelet[3074]: I0213 12:58:07.440379 3074 scope.go:115] "RemoveContainer" containerID="c945b8a8c66b41504bbad81047ef16f472cafe4d2b573fbe4b112a9c2f0f7ab5" Feb 13 12:58:07.444218 env[1734]: time="2024-02-13T12:58:07.444165697Z" level=info msg="CreateContainer within sandbox \"d55a236eded7fc38efa0eb751aedd40c071af13aef192cfd15f44538036e0e68\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Feb 13 12:58:07.472386 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3052589293.mount: Deactivated successfully. Feb 13 12:58:07.478226 env[1734]: time="2024-02-13T12:58:07.478160151Z" level=info msg="CreateContainer within sandbox \"d55a236eded7fc38efa0eb751aedd40c071af13aef192cfd15f44538036e0e68\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"bdc6a951169b4ffa9d17c772dda6bdeacb8cdb15046a322848feddb3faff50c8\"" Feb 13 12:58:07.480734 env[1734]: time="2024-02-13T12:58:07.480645759Z" level=info msg="StartContainer for \"bdc6a951169b4ffa9d17c772dda6bdeacb8cdb15046a322848feddb3faff50c8\"" Feb 13 12:58:07.514568 systemd[1]: Started cri-containerd-bdc6a951169b4ffa9d17c772dda6bdeacb8cdb15046a322848feddb3faff50c8.scope. Feb 13 12:58:07.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.564575 kernel: audit: type=1400 audit(1707829087.548:1664): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.564730 kernel: audit: type=1400 audit(1707829087.549:1665): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.572658 kernel: audit: type=1400 audit(1707829087.549:1666): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.580900 kernel: audit: type=1400 audit(1707829087.549:1667): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.588931 kernel: audit: type=1400 audit(1707829087.549:1668): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.605806 kernel: audit: type=1400 audit(1707829087.549:1669): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.605977 kernel: audit: type=1400 audit(1707829087.549:1670): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.614251 kernel: audit: type=1400 audit(1707829087.549:1671): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.555000 audit: BPF prog-id=201 op=LOAD Feb 13 12:58:07.556000 audit[6484]: AVC avc: denied { bpf } for pid=6484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.556000 audit[6484]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=3239 pid=6484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:58:07.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264633661393531313639623466666139643137633737326464613662 Feb 13 12:58:07.556000 audit[6484]: AVC avc: denied { perfmon } for pid=6484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.556000 audit[6484]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3239 pid=6484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:58:07.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264633661393531313639623466666139643137633737326464613662 Feb 13 12:58:07.556000 audit[6484]: AVC avc: denied { bpf } for pid=6484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.556000 audit[6484]: AVC avc: denied { bpf } for pid=6484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.556000 audit[6484]: AVC avc: denied { bpf } for pid=6484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.556000 audit[6484]: AVC avc: denied { perfmon } for pid=6484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.556000 audit[6484]: AVC avc: denied { perfmon } for pid=6484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.556000 audit[6484]: AVC avc: denied { perfmon } for pid=6484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.556000 audit[6484]: AVC avc: denied { perfmon } for pid=6484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.556000 audit[6484]: AVC avc: denied { perfmon } for pid=6484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.556000 audit[6484]: AVC avc: denied { bpf } for pid=6484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.556000 audit[6484]: AVC avc: denied { bpf } for pid=6484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.556000 audit: BPF prog-id=202 op=LOAD Feb 13 12:58:07.556000 audit[6484]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=3239 pid=6484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:58:07.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264633661393531313639623466666139643137633737326464613662 Feb 13 12:58:07.563000 audit[6484]: AVC avc: denied { bpf } for pid=6484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.563000 audit[6484]: AVC avc: denied { bpf } for pid=6484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.563000 audit[6484]: AVC avc: denied { perfmon } for pid=6484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.563000 audit[6484]: AVC avc: denied { perfmon } for pid=6484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.563000 audit[6484]: AVC avc: denied { perfmon } for pid=6484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.563000 audit[6484]: AVC avc: denied { perfmon } for pid=6484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.563000 audit[6484]: AVC avc: denied { perfmon } for pid=6484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.563000 audit[6484]: AVC avc: denied { bpf } for pid=6484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.563000 audit[6484]: AVC avc: denied { bpf } for pid=6484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.563000 audit: BPF prog-id=203 op=LOAD Feb 13 12:58:07.563000 audit[6484]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=3239 pid=6484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:58:07.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264633661393531313639623466666139643137633737326464613662 Feb 13 12:58:07.564000 audit: BPF prog-id=203 op=UNLOAD Feb 13 12:58:07.564000 audit: BPF prog-id=202 op=UNLOAD Feb 13 12:58:07.564000 audit[6484]: AVC avc: denied { bpf } for pid=6484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.564000 audit[6484]: AVC avc: denied { bpf } for pid=6484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.564000 audit[6484]: AVC avc: denied { bpf } for pid=6484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.564000 audit[6484]: AVC avc: denied { perfmon } for pid=6484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.564000 audit[6484]: AVC avc: denied { perfmon } for pid=6484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.564000 audit[6484]: AVC avc: denied { perfmon } for pid=6484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.564000 audit[6484]: AVC avc: denied { perfmon } for pid=6484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.564000 audit[6484]: AVC avc: denied { perfmon } for pid=6484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.564000 audit[6484]: AVC avc: denied { bpf } for pid=6484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.564000 audit[6484]: AVC avc: denied { bpf } for pid=6484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 12:58:07.564000 audit: BPF prog-id=204 op=LOAD Feb 13 12:58:07.564000 audit[6484]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=3239 pid=6484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 12:58:07.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264633661393531313639623466666139643137633737326464613662 Feb 13 12:58:07.639504 env[1734]: time="2024-02-13T12:58:07.639238673Z" level=info msg="StartContainer for \"bdc6a951169b4ffa9d17c772dda6bdeacb8cdb15046a322848feddb3faff50c8\" returns successfully"